pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +19 -1
- pulumi_vault/_inputs.py +873 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +1016 -439
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +1057 -285
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +887 -256
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +426 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +878 -336
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +400 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +1006 -227
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +431 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +732 -693
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +380 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +909 -271
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/oci_auth_backend.py +683 -0
- pulumi_vault/oci_auth_backend_role.py +798 -0
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +234 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +205 -159
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +902 -231
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +217 -124
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +833 -155
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +377 -350
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0.dist-info/RECORD +270 -0
- pulumi_vault-7.1.0.dist-info/RECORD +0 -268
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,33 +21,35 @@ __all__ = ['BackendConfigScepArgs', 'BackendConfigScep']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class BackendConfigScepArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
backend: pulumi.Input[
|
26
|
-
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
24
|
+
backend: pulumi.Input[_builtins.str],
|
25
|
+
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
27
|
authenticators: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']] = None,
|
29
|
-
default_path_policy: Optional[pulumi.Input[
|
30
|
-
enabled: Optional[pulumi.Input[
|
28
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
30
|
external_validations: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]] = None,
|
32
|
-
|
33
|
-
|
31
|
+
log_level: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
33
|
+
restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None):
|
34
34
|
"""
|
35
35
|
The set of arguments for constructing a BackendConfigScep resource.
|
36
|
-
:param pulumi.Input[
|
36
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
37
37
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
39
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
38
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
|
39
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
|
40
40
|
:param pulumi.Input['BackendConfigScepAuthenticatorsArgs'] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
41
|
-
:param pulumi.Input[
|
42
|
-
:param pulumi.Input[
|
41
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
42
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
|
43
43
|
:param pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
44
|
-
:param pulumi.Input[
|
45
|
-
The value should not contain leading or trailing forward slashes.
|
46
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
47
|
-
*Available only for Vault Enterprise*.
|
48
|
-
:param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
44
|
+
:param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
|
49
45
|
|
50
46
|
|
51
47
|
<a id="nestedatt--authenticators"></a>
|
48
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
49
|
+
The value should not contain leading or trailing forward slashes.
|
50
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
51
|
+
*Available only for Vault Enterprise*.
|
52
|
+
:param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
52
53
|
"""
|
53
54
|
pulumi.set(__self__, "backend", backend)
|
54
55
|
if allowed_digest_algorithms is not None:
|
@@ -63,14 +64,16 @@ class BackendConfigScepArgs:
|
|
63
64
|
pulumi.set(__self__, "enabled", enabled)
|
64
65
|
if external_validations is not None:
|
65
66
|
pulumi.set(__self__, "external_validations", external_validations)
|
67
|
+
if log_level is not None:
|
68
|
+
pulumi.set(__self__, "log_level", log_level)
|
66
69
|
if namespace is not None:
|
67
70
|
pulumi.set(__self__, "namespace", namespace)
|
68
71
|
if restrict_ca_chain_to_issuer is not None:
|
69
72
|
pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
|
70
73
|
|
71
|
-
@property
|
74
|
+
@_builtins.property
|
72
75
|
@pulumi.getter
|
73
|
-
def backend(self) -> pulumi.Input[
|
76
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
74
77
|
"""
|
75
78
|
The path to the PKI secret backend to
|
76
79
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
@@ -78,34 +81,34 @@ class BackendConfigScepArgs:
|
|
78
81
|
return pulumi.get(self, "backend")
|
79
82
|
|
80
83
|
@backend.setter
|
81
|
-
def backend(self, value: pulumi.Input[
|
84
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
82
85
|
pulumi.set(self, "backend", value)
|
83
86
|
|
84
|
-
@property
|
87
|
+
@_builtins.property
|
85
88
|
@pulumi.getter(name="allowedDigestAlgorithms")
|
86
|
-
def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
89
|
+
def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
87
90
|
"""
|
88
91
|
List of allowed digest algorithms for SCEP requests.
|
89
92
|
"""
|
90
93
|
return pulumi.get(self, "allowed_digest_algorithms")
|
91
94
|
|
92
95
|
@allowed_digest_algorithms.setter
|
93
|
-
def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
96
|
+
def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
94
97
|
pulumi.set(self, "allowed_digest_algorithms", value)
|
95
98
|
|
96
|
-
@property
|
99
|
+
@_builtins.property
|
97
100
|
@pulumi.getter(name="allowedEncryptionAlgorithms")
|
98
|
-
def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
101
|
+
def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
99
102
|
"""
|
100
103
|
List of allowed encryption algorithms for SCEP requests.
|
101
104
|
"""
|
102
105
|
return pulumi.get(self, "allowed_encryption_algorithms")
|
103
106
|
|
104
107
|
@allowed_encryption_algorithms.setter
|
105
|
-
def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
108
|
+
def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
106
109
|
pulumi.set(self, "allowed_encryption_algorithms", value)
|
107
110
|
|
108
|
-
@property
|
111
|
+
@_builtins.property
|
109
112
|
@pulumi.getter
|
110
113
|
def authenticators(self) -> Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]:
|
111
114
|
"""
|
@@ -117,31 +120,31 @@ class BackendConfigScepArgs:
|
|
117
120
|
def authenticators(self, value: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]):
|
118
121
|
pulumi.set(self, "authenticators", value)
|
119
122
|
|
120
|
-
@property
|
123
|
+
@_builtins.property
|
121
124
|
@pulumi.getter(name="defaultPathPolicy")
|
122
|
-
def default_path_policy(self) -> Optional[pulumi.Input[
|
125
|
+
def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
123
126
|
"""
|
124
127
|
Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
125
128
|
"""
|
126
129
|
return pulumi.get(self, "default_path_policy")
|
127
130
|
|
128
131
|
@default_path_policy.setter
|
129
|
-
def default_path_policy(self, value: Optional[pulumi.Input[
|
132
|
+
def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
130
133
|
pulumi.set(self, "default_path_policy", value)
|
131
134
|
|
132
|
-
@property
|
135
|
+
@_builtins.property
|
133
136
|
@pulumi.getter
|
134
|
-
def enabled(self) -> Optional[pulumi.Input[
|
137
|
+
def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
135
138
|
"""
|
136
139
|
Specifies whether SCEP is enabled.
|
137
140
|
"""
|
138
141
|
return pulumi.get(self, "enabled")
|
139
142
|
|
140
143
|
@enabled.setter
|
141
|
-
def enabled(self, value: Optional[pulumi.Input[
|
144
|
+
def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
142
145
|
pulumi.set(self, "enabled", value)
|
143
146
|
|
144
|
-
@property
|
147
|
+
@_builtins.property
|
145
148
|
@pulumi.getter(name="externalValidations")
|
146
149
|
def external_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]:
|
147
150
|
"""
|
@@ -153,9 +156,24 @@ class BackendConfigScepArgs:
|
|
153
156
|
def external_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]):
|
154
157
|
pulumi.set(self, "external_validations", value)
|
155
158
|
|
156
|
-
@property
|
159
|
+
@_builtins.property
|
160
|
+
@pulumi.getter(name="logLevel")
|
161
|
+
def log_level(self) -> Optional[pulumi.Input[_builtins.str]]:
|
162
|
+
"""
|
163
|
+
The level of logging verbosity, affects only SCEP logs on this mount.
|
164
|
+
|
165
|
+
|
166
|
+
<a id="nestedatt--authenticators"></a>
|
167
|
+
"""
|
168
|
+
return pulumi.get(self, "log_level")
|
169
|
+
|
170
|
+
@log_level.setter
|
171
|
+
def log_level(self, value: Optional[pulumi.Input[_builtins.str]]):
|
172
|
+
pulumi.set(self, "log_level", value)
|
173
|
+
|
174
|
+
@_builtins.property
|
157
175
|
@pulumi.getter
|
158
|
-
def namespace(self) -> Optional[pulumi.Input[
|
176
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
159
177
|
"""
|
160
178
|
The namespace of the target resource.
|
161
179
|
The value should not contain leading or trailing forward slashes.
|
@@ -165,57 +183,56 @@ class BackendConfigScepArgs:
|
|
165
183
|
return pulumi.get(self, "namespace")
|
166
184
|
|
167
185
|
@namespace.setter
|
168
|
-
def namespace(self, value: Optional[pulumi.Input[
|
186
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
169
187
|
pulumi.set(self, "namespace", value)
|
170
188
|
|
171
|
-
@property
|
189
|
+
@_builtins.property
|
172
190
|
@pulumi.getter(name="restrictCaChainToIssuer")
|
173
|
-
def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[
|
191
|
+
def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
174
192
|
"""
|
175
193
|
If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
176
|
-
|
177
|
-
|
178
|
-
<a id="nestedatt--authenticators"></a>
|
179
194
|
"""
|
180
195
|
return pulumi.get(self, "restrict_ca_chain_to_issuer")
|
181
196
|
|
182
197
|
@restrict_ca_chain_to_issuer.setter
|
183
|
-
def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[
|
198
|
+
def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
184
199
|
pulumi.set(self, "restrict_ca_chain_to_issuer", value)
|
185
200
|
|
186
201
|
|
187
202
|
@pulumi.input_type
|
188
203
|
class _BackendConfigScepState:
|
189
204
|
def __init__(__self__, *,
|
190
|
-
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
191
|
-
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
205
|
+
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
206
|
+
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
192
207
|
authenticators: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']] = None,
|
193
|
-
backend: Optional[pulumi.Input[
|
194
|
-
default_path_policy: Optional[pulumi.Input[
|
195
|
-
enabled: Optional[pulumi.Input[
|
208
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
209
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
210
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
196
211
|
external_validations: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]] = None,
|
197
|
-
last_updated: Optional[pulumi.Input[
|
198
|
-
|
199
|
-
|
212
|
+
last_updated: Optional[pulumi.Input[_builtins.str]] = None,
|
213
|
+
log_level: Optional[pulumi.Input[_builtins.str]] = None,
|
214
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
215
|
+
restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None):
|
200
216
|
"""
|
201
217
|
Input properties used for looking up and filtering BackendConfigScep resources.
|
202
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
203
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
218
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
|
219
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
|
204
220
|
:param pulumi.Input['BackendConfigScepAuthenticatorsArgs'] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
205
|
-
:param pulumi.Input[
|
221
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
206
222
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
207
|
-
:param pulumi.Input[
|
208
|
-
:param pulumi.Input[
|
223
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
224
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
|
209
225
|
:param pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
210
|
-
:param pulumi.Input[
|
211
|
-
:param pulumi.Input[
|
212
|
-
The value should not contain leading or trailing forward slashes.
|
213
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
214
|
-
*Available only for Vault Enterprise*.
|
215
|
-
:param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
226
|
+
:param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
227
|
+
:param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
|
216
228
|
|
217
229
|
|
218
230
|
<a id="nestedatt--authenticators"></a>
|
231
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
232
|
+
The value should not contain leading or trailing forward slashes.
|
233
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
234
|
+
*Available only for Vault Enterprise*.
|
235
|
+
:param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
219
236
|
"""
|
220
237
|
if allowed_digest_algorithms is not None:
|
221
238
|
pulumi.set(__self__, "allowed_digest_algorithms", allowed_digest_algorithms)
|
@@ -233,36 +250,38 @@ class _BackendConfigScepState:
|
|
233
250
|
pulumi.set(__self__, "external_validations", external_validations)
|
234
251
|
if last_updated is not None:
|
235
252
|
pulumi.set(__self__, "last_updated", last_updated)
|
253
|
+
if log_level is not None:
|
254
|
+
pulumi.set(__self__, "log_level", log_level)
|
236
255
|
if namespace is not None:
|
237
256
|
pulumi.set(__self__, "namespace", namespace)
|
238
257
|
if restrict_ca_chain_to_issuer is not None:
|
239
258
|
pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
|
240
259
|
|
241
|
-
@property
|
260
|
+
@_builtins.property
|
242
261
|
@pulumi.getter(name="allowedDigestAlgorithms")
|
243
|
-
def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
262
|
+
def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
244
263
|
"""
|
245
264
|
List of allowed digest algorithms for SCEP requests.
|
246
265
|
"""
|
247
266
|
return pulumi.get(self, "allowed_digest_algorithms")
|
248
267
|
|
249
268
|
@allowed_digest_algorithms.setter
|
250
|
-
def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
269
|
+
def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
251
270
|
pulumi.set(self, "allowed_digest_algorithms", value)
|
252
271
|
|
253
|
-
@property
|
272
|
+
@_builtins.property
|
254
273
|
@pulumi.getter(name="allowedEncryptionAlgorithms")
|
255
|
-
def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
274
|
+
def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
256
275
|
"""
|
257
276
|
List of allowed encryption algorithms for SCEP requests.
|
258
277
|
"""
|
259
278
|
return pulumi.get(self, "allowed_encryption_algorithms")
|
260
279
|
|
261
280
|
@allowed_encryption_algorithms.setter
|
262
|
-
def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
281
|
+
def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
263
282
|
pulumi.set(self, "allowed_encryption_algorithms", value)
|
264
283
|
|
265
|
-
@property
|
284
|
+
@_builtins.property
|
266
285
|
@pulumi.getter
|
267
286
|
def authenticators(self) -> Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]:
|
268
287
|
"""
|
@@ -274,9 +293,9 @@ class _BackendConfigScepState:
|
|
274
293
|
def authenticators(self, value: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]):
|
275
294
|
pulumi.set(self, "authenticators", value)
|
276
295
|
|
277
|
-
@property
|
296
|
+
@_builtins.property
|
278
297
|
@pulumi.getter
|
279
|
-
def backend(self) -> Optional[pulumi.Input[
|
298
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
280
299
|
"""
|
281
300
|
The path to the PKI secret backend to
|
282
301
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
@@ -284,34 +303,34 @@ class _BackendConfigScepState:
|
|
284
303
|
return pulumi.get(self, "backend")
|
285
304
|
|
286
305
|
@backend.setter
|
287
|
-
def backend(self, value: Optional[pulumi.Input[
|
306
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
288
307
|
pulumi.set(self, "backend", value)
|
289
308
|
|
290
|
-
@property
|
309
|
+
@_builtins.property
|
291
310
|
@pulumi.getter(name="defaultPathPolicy")
|
292
|
-
def default_path_policy(self) -> Optional[pulumi.Input[
|
311
|
+
def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
293
312
|
"""
|
294
313
|
Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
295
314
|
"""
|
296
315
|
return pulumi.get(self, "default_path_policy")
|
297
316
|
|
298
317
|
@default_path_policy.setter
|
299
|
-
def default_path_policy(self, value: Optional[pulumi.Input[
|
318
|
+
def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
300
319
|
pulumi.set(self, "default_path_policy", value)
|
301
320
|
|
302
|
-
@property
|
321
|
+
@_builtins.property
|
303
322
|
@pulumi.getter
|
304
|
-
def enabled(self) -> Optional[pulumi.Input[
|
323
|
+
def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
305
324
|
"""
|
306
325
|
Specifies whether SCEP is enabled.
|
307
326
|
"""
|
308
327
|
return pulumi.get(self, "enabled")
|
309
328
|
|
310
329
|
@enabled.setter
|
311
|
-
def enabled(self, value: Optional[pulumi.Input[
|
330
|
+
def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
312
331
|
pulumi.set(self, "enabled", value)
|
313
332
|
|
314
|
-
@property
|
333
|
+
@_builtins.property
|
315
334
|
@pulumi.getter(name="externalValidations")
|
316
335
|
def external_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]:
|
317
336
|
"""
|
@@ -323,21 +342,36 @@ class _BackendConfigScepState:
|
|
323
342
|
def external_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]):
|
324
343
|
pulumi.set(self, "external_validations", value)
|
325
344
|
|
326
|
-
@property
|
345
|
+
@_builtins.property
|
327
346
|
@pulumi.getter(name="lastUpdated")
|
328
|
-
def last_updated(self) -> Optional[pulumi.Input[
|
347
|
+
def last_updated(self) -> Optional[pulumi.Input[_builtins.str]]:
|
329
348
|
"""
|
330
349
|
A read-only timestamp representing the last time the configuration was updated.
|
331
350
|
"""
|
332
351
|
return pulumi.get(self, "last_updated")
|
333
352
|
|
334
353
|
@last_updated.setter
|
335
|
-
def last_updated(self, value: Optional[pulumi.Input[
|
354
|
+
def last_updated(self, value: Optional[pulumi.Input[_builtins.str]]):
|
336
355
|
pulumi.set(self, "last_updated", value)
|
337
356
|
|
338
|
-
@property
|
357
|
+
@_builtins.property
|
358
|
+
@pulumi.getter(name="logLevel")
|
359
|
+
def log_level(self) -> Optional[pulumi.Input[_builtins.str]]:
|
360
|
+
"""
|
361
|
+
The level of logging verbosity, affects only SCEP logs on this mount.
|
362
|
+
|
363
|
+
|
364
|
+
<a id="nestedatt--authenticators"></a>
|
365
|
+
"""
|
366
|
+
return pulumi.get(self, "log_level")
|
367
|
+
|
368
|
+
@log_level.setter
|
369
|
+
def log_level(self, value: Optional[pulumi.Input[_builtins.str]]):
|
370
|
+
pulumi.set(self, "log_level", value)
|
371
|
+
|
372
|
+
@_builtins.property
|
339
373
|
@pulumi.getter
|
340
|
-
def namespace(self) -> Optional[pulumi.Input[
|
374
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
341
375
|
"""
|
342
376
|
The namespace of the target resource.
|
343
377
|
The value should not contain leading or trailing forward slashes.
|
@@ -347,22 +381,19 @@ class _BackendConfigScepState:
|
|
347
381
|
return pulumi.get(self, "namespace")
|
348
382
|
|
349
383
|
@namespace.setter
|
350
|
-
def namespace(self, value: Optional[pulumi.Input[
|
384
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
351
385
|
pulumi.set(self, "namespace", value)
|
352
386
|
|
353
|
-
@property
|
387
|
+
@_builtins.property
|
354
388
|
@pulumi.getter(name="restrictCaChainToIssuer")
|
355
|
-
def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[
|
389
|
+
def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
356
390
|
"""
|
357
391
|
If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
358
|
-
|
359
|
-
|
360
|
-
<a id="nestedatt--authenticators"></a>
|
361
392
|
"""
|
362
393
|
return pulumi.get(self, "restrict_ca_chain_to_issuer")
|
363
394
|
|
364
395
|
@restrict_ca_chain_to_issuer.setter
|
365
|
-
def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[
|
396
|
+
def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
366
397
|
pulumi.set(self, "restrict_ca_chain_to_issuer", value)
|
367
398
|
|
368
399
|
|
@@ -372,15 +403,16 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
372
403
|
def __init__(__self__,
|
373
404
|
resource_name: str,
|
374
405
|
opts: Optional[pulumi.ResourceOptions] = None,
|
375
|
-
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
376
|
-
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
406
|
+
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
407
|
+
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
377
408
|
authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
|
378
|
-
backend: Optional[pulumi.Input[
|
379
|
-
default_path_policy: Optional[pulumi.Input[
|
380
|
-
enabled: Optional[pulumi.Input[
|
409
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
410
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
411
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
381
412
|
external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
|
382
|
-
|
383
|
-
|
413
|
+
log_level: Optional[pulumi.Input[_builtins.str]] = None,
|
414
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
415
|
+
restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None,
|
384
416
|
__props__=None):
|
385
417
|
"""
|
386
418
|
Allows setting the SCEP configuration on a PKI Secret Backend.
|
@@ -404,7 +436,7 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
404
436
|
path="pki_scep",
|
405
437
|
type="pki",
|
406
438
|
description="PKI secret engine mount")
|
407
|
-
test = vault.
|
439
|
+
test = vault.pkisecret.BackendConfigScep("test",
|
408
440
|
backend=pki.path,
|
409
441
|
enabled=True,
|
410
442
|
default_path_policy="sign-verbatim",
|
@@ -429,22 +461,23 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
429
461
|
|
430
462
|
:param str resource_name: The name of the resource.
|
431
463
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
432
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
433
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
464
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
|
465
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
|
434
466
|
:param pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
435
|
-
:param pulumi.Input[
|
467
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
436
468
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
437
|
-
:param pulumi.Input[
|
438
|
-
:param pulumi.Input[
|
469
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
470
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
|
439
471
|
:param pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
440
|
-
:param pulumi.Input[
|
441
|
-
The value should not contain leading or trailing forward slashes.
|
442
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
443
|
-
*Available only for Vault Enterprise*.
|
444
|
-
:param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
472
|
+
:param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
|
445
473
|
|
446
474
|
|
447
475
|
<a id="nestedatt--authenticators"></a>
|
476
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
477
|
+
The value should not contain leading or trailing forward slashes.
|
478
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
479
|
+
*Available only for Vault Enterprise*.
|
480
|
+
:param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
448
481
|
"""
|
449
482
|
...
|
450
483
|
@overload
|
@@ -474,7 +507,7 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
474
507
|
path="pki_scep",
|
475
508
|
type="pki",
|
476
509
|
description="PKI secret engine mount")
|
477
|
-
test = vault.
|
510
|
+
test = vault.pkisecret.BackendConfigScep("test",
|
478
511
|
backend=pki.path,
|
479
512
|
enabled=True,
|
480
513
|
default_path_policy="sign-verbatim",
|
@@ -512,15 +545,16 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
512
545
|
def _internal_init(__self__,
|
513
546
|
resource_name: str,
|
514
547
|
opts: Optional[pulumi.ResourceOptions] = None,
|
515
|
-
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
516
|
-
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
548
|
+
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
549
|
+
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
517
550
|
authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
|
518
|
-
backend: Optional[pulumi.Input[
|
519
|
-
default_path_policy: Optional[pulumi.Input[
|
520
|
-
enabled: Optional[pulumi.Input[
|
551
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
552
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
553
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
521
554
|
external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
|
522
|
-
|
523
|
-
|
555
|
+
log_level: Optional[pulumi.Input[_builtins.str]] = None,
|
556
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
557
|
+
restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None,
|
524
558
|
__props__=None):
|
525
559
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
526
560
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -539,6 +573,7 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
539
573
|
__props__.__dict__["default_path_policy"] = default_path_policy
|
540
574
|
__props__.__dict__["enabled"] = enabled
|
541
575
|
__props__.__dict__["external_validations"] = external_validations
|
576
|
+
__props__.__dict__["log_level"] = log_level
|
542
577
|
__props__.__dict__["namespace"] = namespace
|
543
578
|
__props__.__dict__["restrict_ca_chain_to_issuer"] = restrict_ca_chain_to_issuer
|
544
579
|
__props__.__dict__["last_updated"] = None
|
@@ -552,16 +587,17 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
552
587
|
def get(resource_name: str,
|
553
588
|
id: pulumi.Input[str],
|
554
589
|
opts: Optional[pulumi.ResourceOptions] = None,
|
555
|
-
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
556
|
-
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
590
|
+
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
591
|
+
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
557
592
|
authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
|
558
|
-
backend: Optional[pulumi.Input[
|
559
|
-
default_path_policy: Optional[pulumi.Input[
|
560
|
-
enabled: Optional[pulumi.Input[
|
593
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
594
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
595
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
561
596
|
external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
|
562
|
-
last_updated: Optional[pulumi.Input[
|
563
|
-
|
564
|
-
|
597
|
+
last_updated: Optional[pulumi.Input[_builtins.str]] = None,
|
598
|
+
log_level: Optional[pulumi.Input[_builtins.str]] = None,
|
599
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
600
|
+
restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None) -> 'BackendConfigScep':
|
565
601
|
"""
|
566
602
|
Get an existing BackendConfigScep resource's state with the given name, id, and optional extra
|
567
603
|
properties used to qualify the lookup.
|
@@ -569,23 +605,24 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
569
605
|
:param str resource_name: The unique name of the resulting resource.
|
570
606
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
571
607
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
572
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
573
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
608
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
|
609
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
|
574
610
|
:param pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
575
|
-
:param pulumi.Input[
|
611
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
576
612
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
577
|
-
:param pulumi.Input[
|
578
|
-
:param pulumi.Input[
|
613
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
614
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
|
579
615
|
:param pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
580
|
-
:param pulumi.Input[
|
581
|
-
:param pulumi.Input[
|
582
|
-
The value should not contain leading or trailing forward slashes.
|
583
|
-
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
584
|
-
*Available only for Vault Enterprise*.
|
585
|
-
:param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
616
|
+
:param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
617
|
+
:param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
|
586
618
|
|
587
619
|
|
588
620
|
<a id="nestedatt--authenticators"></a>
|
621
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
622
|
+
The value should not contain leading or trailing forward slashes.
|
623
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
624
|
+
*Available only for Vault Enterprise*.
|
625
|
+
:param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
589
626
|
"""
|
590
627
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
591
628
|
|
@@ -599,27 +636,28 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
599
636
|
__props__.__dict__["enabled"] = enabled
|
600
637
|
__props__.__dict__["external_validations"] = external_validations
|
601
638
|
__props__.__dict__["last_updated"] = last_updated
|
639
|
+
__props__.__dict__["log_level"] = log_level
|
602
640
|
__props__.__dict__["namespace"] = namespace
|
603
641
|
__props__.__dict__["restrict_ca_chain_to_issuer"] = restrict_ca_chain_to_issuer
|
604
642
|
return BackendConfigScep(resource_name, opts=opts, __props__=__props__)
|
605
643
|
|
606
|
-
@property
|
644
|
+
@_builtins.property
|
607
645
|
@pulumi.getter(name="allowedDigestAlgorithms")
|
608
|
-
def allowed_digest_algorithms(self) -> pulumi.Output[Sequence[
|
646
|
+
def allowed_digest_algorithms(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
609
647
|
"""
|
610
648
|
List of allowed digest algorithms for SCEP requests.
|
611
649
|
"""
|
612
650
|
return pulumi.get(self, "allowed_digest_algorithms")
|
613
651
|
|
614
|
-
@property
|
652
|
+
@_builtins.property
|
615
653
|
@pulumi.getter(name="allowedEncryptionAlgorithms")
|
616
|
-
def allowed_encryption_algorithms(self) -> pulumi.Output[Sequence[
|
654
|
+
def allowed_encryption_algorithms(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
617
655
|
"""
|
618
656
|
List of allowed encryption algorithms for SCEP requests.
|
619
657
|
"""
|
620
658
|
return pulumi.get(self, "allowed_encryption_algorithms")
|
621
659
|
|
622
|
-
@property
|
660
|
+
@_builtins.property
|
623
661
|
@pulumi.getter
|
624
662
|
def authenticators(self) -> pulumi.Output['outputs.BackendConfigScepAuthenticators']:
|
625
663
|
"""
|
@@ -627,32 +665,32 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
627
665
|
"""
|
628
666
|
return pulumi.get(self, "authenticators")
|
629
667
|
|
630
|
-
@property
|
668
|
+
@_builtins.property
|
631
669
|
@pulumi.getter
|
632
|
-
def backend(self) -> pulumi.Output[
|
670
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
633
671
|
"""
|
634
672
|
The path to the PKI secret backend to
|
635
673
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
636
674
|
"""
|
637
675
|
return pulumi.get(self, "backend")
|
638
676
|
|
639
|
-
@property
|
677
|
+
@_builtins.property
|
640
678
|
@pulumi.getter(name="defaultPathPolicy")
|
641
|
-
def default_path_policy(self) -> pulumi.Output[Optional[
|
679
|
+
def default_path_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
|
642
680
|
"""
|
643
681
|
Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
644
682
|
"""
|
645
683
|
return pulumi.get(self, "default_path_policy")
|
646
684
|
|
647
|
-
@property
|
685
|
+
@_builtins.property
|
648
686
|
@pulumi.getter
|
649
|
-
def enabled(self) -> pulumi.Output[Optional[
|
687
|
+
def enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
650
688
|
"""
|
651
689
|
Specifies whether SCEP is enabled.
|
652
690
|
"""
|
653
691
|
return pulumi.get(self, "enabled")
|
654
692
|
|
655
|
-
@property
|
693
|
+
@_builtins.property
|
656
694
|
@pulumi.getter(name="externalValidations")
|
657
695
|
def external_validations(self) -> pulumi.Output[Sequence['outputs.BackendConfigScepExternalValidation']]:
|
658
696
|
"""
|
@@ -660,17 +698,28 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
660
698
|
"""
|
661
699
|
return pulumi.get(self, "external_validations")
|
662
700
|
|
663
|
-
@property
|
701
|
+
@_builtins.property
|
664
702
|
@pulumi.getter(name="lastUpdated")
|
665
|
-
def last_updated(self) -> pulumi.Output[
|
703
|
+
def last_updated(self) -> pulumi.Output[_builtins.str]:
|
666
704
|
"""
|
667
705
|
A read-only timestamp representing the last time the configuration was updated.
|
668
706
|
"""
|
669
707
|
return pulumi.get(self, "last_updated")
|
670
708
|
|
671
|
-
@property
|
709
|
+
@_builtins.property
|
710
|
+
@pulumi.getter(name="logLevel")
|
711
|
+
def log_level(self) -> pulumi.Output[_builtins.str]:
|
712
|
+
"""
|
713
|
+
The level of logging verbosity, affects only SCEP logs on this mount.
|
714
|
+
|
715
|
+
|
716
|
+
<a id="nestedatt--authenticators"></a>
|
717
|
+
"""
|
718
|
+
return pulumi.get(self, "log_level")
|
719
|
+
|
720
|
+
@_builtins.property
|
672
721
|
@pulumi.getter
|
673
|
-
def namespace(self) -> pulumi.Output[Optional[
|
722
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
674
723
|
"""
|
675
724
|
The namespace of the target resource.
|
676
725
|
The value should not contain leading or trailing forward slashes.
|
@@ -679,14 +728,11 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
679
728
|
"""
|
680
729
|
return pulumi.get(self, "namespace")
|
681
730
|
|
682
|
-
@property
|
731
|
+
@_builtins.property
|
683
732
|
@pulumi.getter(name="restrictCaChainToIssuer")
|
684
|
-
def restrict_ca_chain_to_issuer(self) -> pulumi.Output[Optional[
|
733
|
+
def restrict_ca_chain_to_issuer(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
685
734
|
"""
|
686
735
|
If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
687
|
-
|
688
|
-
|
689
|
-
<a id="nestedatt--authenticators"></a>
|
690
736
|
"""
|
691
737
|
return pulumi.get(self, "restrict_ca_chain_to_issuer")
|
692
738
|
|