pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,29 +21,29 @@ __all__ = ['BackendConfigEstArgs', 'BackendConfigEst']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class BackendConfigEstArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
backend: pulumi.Input[
|
26
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[
|
24
|
+
backend: pulumi.Input[_builtins.str],
|
25
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
26
|
authenticators: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']] = None,
|
28
|
-
default_mount: Optional[pulumi.Input[
|
29
|
-
default_path_policy: Optional[pulumi.Input[
|
30
|
-
enable_sentinel_parsing: Optional[pulumi.Input[
|
31
|
-
enabled: Optional[pulumi.Input[
|
32
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
33
|
-
namespace: Optional[pulumi.Input[
|
27
|
+
default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
|
28
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
|
30
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
32
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
34
33
|
"""
|
35
34
|
The set of arguments for constructing a BackendConfigEst resource.
|
36
|
-
:param pulumi.Input[
|
35
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
37
36
|
read the EST configuration from, with no leading or trailing `/`s.
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
39
38
|
|
40
39
|
<a id="nestedatt--authenticators"></a>
|
41
40
|
:param pulumi.Input['BackendConfigEstAuthenticatorsArgs'] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
|
42
|
-
:param pulumi.Input[
|
43
|
-
:param pulumi.Input[
|
44
|
-
:param pulumi.Input[
|
45
|
-
:param pulumi.Input[
|
46
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
47
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
42
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
43
|
+
:param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
44
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
|
45
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
46
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
48
47
|
The value should not contain leading or trailing forward slashes.
|
49
48
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
50
49
|
*Available only for Vault Enterprise*.
|
@@ -67,9 +66,9 @@ class BackendConfigEstArgs:
|
|
67
66
|
if namespace is not None:
|
68
67
|
pulumi.set(__self__, "namespace", namespace)
|
69
68
|
|
70
|
-
@property
|
69
|
+
@_builtins.property
|
71
70
|
@pulumi.getter
|
72
|
-
def backend(self) -> pulumi.Input[
|
71
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
73
72
|
"""
|
74
73
|
The path to the PKI secret backend to
|
75
74
|
read the EST configuration from, with no leading or trailing `/`s.
|
@@ -77,12 +76,12 @@ class BackendConfigEstArgs:
|
|
77
76
|
return pulumi.get(self, "backend")
|
78
77
|
|
79
78
|
@backend.setter
|
80
|
-
def backend(self, value: pulumi.Input[
|
79
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
81
80
|
pulumi.set(self, "backend", value)
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter(name="auditFields")
|
85
|
-
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
84
|
+
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
86
85
|
"""
|
87
86
|
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
88
87
|
|
@@ -91,10 +90,10 @@ class BackendConfigEstArgs:
|
|
91
90
|
return pulumi.get(self, "audit_fields")
|
92
91
|
|
93
92
|
@audit_fields.setter
|
94
|
-
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
93
|
+
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
95
94
|
pulumi.set(self, "audit_fields", value)
|
96
95
|
|
97
|
-
@property
|
96
|
+
@_builtins.property
|
98
97
|
@pulumi.getter
|
99
98
|
def authenticators(self) -> Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]:
|
100
99
|
"""
|
@@ -106,69 +105,69 @@ class BackendConfigEstArgs:
|
|
106
105
|
def authenticators(self, value: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]):
|
107
106
|
pulumi.set(self, "authenticators", value)
|
108
107
|
|
109
|
-
@property
|
108
|
+
@_builtins.property
|
110
109
|
@pulumi.getter(name="defaultMount")
|
111
|
-
def default_mount(self) -> Optional[pulumi.Input[
|
110
|
+
def default_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
112
111
|
"""
|
113
112
|
If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
114
113
|
"""
|
115
114
|
return pulumi.get(self, "default_mount")
|
116
115
|
|
117
116
|
@default_mount.setter
|
118
|
-
def default_mount(self, value: Optional[pulumi.Input[
|
117
|
+
def default_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
119
118
|
pulumi.set(self, "default_mount", value)
|
120
119
|
|
121
|
-
@property
|
120
|
+
@_builtins.property
|
122
121
|
@pulumi.getter(name="defaultPathPolicy")
|
123
|
-
def default_path_policy(self) -> Optional[pulumi.Input[
|
122
|
+
def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
124
123
|
"""
|
125
124
|
Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
126
125
|
"""
|
127
126
|
return pulumi.get(self, "default_path_policy")
|
128
127
|
|
129
128
|
@default_path_policy.setter
|
130
|
-
def default_path_policy(self, value: Optional[pulumi.Input[
|
129
|
+
def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
131
130
|
pulumi.set(self, "default_path_policy", value)
|
132
131
|
|
133
|
-
@property
|
132
|
+
@_builtins.property
|
134
133
|
@pulumi.getter(name="enableSentinelParsing")
|
135
|
-
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[
|
134
|
+
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
136
135
|
"""
|
137
136
|
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
138
137
|
"""
|
139
138
|
return pulumi.get(self, "enable_sentinel_parsing")
|
140
139
|
|
141
140
|
@enable_sentinel_parsing.setter
|
142
|
-
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[
|
141
|
+
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
143
142
|
pulumi.set(self, "enable_sentinel_parsing", value)
|
144
143
|
|
145
|
-
@property
|
144
|
+
@_builtins.property
|
146
145
|
@pulumi.getter
|
147
|
-
def enabled(self) -> Optional[pulumi.Input[
|
146
|
+
def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
148
147
|
"""
|
149
148
|
Specifies whether EST is enabled.
|
150
149
|
"""
|
151
150
|
return pulumi.get(self, "enabled")
|
152
151
|
|
153
152
|
@enabled.setter
|
154
|
-
def enabled(self, value: Optional[pulumi.Input[
|
153
|
+
def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
155
154
|
pulumi.set(self, "enabled", value)
|
156
155
|
|
157
|
-
@property
|
156
|
+
@_builtins.property
|
158
157
|
@pulumi.getter(name="labelToPathPolicy")
|
159
|
-
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
158
|
+
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
160
159
|
"""
|
161
160
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
162
161
|
"""
|
163
162
|
return pulumi.get(self, "label_to_path_policy")
|
164
163
|
|
165
164
|
@label_to_path_policy.setter
|
166
|
-
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
165
|
+
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
167
166
|
pulumi.set(self, "label_to_path_policy", value)
|
168
167
|
|
169
|
-
@property
|
168
|
+
@_builtins.property
|
170
169
|
@pulumi.getter
|
171
|
-
def namespace(self) -> Optional[pulumi.Input[
|
170
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
172
171
|
"""
|
173
172
|
The namespace of the target resource.
|
174
173
|
The value should not contain leading or trailing forward slashes.
|
@@ -178,38 +177,38 @@ class BackendConfigEstArgs:
|
|
178
177
|
return pulumi.get(self, "namespace")
|
179
178
|
|
180
179
|
@namespace.setter
|
181
|
-
def namespace(self, value: Optional[pulumi.Input[
|
180
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
182
181
|
pulumi.set(self, "namespace", value)
|
183
182
|
|
184
183
|
|
185
184
|
@pulumi.input_type
|
186
185
|
class _BackendConfigEstState:
|
187
186
|
def __init__(__self__, *,
|
188
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[
|
187
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
189
188
|
authenticators: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']] = None,
|
190
|
-
backend: Optional[pulumi.Input[
|
191
|
-
default_mount: Optional[pulumi.Input[
|
192
|
-
default_path_policy: Optional[pulumi.Input[
|
193
|
-
enable_sentinel_parsing: Optional[pulumi.Input[
|
194
|
-
enabled: Optional[pulumi.Input[
|
195
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
196
|
-
last_updated: Optional[pulumi.Input[
|
197
|
-
namespace: Optional[pulumi.Input[
|
189
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
190
|
+
default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
|
191
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
192
|
+
enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
|
193
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
194
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
195
|
+
last_updated: Optional[pulumi.Input[_builtins.str]] = None,
|
196
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
198
197
|
"""
|
199
198
|
Input properties used for looking up and filtering BackendConfigEst resources.
|
200
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
199
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
201
200
|
|
202
201
|
<a id="nestedatt--authenticators"></a>
|
203
202
|
:param pulumi.Input['BackendConfigEstAuthenticatorsArgs'] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
|
204
|
-
:param pulumi.Input[
|
203
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
205
204
|
read the EST configuration from, with no leading or trailing `/`s.
|
206
|
-
:param pulumi.Input[
|
207
|
-
:param pulumi.Input[
|
208
|
-
:param pulumi.Input[
|
209
|
-
:param pulumi.Input[
|
210
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
211
|
-
:param pulumi.Input[
|
212
|
-
:param pulumi.Input[
|
205
|
+
:param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
206
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
207
|
+
:param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
208
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
|
209
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
210
|
+
:param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
211
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
213
212
|
The value should not contain leading or trailing forward slashes.
|
214
213
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
215
214
|
*Available only for Vault Enterprise*.
|
@@ -235,9 +234,9 @@ class _BackendConfigEstState:
|
|
235
234
|
if namespace is not None:
|
236
235
|
pulumi.set(__self__, "namespace", namespace)
|
237
236
|
|
238
|
-
@property
|
237
|
+
@_builtins.property
|
239
238
|
@pulumi.getter(name="auditFields")
|
240
|
-
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
239
|
+
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
241
240
|
"""
|
242
241
|
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
243
242
|
|
@@ -246,10 +245,10 @@ class _BackendConfigEstState:
|
|
246
245
|
return pulumi.get(self, "audit_fields")
|
247
246
|
|
248
247
|
@audit_fields.setter
|
249
|
-
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
248
|
+
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
250
249
|
pulumi.set(self, "audit_fields", value)
|
251
250
|
|
252
|
-
@property
|
251
|
+
@_builtins.property
|
253
252
|
@pulumi.getter
|
254
253
|
def authenticators(self) -> Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]:
|
255
254
|
"""
|
@@ -261,9 +260,9 @@ class _BackendConfigEstState:
|
|
261
260
|
def authenticators(self, value: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]):
|
262
261
|
pulumi.set(self, "authenticators", value)
|
263
262
|
|
264
|
-
@property
|
263
|
+
@_builtins.property
|
265
264
|
@pulumi.getter
|
266
|
-
def backend(self) -> Optional[pulumi.Input[
|
265
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
267
266
|
"""
|
268
267
|
The path to the PKI secret backend to
|
269
268
|
read the EST configuration from, with no leading or trailing `/`s.
|
@@ -271,84 +270,84 @@ class _BackendConfigEstState:
|
|
271
270
|
return pulumi.get(self, "backend")
|
272
271
|
|
273
272
|
@backend.setter
|
274
|
-
def backend(self, value: Optional[pulumi.Input[
|
273
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
275
274
|
pulumi.set(self, "backend", value)
|
276
275
|
|
277
|
-
@property
|
276
|
+
@_builtins.property
|
278
277
|
@pulumi.getter(name="defaultMount")
|
279
|
-
def default_mount(self) -> Optional[pulumi.Input[
|
278
|
+
def default_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
280
279
|
"""
|
281
280
|
If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
282
281
|
"""
|
283
282
|
return pulumi.get(self, "default_mount")
|
284
283
|
|
285
284
|
@default_mount.setter
|
286
|
-
def default_mount(self, value: Optional[pulumi.Input[
|
285
|
+
def default_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
287
286
|
pulumi.set(self, "default_mount", value)
|
288
287
|
|
289
|
-
@property
|
288
|
+
@_builtins.property
|
290
289
|
@pulumi.getter(name="defaultPathPolicy")
|
291
|
-
def default_path_policy(self) -> Optional[pulumi.Input[
|
290
|
+
def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
292
291
|
"""
|
293
292
|
Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
294
293
|
"""
|
295
294
|
return pulumi.get(self, "default_path_policy")
|
296
295
|
|
297
296
|
@default_path_policy.setter
|
298
|
-
def default_path_policy(self, value: Optional[pulumi.Input[
|
297
|
+
def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
299
298
|
pulumi.set(self, "default_path_policy", value)
|
300
299
|
|
301
|
-
@property
|
300
|
+
@_builtins.property
|
302
301
|
@pulumi.getter(name="enableSentinelParsing")
|
303
|
-
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[
|
302
|
+
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
304
303
|
"""
|
305
304
|
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
306
305
|
"""
|
307
306
|
return pulumi.get(self, "enable_sentinel_parsing")
|
308
307
|
|
309
308
|
@enable_sentinel_parsing.setter
|
310
|
-
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[
|
309
|
+
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
311
310
|
pulumi.set(self, "enable_sentinel_parsing", value)
|
312
311
|
|
313
|
-
@property
|
312
|
+
@_builtins.property
|
314
313
|
@pulumi.getter
|
315
|
-
def enabled(self) -> Optional[pulumi.Input[
|
314
|
+
def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
316
315
|
"""
|
317
316
|
Specifies whether EST is enabled.
|
318
317
|
"""
|
319
318
|
return pulumi.get(self, "enabled")
|
320
319
|
|
321
320
|
@enabled.setter
|
322
|
-
def enabled(self, value: Optional[pulumi.Input[
|
321
|
+
def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
323
322
|
pulumi.set(self, "enabled", value)
|
324
323
|
|
325
|
-
@property
|
324
|
+
@_builtins.property
|
326
325
|
@pulumi.getter(name="labelToPathPolicy")
|
327
|
-
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
326
|
+
def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
328
327
|
"""
|
329
328
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
330
329
|
"""
|
331
330
|
return pulumi.get(self, "label_to_path_policy")
|
332
331
|
|
333
332
|
@label_to_path_policy.setter
|
334
|
-
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
333
|
+
def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
335
334
|
pulumi.set(self, "label_to_path_policy", value)
|
336
335
|
|
337
|
-
@property
|
336
|
+
@_builtins.property
|
338
337
|
@pulumi.getter(name="lastUpdated")
|
339
|
-
def last_updated(self) -> Optional[pulumi.Input[
|
338
|
+
def last_updated(self) -> Optional[pulumi.Input[_builtins.str]]:
|
340
339
|
"""
|
341
340
|
A read-only timestamp representing the last time the configuration was updated.
|
342
341
|
"""
|
343
342
|
return pulumi.get(self, "last_updated")
|
344
343
|
|
345
344
|
@last_updated.setter
|
346
|
-
def last_updated(self, value: Optional[pulumi.Input[
|
345
|
+
def last_updated(self, value: Optional[pulumi.Input[_builtins.str]]):
|
347
346
|
pulumi.set(self, "last_updated", value)
|
348
347
|
|
349
|
-
@property
|
348
|
+
@_builtins.property
|
350
349
|
@pulumi.getter
|
351
|
-
def namespace(self) -> Optional[pulumi.Input[
|
350
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
352
351
|
"""
|
353
352
|
The namespace of the target resource.
|
354
353
|
The value should not contain leading or trailing forward slashes.
|
@@ -358,7 +357,7 @@ class _BackendConfigEstState:
|
|
358
357
|
return pulumi.get(self, "namespace")
|
359
358
|
|
360
359
|
@namespace.setter
|
361
|
-
def namespace(self, value: Optional[pulumi.Input[
|
360
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
362
361
|
pulumi.set(self, "namespace", value)
|
363
362
|
|
364
363
|
|
@@ -368,15 +367,15 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
368
367
|
def __init__(__self__,
|
369
368
|
resource_name: str,
|
370
369
|
opts: Optional[pulumi.ResourceOptions] = None,
|
371
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[
|
370
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
372
371
|
authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
|
373
|
-
backend: Optional[pulumi.Input[
|
374
|
-
default_mount: Optional[pulumi.Input[
|
375
|
-
default_path_policy: Optional[pulumi.Input[
|
376
|
-
enable_sentinel_parsing: Optional[pulumi.Input[
|
377
|
-
enabled: Optional[pulumi.Input[
|
378
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
379
|
-
namespace: Optional[pulumi.Input[
|
372
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
373
|
+
default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
|
374
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
375
|
+
enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
|
376
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
377
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
378
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
380
379
|
__props__=None):
|
381
380
|
"""
|
382
381
|
Allows setting the EST configuration on a PKI Secret Backend
|
@@ -393,18 +392,18 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
393
392
|
|
394
393
|
:param str resource_name: The name of the resource.
|
395
394
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
396
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
395
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
397
396
|
|
398
397
|
<a id="nestedatt--authenticators"></a>
|
399
398
|
:param pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
|
400
|
-
:param pulumi.Input[
|
399
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
401
400
|
read the EST configuration from, with no leading or trailing `/`s.
|
402
|
-
:param pulumi.Input[
|
403
|
-
:param pulumi.Input[
|
404
|
-
:param pulumi.Input[
|
405
|
-
:param pulumi.Input[
|
406
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
407
|
-
:param pulumi.Input[
|
401
|
+
:param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
402
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
403
|
+
:param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
404
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
|
405
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
406
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
408
407
|
The value should not contain leading or trailing forward slashes.
|
409
408
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
410
409
|
*Available only for Vault Enterprise*.
|
@@ -443,15 +442,15 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
443
442
|
def _internal_init(__self__,
|
444
443
|
resource_name: str,
|
445
444
|
opts: Optional[pulumi.ResourceOptions] = None,
|
446
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[
|
445
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
447
446
|
authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
|
448
|
-
backend: Optional[pulumi.Input[
|
449
|
-
default_mount: Optional[pulumi.Input[
|
450
|
-
default_path_policy: Optional[pulumi.Input[
|
451
|
-
enable_sentinel_parsing: Optional[pulumi.Input[
|
452
|
-
enabled: Optional[pulumi.Input[
|
453
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
454
|
-
namespace: Optional[pulumi.Input[
|
447
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
448
|
+
default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
|
449
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
450
|
+
enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
|
451
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
452
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
453
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
455
454
|
__props__=None):
|
456
455
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
457
456
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -483,16 +482,16 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
483
482
|
def get(resource_name: str,
|
484
483
|
id: pulumi.Input[str],
|
485
484
|
opts: Optional[pulumi.ResourceOptions] = None,
|
486
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[
|
485
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
487
486
|
authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
|
488
|
-
backend: Optional[pulumi.Input[
|
489
|
-
default_mount: Optional[pulumi.Input[
|
490
|
-
default_path_policy: Optional[pulumi.Input[
|
491
|
-
enable_sentinel_parsing: Optional[pulumi.Input[
|
492
|
-
enabled: Optional[pulumi.Input[
|
493
|
-
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[
|
494
|
-
last_updated: Optional[pulumi.Input[
|
495
|
-
namespace: Optional[pulumi.Input[
|
487
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
488
|
+
default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
|
489
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
490
|
+
enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
|
491
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
492
|
+
label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
493
|
+
last_updated: Optional[pulumi.Input[_builtins.str]] = None,
|
494
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'BackendConfigEst':
|
496
495
|
"""
|
497
496
|
Get an existing BackendConfigEst resource's state with the given name, id, and optional extra
|
498
497
|
properties used to qualify the lookup.
|
@@ -500,19 +499,19 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
500
499
|
:param str resource_name: The unique name of the resulting resource.
|
501
500
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
502
501
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
503
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
502
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
504
503
|
|
505
504
|
<a id="nestedatt--authenticators"></a>
|
506
505
|
:param pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
|
507
|
-
:param pulumi.Input[
|
506
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
508
507
|
read the EST configuration from, with no leading or trailing `/`s.
|
509
|
-
:param pulumi.Input[
|
510
|
-
:param pulumi.Input[
|
511
|
-
:param pulumi.Input[
|
512
|
-
:param pulumi.Input[
|
513
|
-
:param pulumi.Input[Mapping[str, pulumi.Input[
|
514
|
-
:param pulumi.Input[
|
515
|
-
:param pulumi.Input[
|
508
|
+
:param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
509
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
510
|
+
:param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
511
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
|
512
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
513
|
+
:param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
514
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
516
515
|
The value should not contain leading or trailing forward slashes.
|
517
516
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
518
517
|
*Available only for Vault Enterprise*.
|
@@ -533,9 +532,9 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
533
532
|
__props__.__dict__["namespace"] = namespace
|
534
533
|
return BackendConfigEst(resource_name, opts=opts, __props__=__props__)
|
535
534
|
|
536
|
-
@property
|
535
|
+
@_builtins.property
|
537
536
|
@pulumi.getter(name="auditFields")
|
538
|
-
def audit_fields(self) -> pulumi.Output[Sequence[
|
537
|
+
def audit_fields(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
539
538
|
"""
|
540
539
|
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
541
540
|
|
@@ -543,7 +542,7 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
543
542
|
"""
|
544
543
|
return pulumi.get(self, "audit_fields")
|
545
544
|
|
546
|
-
@property
|
545
|
+
@_builtins.property
|
547
546
|
@pulumi.getter
|
548
547
|
def authenticators(self) -> pulumi.Output['outputs.BackendConfigEstAuthenticators']:
|
549
548
|
"""
|
@@ -551,66 +550,66 @@ class BackendConfigEst(pulumi.CustomResource):
|
|
551
550
|
"""
|
552
551
|
return pulumi.get(self, "authenticators")
|
553
552
|
|
554
|
-
@property
|
553
|
+
@_builtins.property
|
555
554
|
@pulumi.getter
|
556
|
-
def backend(self) -> pulumi.Output[
|
555
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
557
556
|
"""
|
558
557
|
The path to the PKI secret backend to
|
559
558
|
read the EST configuration from, with no leading or trailing `/`s.
|
560
559
|
"""
|
561
560
|
return pulumi.get(self, "backend")
|
562
561
|
|
563
|
-
@property
|
562
|
+
@_builtins.property
|
564
563
|
@pulumi.getter(name="defaultMount")
|
565
|
-
def default_mount(self) -> pulumi.Output[Optional[
|
564
|
+
def default_mount(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
566
565
|
"""
|
567
566
|
If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
|
568
567
|
"""
|
569
568
|
return pulumi.get(self, "default_mount")
|
570
569
|
|
571
|
-
@property
|
570
|
+
@_builtins.property
|
572
571
|
@pulumi.getter(name="defaultPathPolicy")
|
573
|
-
def default_path_policy(self) -> pulumi.Output[Optional[
|
572
|
+
def default_path_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
|
574
573
|
"""
|
575
574
|
Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
|
576
575
|
"""
|
577
576
|
return pulumi.get(self, "default_path_policy")
|
578
577
|
|
579
|
-
@property
|
578
|
+
@_builtins.property
|
580
579
|
@pulumi.getter(name="enableSentinelParsing")
|
581
|
-
def enable_sentinel_parsing(self) -> pulumi.Output[Optional[
|
580
|
+
def enable_sentinel_parsing(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
582
581
|
"""
|
583
582
|
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
584
583
|
"""
|
585
584
|
return pulumi.get(self, "enable_sentinel_parsing")
|
586
585
|
|
587
|
-
@property
|
586
|
+
@_builtins.property
|
588
587
|
@pulumi.getter
|
589
|
-
def enabled(self) -> pulumi.Output[Optional[
|
588
|
+
def enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
590
589
|
"""
|
591
590
|
Specifies whether EST is enabled.
|
592
591
|
"""
|
593
592
|
return pulumi.get(self, "enabled")
|
594
593
|
|
595
|
-
@property
|
594
|
+
@_builtins.property
|
596
595
|
@pulumi.getter(name="labelToPathPolicy")
|
597
|
-
def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str,
|
596
|
+
def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
|
598
597
|
"""
|
599
598
|
Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
|
600
599
|
"""
|
601
600
|
return pulumi.get(self, "label_to_path_policy")
|
602
601
|
|
603
|
-
@property
|
602
|
+
@_builtins.property
|
604
603
|
@pulumi.getter(name="lastUpdated")
|
605
|
-
def last_updated(self) -> pulumi.Output[
|
604
|
+
def last_updated(self) -> pulumi.Output[_builtins.str]:
|
606
605
|
"""
|
607
606
|
A read-only timestamp representing the last time the configuration was updated.
|
608
607
|
"""
|
609
608
|
return pulumi.get(self, "last_updated")
|
610
609
|
|
611
|
-
@property
|
610
|
+
@_builtins.property
|
612
611
|
@pulumi.getter
|
613
|
-
def namespace(self) -> pulumi.Output[Optional[
|
612
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
614
613
|
"""
|
615
614
|
The namespace of the target resource.
|
616
615
|
The value should not contain leading or trailing forward slashes.
|