pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,30 +21,30 @@ __all__ = ['BackendConfigScepArgs', 'BackendConfigScep']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class BackendConfigScepArgs:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
backend: pulumi.Input[
|
26
|
-
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
27
|
-
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
24
|
+
backend: pulumi.Input[_builtins.str],
|
25
|
+
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
26
|
+
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
28
27
|
authenticators: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']] = None,
|
29
|
-
default_path_policy: Optional[pulumi.Input[
|
30
|
-
enabled: Optional[pulumi.Input[
|
28
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
29
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
30
|
external_validations: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]] = None,
|
32
|
-
namespace: Optional[pulumi.Input[
|
33
|
-
restrict_ca_chain_to_issuer: Optional[pulumi.Input[
|
31
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
32
|
+
restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None):
|
34
33
|
"""
|
35
34
|
The set of arguments for constructing a BackendConfigScep resource.
|
36
|
-
:param pulumi.Input[
|
35
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
37
36
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
38
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
39
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
37
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
|
38
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
|
40
39
|
:param pulumi.Input['BackendConfigScepAuthenticatorsArgs'] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
41
|
-
:param pulumi.Input[
|
42
|
-
:param pulumi.Input[
|
40
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
41
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
|
43
42
|
:param pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
45
44
|
The value should not contain leading or trailing forward slashes.
|
46
45
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
47
46
|
*Available only for Vault Enterprise*.
|
48
|
-
:param pulumi.Input[
|
47
|
+
:param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
49
48
|
|
50
49
|
|
51
50
|
<a id="nestedatt--authenticators"></a>
|
@@ -68,9 +67,9 @@ class BackendConfigScepArgs:
|
|
68
67
|
if restrict_ca_chain_to_issuer is not None:
|
69
68
|
pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter
|
73
|
-
def backend(self) -> pulumi.Input[
|
72
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
74
73
|
"""
|
75
74
|
The path to the PKI secret backend to
|
76
75
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
@@ -78,34 +77,34 @@ class BackendConfigScepArgs:
|
|
78
77
|
return pulumi.get(self, "backend")
|
79
78
|
|
80
79
|
@backend.setter
|
81
|
-
def backend(self, value: pulumi.Input[
|
80
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
82
81
|
pulumi.set(self, "backend", value)
|
83
82
|
|
84
|
-
@property
|
83
|
+
@_builtins.property
|
85
84
|
@pulumi.getter(name="allowedDigestAlgorithms")
|
86
|
-
def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
85
|
+
def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
87
86
|
"""
|
88
87
|
List of allowed digest algorithms for SCEP requests.
|
89
88
|
"""
|
90
89
|
return pulumi.get(self, "allowed_digest_algorithms")
|
91
90
|
|
92
91
|
@allowed_digest_algorithms.setter
|
93
|
-
def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
92
|
+
def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
94
93
|
pulumi.set(self, "allowed_digest_algorithms", value)
|
95
94
|
|
96
|
-
@property
|
95
|
+
@_builtins.property
|
97
96
|
@pulumi.getter(name="allowedEncryptionAlgorithms")
|
98
|
-
def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
97
|
+
def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
99
98
|
"""
|
100
99
|
List of allowed encryption algorithms for SCEP requests.
|
101
100
|
"""
|
102
101
|
return pulumi.get(self, "allowed_encryption_algorithms")
|
103
102
|
|
104
103
|
@allowed_encryption_algorithms.setter
|
105
|
-
def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
104
|
+
def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
106
105
|
pulumi.set(self, "allowed_encryption_algorithms", value)
|
107
106
|
|
108
|
-
@property
|
107
|
+
@_builtins.property
|
109
108
|
@pulumi.getter
|
110
109
|
def authenticators(self) -> Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]:
|
111
110
|
"""
|
@@ -117,31 +116,31 @@ class BackendConfigScepArgs:
|
|
117
116
|
def authenticators(self, value: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]):
|
118
117
|
pulumi.set(self, "authenticators", value)
|
119
118
|
|
120
|
-
@property
|
119
|
+
@_builtins.property
|
121
120
|
@pulumi.getter(name="defaultPathPolicy")
|
122
|
-
def default_path_policy(self) -> Optional[pulumi.Input[
|
121
|
+
def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
123
122
|
"""
|
124
123
|
Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
125
124
|
"""
|
126
125
|
return pulumi.get(self, "default_path_policy")
|
127
126
|
|
128
127
|
@default_path_policy.setter
|
129
|
-
def default_path_policy(self, value: Optional[pulumi.Input[
|
128
|
+
def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
130
129
|
pulumi.set(self, "default_path_policy", value)
|
131
130
|
|
132
|
-
@property
|
131
|
+
@_builtins.property
|
133
132
|
@pulumi.getter
|
134
|
-
def enabled(self) -> Optional[pulumi.Input[
|
133
|
+
def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
135
134
|
"""
|
136
135
|
Specifies whether SCEP is enabled.
|
137
136
|
"""
|
138
137
|
return pulumi.get(self, "enabled")
|
139
138
|
|
140
139
|
@enabled.setter
|
141
|
-
def enabled(self, value: Optional[pulumi.Input[
|
140
|
+
def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
142
141
|
pulumi.set(self, "enabled", value)
|
143
142
|
|
144
|
-
@property
|
143
|
+
@_builtins.property
|
145
144
|
@pulumi.getter(name="externalValidations")
|
146
145
|
def external_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]:
|
147
146
|
"""
|
@@ -153,9 +152,9 @@ class BackendConfigScepArgs:
|
|
153
152
|
def external_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]):
|
154
153
|
pulumi.set(self, "external_validations", value)
|
155
154
|
|
156
|
-
@property
|
155
|
+
@_builtins.property
|
157
156
|
@pulumi.getter
|
158
|
-
def namespace(self) -> Optional[pulumi.Input[
|
157
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
159
158
|
"""
|
160
159
|
The namespace of the target resource.
|
161
160
|
The value should not contain leading or trailing forward slashes.
|
@@ -165,12 +164,12 @@ class BackendConfigScepArgs:
|
|
165
164
|
return pulumi.get(self, "namespace")
|
166
165
|
|
167
166
|
@namespace.setter
|
168
|
-
def namespace(self, value: Optional[pulumi.Input[
|
167
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
169
168
|
pulumi.set(self, "namespace", value)
|
170
169
|
|
171
|
-
@property
|
170
|
+
@_builtins.property
|
172
171
|
@pulumi.getter(name="restrictCaChainToIssuer")
|
173
|
-
def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[
|
172
|
+
def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
174
173
|
"""
|
175
174
|
If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
176
175
|
|
@@ -180,39 +179,39 @@ class BackendConfigScepArgs:
|
|
180
179
|
return pulumi.get(self, "restrict_ca_chain_to_issuer")
|
181
180
|
|
182
181
|
@restrict_ca_chain_to_issuer.setter
|
183
|
-
def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[
|
182
|
+
def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
184
183
|
pulumi.set(self, "restrict_ca_chain_to_issuer", value)
|
185
184
|
|
186
185
|
|
187
186
|
@pulumi.input_type
|
188
187
|
class _BackendConfigScepState:
|
189
188
|
def __init__(__self__, *,
|
190
|
-
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
191
|
-
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
189
|
+
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
190
|
+
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
192
191
|
authenticators: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']] = None,
|
193
|
-
backend: Optional[pulumi.Input[
|
194
|
-
default_path_policy: Optional[pulumi.Input[
|
195
|
-
enabled: Optional[pulumi.Input[
|
192
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
193
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
194
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
196
195
|
external_validations: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]] = None,
|
197
|
-
last_updated: Optional[pulumi.Input[
|
198
|
-
namespace: Optional[pulumi.Input[
|
199
|
-
restrict_ca_chain_to_issuer: Optional[pulumi.Input[
|
196
|
+
last_updated: Optional[pulumi.Input[_builtins.str]] = None,
|
197
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
198
|
+
restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None):
|
200
199
|
"""
|
201
200
|
Input properties used for looking up and filtering BackendConfigScep resources.
|
202
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
203
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
201
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
|
202
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
|
204
203
|
:param pulumi.Input['BackendConfigScepAuthenticatorsArgs'] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
205
|
-
:param pulumi.Input[
|
204
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
206
205
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
207
|
-
:param pulumi.Input[
|
208
|
-
:param pulumi.Input[
|
206
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
207
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
|
209
208
|
:param pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
210
|
-
:param pulumi.Input[
|
211
|
-
:param pulumi.Input[
|
209
|
+
:param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
210
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
212
211
|
The value should not contain leading or trailing forward slashes.
|
213
212
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
214
213
|
*Available only for Vault Enterprise*.
|
215
|
-
:param pulumi.Input[
|
214
|
+
:param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
216
215
|
|
217
216
|
|
218
217
|
<a id="nestedatt--authenticators"></a>
|
@@ -238,31 +237,31 @@ class _BackendConfigScepState:
|
|
238
237
|
if restrict_ca_chain_to_issuer is not None:
|
239
238
|
pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
|
240
239
|
|
241
|
-
@property
|
240
|
+
@_builtins.property
|
242
241
|
@pulumi.getter(name="allowedDigestAlgorithms")
|
243
|
-
def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
242
|
+
def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
244
243
|
"""
|
245
244
|
List of allowed digest algorithms for SCEP requests.
|
246
245
|
"""
|
247
246
|
return pulumi.get(self, "allowed_digest_algorithms")
|
248
247
|
|
249
248
|
@allowed_digest_algorithms.setter
|
250
|
-
def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
249
|
+
def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
251
250
|
pulumi.set(self, "allowed_digest_algorithms", value)
|
252
251
|
|
253
|
-
@property
|
252
|
+
@_builtins.property
|
254
253
|
@pulumi.getter(name="allowedEncryptionAlgorithms")
|
255
|
-
def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
254
|
+
def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
256
255
|
"""
|
257
256
|
List of allowed encryption algorithms for SCEP requests.
|
258
257
|
"""
|
259
258
|
return pulumi.get(self, "allowed_encryption_algorithms")
|
260
259
|
|
261
260
|
@allowed_encryption_algorithms.setter
|
262
|
-
def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
261
|
+
def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
263
262
|
pulumi.set(self, "allowed_encryption_algorithms", value)
|
264
263
|
|
265
|
-
@property
|
264
|
+
@_builtins.property
|
266
265
|
@pulumi.getter
|
267
266
|
def authenticators(self) -> Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]:
|
268
267
|
"""
|
@@ -274,9 +273,9 @@ class _BackendConfigScepState:
|
|
274
273
|
def authenticators(self, value: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]):
|
275
274
|
pulumi.set(self, "authenticators", value)
|
276
275
|
|
277
|
-
@property
|
276
|
+
@_builtins.property
|
278
277
|
@pulumi.getter
|
279
|
-
def backend(self) -> Optional[pulumi.Input[
|
278
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
280
279
|
"""
|
281
280
|
The path to the PKI secret backend to
|
282
281
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
@@ -284,34 +283,34 @@ class _BackendConfigScepState:
|
|
284
283
|
return pulumi.get(self, "backend")
|
285
284
|
|
286
285
|
@backend.setter
|
287
|
-
def backend(self, value: Optional[pulumi.Input[
|
286
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
288
287
|
pulumi.set(self, "backend", value)
|
289
288
|
|
290
|
-
@property
|
289
|
+
@_builtins.property
|
291
290
|
@pulumi.getter(name="defaultPathPolicy")
|
292
|
-
def default_path_policy(self) -> Optional[pulumi.Input[
|
291
|
+
def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
293
292
|
"""
|
294
293
|
Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
295
294
|
"""
|
296
295
|
return pulumi.get(self, "default_path_policy")
|
297
296
|
|
298
297
|
@default_path_policy.setter
|
299
|
-
def default_path_policy(self, value: Optional[pulumi.Input[
|
298
|
+
def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
300
299
|
pulumi.set(self, "default_path_policy", value)
|
301
300
|
|
302
|
-
@property
|
301
|
+
@_builtins.property
|
303
302
|
@pulumi.getter
|
304
|
-
def enabled(self) -> Optional[pulumi.Input[
|
303
|
+
def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
305
304
|
"""
|
306
305
|
Specifies whether SCEP is enabled.
|
307
306
|
"""
|
308
307
|
return pulumi.get(self, "enabled")
|
309
308
|
|
310
309
|
@enabled.setter
|
311
|
-
def enabled(self, value: Optional[pulumi.Input[
|
310
|
+
def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
312
311
|
pulumi.set(self, "enabled", value)
|
313
312
|
|
314
|
-
@property
|
313
|
+
@_builtins.property
|
315
314
|
@pulumi.getter(name="externalValidations")
|
316
315
|
def external_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]:
|
317
316
|
"""
|
@@ -323,21 +322,21 @@ class _BackendConfigScepState:
|
|
323
322
|
def external_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]):
|
324
323
|
pulumi.set(self, "external_validations", value)
|
325
324
|
|
326
|
-
@property
|
325
|
+
@_builtins.property
|
327
326
|
@pulumi.getter(name="lastUpdated")
|
328
|
-
def last_updated(self) -> Optional[pulumi.Input[
|
327
|
+
def last_updated(self) -> Optional[pulumi.Input[_builtins.str]]:
|
329
328
|
"""
|
330
329
|
A read-only timestamp representing the last time the configuration was updated.
|
331
330
|
"""
|
332
331
|
return pulumi.get(self, "last_updated")
|
333
332
|
|
334
333
|
@last_updated.setter
|
335
|
-
def last_updated(self, value: Optional[pulumi.Input[
|
334
|
+
def last_updated(self, value: Optional[pulumi.Input[_builtins.str]]):
|
336
335
|
pulumi.set(self, "last_updated", value)
|
337
336
|
|
338
|
-
@property
|
337
|
+
@_builtins.property
|
339
338
|
@pulumi.getter
|
340
|
-
def namespace(self) -> Optional[pulumi.Input[
|
339
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
341
340
|
"""
|
342
341
|
The namespace of the target resource.
|
343
342
|
The value should not contain leading or trailing forward slashes.
|
@@ -347,12 +346,12 @@ class _BackendConfigScepState:
|
|
347
346
|
return pulumi.get(self, "namespace")
|
348
347
|
|
349
348
|
@namespace.setter
|
350
|
-
def namespace(self, value: Optional[pulumi.Input[
|
349
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
351
350
|
pulumi.set(self, "namespace", value)
|
352
351
|
|
353
|
-
@property
|
352
|
+
@_builtins.property
|
354
353
|
@pulumi.getter(name="restrictCaChainToIssuer")
|
355
|
-
def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[
|
354
|
+
def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
356
355
|
"""
|
357
356
|
If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
358
357
|
|
@@ -362,7 +361,7 @@ class _BackendConfigScepState:
|
|
362
361
|
return pulumi.get(self, "restrict_ca_chain_to_issuer")
|
363
362
|
|
364
363
|
@restrict_ca_chain_to_issuer.setter
|
365
|
-
def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[
|
364
|
+
def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
366
365
|
pulumi.set(self, "restrict_ca_chain_to_issuer", value)
|
367
366
|
|
368
367
|
|
@@ -372,15 +371,15 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
372
371
|
def __init__(__self__,
|
373
372
|
resource_name: str,
|
374
373
|
opts: Optional[pulumi.ResourceOptions] = None,
|
375
|
-
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
376
|
-
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
374
|
+
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
375
|
+
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
377
376
|
authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
|
378
|
-
backend: Optional[pulumi.Input[
|
379
|
-
default_path_policy: Optional[pulumi.Input[
|
380
|
-
enabled: Optional[pulumi.Input[
|
377
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
378
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
379
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
381
380
|
external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
|
382
|
-
namespace: Optional[pulumi.Input[
|
383
|
-
restrict_ca_chain_to_issuer: Optional[pulumi.Input[
|
381
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
382
|
+
restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None,
|
384
383
|
__props__=None):
|
385
384
|
"""
|
386
385
|
Allows setting the SCEP configuration on a PKI Secret Backend.
|
@@ -404,7 +403,7 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
404
403
|
path="pki_scep",
|
405
404
|
type="pki",
|
406
405
|
description="PKI secret engine mount")
|
407
|
-
test = vault.
|
406
|
+
test = vault.pkisecret.BackendConfigScep("test",
|
408
407
|
backend=pki.path,
|
409
408
|
enabled=True,
|
410
409
|
default_path_policy="sign-verbatim",
|
@@ -429,19 +428,19 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
429
428
|
|
430
429
|
:param str resource_name: The name of the resource.
|
431
430
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
432
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
433
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
431
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
|
432
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
|
434
433
|
:param pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
435
|
-
:param pulumi.Input[
|
434
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
436
435
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
437
|
-
:param pulumi.Input[
|
438
|
-
:param pulumi.Input[
|
436
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
437
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
|
439
438
|
:param pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
440
|
-
:param pulumi.Input[
|
439
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
441
440
|
The value should not contain leading or trailing forward slashes.
|
442
441
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
443
442
|
*Available only for Vault Enterprise*.
|
444
|
-
:param pulumi.Input[
|
443
|
+
:param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
445
444
|
|
446
445
|
|
447
446
|
<a id="nestedatt--authenticators"></a>
|
@@ -474,7 +473,7 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
474
473
|
path="pki_scep",
|
475
474
|
type="pki",
|
476
475
|
description="PKI secret engine mount")
|
477
|
-
test = vault.
|
476
|
+
test = vault.pkisecret.BackendConfigScep("test",
|
478
477
|
backend=pki.path,
|
479
478
|
enabled=True,
|
480
479
|
default_path_policy="sign-verbatim",
|
@@ -512,15 +511,15 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
512
511
|
def _internal_init(__self__,
|
513
512
|
resource_name: str,
|
514
513
|
opts: Optional[pulumi.ResourceOptions] = None,
|
515
|
-
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
516
|
-
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
514
|
+
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
515
|
+
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
517
516
|
authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
|
518
|
-
backend: Optional[pulumi.Input[
|
519
|
-
default_path_policy: Optional[pulumi.Input[
|
520
|
-
enabled: Optional[pulumi.Input[
|
517
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
518
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
519
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
521
520
|
external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
|
522
|
-
namespace: Optional[pulumi.Input[
|
523
|
-
restrict_ca_chain_to_issuer: Optional[pulumi.Input[
|
521
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
522
|
+
restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None,
|
524
523
|
__props__=None):
|
525
524
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
526
525
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -552,16 +551,16 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
552
551
|
def get(resource_name: str,
|
553
552
|
id: pulumi.Input[str],
|
554
553
|
opts: Optional[pulumi.ResourceOptions] = None,
|
555
|
-
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
556
|
-
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[
|
554
|
+
allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
555
|
+
allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
557
556
|
authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
|
558
|
-
backend: Optional[pulumi.Input[
|
559
|
-
default_path_policy: Optional[pulumi.Input[
|
560
|
-
enabled: Optional[pulumi.Input[
|
557
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
558
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
559
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
561
560
|
external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
|
562
|
-
last_updated: Optional[pulumi.Input[
|
563
|
-
namespace: Optional[pulumi.Input[
|
564
|
-
restrict_ca_chain_to_issuer: Optional[pulumi.Input[
|
561
|
+
last_updated: Optional[pulumi.Input[_builtins.str]] = None,
|
562
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
563
|
+
restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None) -> 'BackendConfigScep':
|
565
564
|
"""
|
566
565
|
Get an existing BackendConfigScep resource's state with the given name, id, and optional extra
|
567
566
|
properties used to qualify the lookup.
|
@@ -569,20 +568,20 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
569
568
|
:param str resource_name: The unique name of the resulting resource.
|
570
569
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
571
570
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
572
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
573
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
571
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
|
572
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
|
574
573
|
:param pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
|
575
|
-
:param pulumi.Input[
|
574
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
576
575
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
577
|
-
:param pulumi.Input[
|
578
|
-
:param pulumi.Input[
|
576
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
577
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
|
579
578
|
:param pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
|
580
|
-
:param pulumi.Input[
|
581
|
-
:param pulumi.Input[
|
579
|
+
:param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
580
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
582
581
|
The value should not contain leading or trailing forward slashes.
|
583
582
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
584
583
|
*Available only for Vault Enterprise*.
|
585
|
-
:param pulumi.Input[
|
584
|
+
:param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
586
585
|
|
587
586
|
|
588
587
|
<a id="nestedatt--authenticators"></a>
|
@@ -603,23 +602,23 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
603
602
|
__props__.__dict__["restrict_ca_chain_to_issuer"] = restrict_ca_chain_to_issuer
|
604
603
|
return BackendConfigScep(resource_name, opts=opts, __props__=__props__)
|
605
604
|
|
606
|
-
@property
|
605
|
+
@_builtins.property
|
607
606
|
@pulumi.getter(name="allowedDigestAlgorithms")
|
608
|
-
def allowed_digest_algorithms(self) -> pulumi.Output[Sequence[
|
607
|
+
def allowed_digest_algorithms(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
609
608
|
"""
|
610
609
|
List of allowed digest algorithms for SCEP requests.
|
611
610
|
"""
|
612
611
|
return pulumi.get(self, "allowed_digest_algorithms")
|
613
612
|
|
614
|
-
@property
|
613
|
+
@_builtins.property
|
615
614
|
@pulumi.getter(name="allowedEncryptionAlgorithms")
|
616
|
-
def allowed_encryption_algorithms(self) -> pulumi.Output[Sequence[
|
615
|
+
def allowed_encryption_algorithms(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
617
616
|
"""
|
618
617
|
List of allowed encryption algorithms for SCEP requests.
|
619
618
|
"""
|
620
619
|
return pulumi.get(self, "allowed_encryption_algorithms")
|
621
620
|
|
622
|
-
@property
|
621
|
+
@_builtins.property
|
623
622
|
@pulumi.getter
|
624
623
|
def authenticators(self) -> pulumi.Output['outputs.BackendConfigScepAuthenticators']:
|
625
624
|
"""
|
@@ -627,32 +626,32 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
627
626
|
"""
|
628
627
|
return pulumi.get(self, "authenticators")
|
629
628
|
|
630
|
-
@property
|
629
|
+
@_builtins.property
|
631
630
|
@pulumi.getter
|
632
|
-
def backend(self) -> pulumi.Output[
|
631
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
633
632
|
"""
|
634
633
|
The path to the PKI secret backend to
|
635
634
|
read the SCEP configuration from, with no leading or trailing `/`s.
|
636
635
|
"""
|
637
636
|
return pulumi.get(self, "backend")
|
638
637
|
|
639
|
-
@property
|
638
|
+
@_builtins.property
|
640
639
|
@pulumi.getter(name="defaultPathPolicy")
|
641
|
-
def default_path_policy(self) -> pulumi.Output[Optional[
|
640
|
+
def default_path_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
|
642
641
|
"""
|
643
642
|
Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
|
644
643
|
"""
|
645
644
|
return pulumi.get(self, "default_path_policy")
|
646
645
|
|
647
|
-
@property
|
646
|
+
@_builtins.property
|
648
647
|
@pulumi.getter
|
649
|
-
def enabled(self) -> pulumi.Output[Optional[
|
648
|
+
def enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
650
649
|
"""
|
651
650
|
Specifies whether SCEP is enabled.
|
652
651
|
"""
|
653
652
|
return pulumi.get(self, "enabled")
|
654
653
|
|
655
|
-
@property
|
654
|
+
@_builtins.property
|
656
655
|
@pulumi.getter(name="externalValidations")
|
657
656
|
def external_validations(self) -> pulumi.Output[Sequence['outputs.BackendConfigScepExternalValidation']]:
|
658
657
|
"""
|
@@ -660,17 +659,17 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
660
659
|
"""
|
661
660
|
return pulumi.get(self, "external_validations")
|
662
661
|
|
663
|
-
@property
|
662
|
+
@_builtins.property
|
664
663
|
@pulumi.getter(name="lastUpdated")
|
665
|
-
def last_updated(self) -> pulumi.Output[
|
664
|
+
def last_updated(self) -> pulumi.Output[_builtins.str]:
|
666
665
|
"""
|
667
666
|
A read-only timestamp representing the last time the configuration was updated.
|
668
667
|
"""
|
669
668
|
return pulumi.get(self, "last_updated")
|
670
669
|
|
671
|
-
@property
|
670
|
+
@_builtins.property
|
672
671
|
@pulumi.getter
|
673
|
-
def namespace(self) -> pulumi.Output[Optional[
|
672
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
674
673
|
"""
|
675
674
|
The namespace of the target resource.
|
676
675
|
The value should not contain leading or trailing forward slashes.
|
@@ -679,9 +678,9 @@ class BackendConfigScep(pulumi.CustomResource):
|
|
679
678
|
"""
|
680
679
|
return pulumi.get(self, "namespace")
|
681
680
|
|
682
|
-
@property
|
681
|
+
@_builtins.property
|
683
682
|
@pulumi.getter(name="restrictCaChainToIssuer")
|
684
|
-
def restrict_ca_chain_to_issuer(self) -> pulumi.Output[Optional[
|
683
|
+
def restrict_ca_chain_to_issuer(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
685
684
|
"""
|
686
685
|
If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
|
687
686
|
|