pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -22,27 +21,27 @@ __all__ = ['BackendConfigCmpv2Args', 'BackendConfigCmpv2']
|
|
22
21
|
@pulumi.input_type
|
23
22
|
class BackendConfigCmpv2Args:
|
24
23
|
def __init__(__self__, *,
|
25
|
-
backend: pulumi.Input[
|
26
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[
|
24
|
+
backend: pulumi.Input[_builtins.str],
|
25
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
27
26
|
authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
|
28
|
-
default_path_policy: Optional[pulumi.Input[
|
29
|
-
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[
|
30
|
-
enable_sentinel_parsing: Optional[pulumi.Input[
|
31
|
-
enabled: Optional[pulumi.Input[
|
32
|
-
namespace: Optional[pulumi.Input[
|
27
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
29
|
+
enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
|
30
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
31
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
33
32
|
"""
|
34
33
|
The set of arguments for constructing a BackendConfigCmpv2 resource.
|
35
|
-
:param pulumi.Input[
|
34
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
36
35
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
37
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
36
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
38
37
|
:param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
|
39
|
-
:param pulumi.Input[
|
40
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
38
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
39
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
41
40
|
|
42
41
|
<a id="nestedatt--authenticators"></a>
|
43
|
-
:param pulumi.Input[
|
44
|
-
:param pulumi.Input[
|
45
|
-
:param pulumi.Input[
|
42
|
+
:param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
43
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
|
44
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
46
45
|
The value should not contain leading or trailing forward slashes.
|
47
46
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
48
47
|
*Available only for Vault Enterprise*.
|
@@ -63,9 +62,9 @@ class BackendConfigCmpv2Args:
|
|
63
62
|
if namespace is not None:
|
64
63
|
pulumi.set(__self__, "namespace", namespace)
|
65
64
|
|
66
|
-
@property
|
65
|
+
@_builtins.property
|
67
66
|
@pulumi.getter
|
68
|
-
def backend(self) -> pulumi.Input[
|
67
|
+
def backend(self) -> pulumi.Input[_builtins.str]:
|
69
68
|
"""
|
70
69
|
The path to the PKI secret backend to
|
71
70
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
@@ -73,22 +72,22 @@ class BackendConfigCmpv2Args:
|
|
73
72
|
return pulumi.get(self, "backend")
|
74
73
|
|
75
74
|
@backend.setter
|
76
|
-
def backend(self, value: pulumi.Input[
|
75
|
+
def backend(self, value: pulumi.Input[_builtins.str]):
|
77
76
|
pulumi.set(self, "backend", value)
|
78
77
|
|
79
|
-
@property
|
78
|
+
@_builtins.property
|
80
79
|
@pulumi.getter(name="auditFields")
|
81
|
-
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
80
|
+
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
82
81
|
"""
|
83
82
|
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
84
83
|
"""
|
85
84
|
return pulumi.get(self, "audit_fields")
|
86
85
|
|
87
86
|
@audit_fields.setter
|
88
|
-
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
87
|
+
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
89
88
|
pulumi.set(self, "audit_fields", value)
|
90
89
|
|
91
|
-
@property
|
90
|
+
@_builtins.property
|
92
91
|
@pulumi.getter
|
93
92
|
def authenticators(self) -> Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]:
|
94
93
|
"""
|
@@ -100,21 +99,21 @@ class BackendConfigCmpv2Args:
|
|
100
99
|
def authenticators(self, value: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]):
|
101
100
|
pulumi.set(self, "authenticators", value)
|
102
101
|
|
103
|
-
@property
|
102
|
+
@_builtins.property
|
104
103
|
@pulumi.getter(name="defaultPathPolicy")
|
105
|
-
def default_path_policy(self) -> Optional[pulumi.Input[
|
104
|
+
def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
106
105
|
"""
|
107
106
|
Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
108
107
|
"""
|
109
108
|
return pulumi.get(self, "default_path_policy")
|
110
109
|
|
111
110
|
@default_path_policy.setter
|
112
|
-
def default_path_policy(self, value: Optional[pulumi.Input[
|
111
|
+
def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
113
112
|
pulumi.set(self, "default_path_policy", value)
|
114
113
|
|
115
|
-
@property
|
114
|
+
@_builtins.property
|
116
115
|
@pulumi.getter(name="disabledValidations")
|
117
|
-
def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
116
|
+
def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
118
117
|
"""
|
119
118
|
A comma-separated list of validations not to perform on CMPv2 messages.
|
120
119
|
|
@@ -123,36 +122,36 @@ class BackendConfigCmpv2Args:
|
|
123
122
|
return pulumi.get(self, "disabled_validations")
|
124
123
|
|
125
124
|
@disabled_validations.setter
|
126
|
-
def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
125
|
+
def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
127
126
|
pulumi.set(self, "disabled_validations", value)
|
128
127
|
|
129
|
-
@property
|
128
|
+
@_builtins.property
|
130
129
|
@pulumi.getter(name="enableSentinelParsing")
|
131
|
-
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[
|
130
|
+
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
132
131
|
"""
|
133
132
|
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
134
133
|
"""
|
135
134
|
return pulumi.get(self, "enable_sentinel_parsing")
|
136
135
|
|
137
136
|
@enable_sentinel_parsing.setter
|
138
|
-
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[
|
137
|
+
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
139
138
|
pulumi.set(self, "enable_sentinel_parsing", value)
|
140
139
|
|
141
|
-
@property
|
140
|
+
@_builtins.property
|
142
141
|
@pulumi.getter
|
143
|
-
def enabled(self) -> Optional[pulumi.Input[
|
142
|
+
def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
144
143
|
"""
|
145
144
|
Specifies whether CMPv2 is enabled.
|
146
145
|
"""
|
147
146
|
return pulumi.get(self, "enabled")
|
148
147
|
|
149
148
|
@enabled.setter
|
150
|
-
def enabled(self, value: Optional[pulumi.Input[
|
149
|
+
def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
151
150
|
pulumi.set(self, "enabled", value)
|
152
151
|
|
153
|
-
@property
|
152
|
+
@_builtins.property
|
154
153
|
@pulumi.getter
|
155
|
-
def namespace(self) -> Optional[pulumi.Input[
|
154
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
156
155
|
"""
|
157
156
|
The namespace of the target resource.
|
158
157
|
The value should not contain leading or trailing forward slashes.
|
@@ -162,36 +161,36 @@ class BackendConfigCmpv2Args:
|
|
162
161
|
return pulumi.get(self, "namespace")
|
163
162
|
|
164
163
|
@namespace.setter
|
165
|
-
def namespace(self, value: Optional[pulumi.Input[
|
164
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
166
165
|
pulumi.set(self, "namespace", value)
|
167
166
|
|
168
167
|
|
169
168
|
@pulumi.input_type
|
170
169
|
class _BackendConfigCmpv2State:
|
171
170
|
def __init__(__self__, *,
|
172
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[
|
171
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
173
172
|
authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
|
174
|
-
backend: Optional[pulumi.Input[
|
175
|
-
default_path_policy: Optional[pulumi.Input[
|
176
|
-
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[
|
177
|
-
enable_sentinel_parsing: Optional[pulumi.Input[
|
178
|
-
enabled: Optional[pulumi.Input[
|
179
|
-
last_updated: Optional[pulumi.Input[
|
180
|
-
namespace: Optional[pulumi.Input[
|
173
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
174
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
175
|
+
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
176
|
+
enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
|
177
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
178
|
+
last_updated: Optional[pulumi.Input[_builtins.str]] = None,
|
179
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None):
|
181
180
|
"""
|
182
181
|
Input properties used for looking up and filtering BackendConfigCmpv2 resources.
|
183
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
182
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
184
183
|
:param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
|
185
|
-
:param pulumi.Input[
|
184
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
186
185
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
187
|
-
:param pulumi.Input[
|
188
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
186
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
187
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
189
188
|
|
190
189
|
<a id="nestedatt--authenticators"></a>
|
191
|
-
:param pulumi.Input[
|
192
|
-
:param pulumi.Input[
|
193
|
-
:param pulumi.Input[
|
194
|
-
:param pulumi.Input[
|
190
|
+
:param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
191
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
|
192
|
+
:param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
193
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
195
194
|
The value should not contain leading or trailing forward slashes.
|
196
195
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
197
196
|
*Available only for Vault Enterprise*.
|
@@ -215,19 +214,19 @@ class _BackendConfigCmpv2State:
|
|
215
214
|
if namespace is not None:
|
216
215
|
pulumi.set(__self__, "namespace", namespace)
|
217
216
|
|
218
|
-
@property
|
217
|
+
@_builtins.property
|
219
218
|
@pulumi.getter(name="auditFields")
|
220
|
-
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
219
|
+
def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
221
220
|
"""
|
222
221
|
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
223
222
|
"""
|
224
223
|
return pulumi.get(self, "audit_fields")
|
225
224
|
|
226
225
|
@audit_fields.setter
|
227
|
-
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
226
|
+
def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
228
227
|
pulumi.set(self, "audit_fields", value)
|
229
228
|
|
230
|
-
@property
|
229
|
+
@_builtins.property
|
231
230
|
@pulumi.getter
|
232
231
|
def authenticators(self) -> Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]:
|
233
232
|
"""
|
@@ -239,9 +238,9 @@ class _BackendConfigCmpv2State:
|
|
239
238
|
def authenticators(self, value: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]):
|
240
239
|
pulumi.set(self, "authenticators", value)
|
241
240
|
|
242
|
-
@property
|
241
|
+
@_builtins.property
|
243
242
|
@pulumi.getter
|
244
|
-
def backend(self) -> Optional[pulumi.Input[
|
243
|
+
def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
|
245
244
|
"""
|
246
245
|
The path to the PKI secret backend to
|
247
246
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
@@ -249,24 +248,24 @@ class _BackendConfigCmpv2State:
|
|
249
248
|
return pulumi.get(self, "backend")
|
250
249
|
|
251
250
|
@backend.setter
|
252
|
-
def backend(self, value: Optional[pulumi.Input[
|
251
|
+
def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
|
253
252
|
pulumi.set(self, "backend", value)
|
254
253
|
|
255
|
-
@property
|
254
|
+
@_builtins.property
|
256
255
|
@pulumi.getter(name="defaultPathPolicy")
|
257
|
-
def default_path_policy(self) -> Optional[pulumi.Input[
|
256
|
+
def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
|
258
257
|
"""
|
259
258
|
Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
260
259
|
"""
|
261
260
|
return pulumi.get(self, "default_path_policy")
|
262
261
|
|
263
262
|
@default_path_policy.setter
|
264
|
-
def default_path_policy(self, value: Optional[pulumi.Input[
|
263
|
+
def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
|
265
264
|
pulumi.set(self, "default_path_policy", value)
|
266
265
|
|
267
|
-
@property
|
266
|
+
@_builtins.property
|
268
267
|
@pulumi.getter(name="disabledValidations")
|
269
|
-
def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[
|
268
|
+
def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
|
270
269
|
"""
|
271
270
|
A comma-separated list of validations not to perform on CMPv2 messages.
|
272
271
|
|
@@ -275,48 +274,48 @@ class _BackendConfigCmpv2State:
|
|
275
274
|
return pulumi.get(self, "disabled_validations")
|
276
275
|
|
277
276
|
@disabled_validations.setter
|
278
|
-
def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[
|
277
|
+
def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
|
279
278
|
pulumi.set(self, "disabled_validations", value)
|
280
279
|
|
281
|
-
@property
|
280
|
+
@_builtins.property
|
282
281
|
@pulumi.getter(name="enableSentinelParsing")
|
283
|
-
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[
|
282
|
+
def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
284
283
|
"""
|
285
284
|
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
286
285
|
"""
|
287
286
|
return pulumi.get(self, "enable_sentinel_parsing")
|
288
287
|
|
289
288
|
@enable_sentinel_parsing.setter
|
290
|
-
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[
|
289
|
+
def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
291
290
|
pulumi.set(self, "enable_sentinel_parsing", value)
|
292
291
|
|
293
|
-
@property
|
292
|
+
@_builtins.property
|
294
293
|
@pulumi.getter
|
295
|
-
def enabled(self) -> Optional[pulumi.Input[
|
294
|
+
def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
296
295
|
"""
|
297
296
|
Specifies whether CMPv2 is enabled.
|
298
297
|
"""
|
299
298
|
return pulumi.get(self, "enabled")
|
300
299
|
|
301
300
|
@enabled.setter
|
302
|
-
def enabled(self, value: Optional[pulumi.Input[
|
301
|
+
def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
303
302
|
pulumi.set(self, "enabled", value)
|
304
303
|
|
305
|
-
@property
|
304
|
+
@_builtins.property
|
306
305
|
@pulumi.getter(name="lastUpdated")
|
307
|
-
def last_updated(self) -> Optional[pulumi.Input[
|
306
|
+
def last_updated(self) -> Optional[pulumi.Input[_builtins.str]]:
|
308
307
|
"""
|
309
308
|
A read-only timestamp representing the last time the configuration was updated.
|
310
309
|
"""
|
311
310
|
return pulumi.get(self, "last_updated")
|
312
311
|
|
313
312
|
@last_updated.setter
|
314
|
-
def last_updated(self, value: Optional[pulumi.Input[
|
313
|
+
def last_updated(self, value: Optional[pulumi.Input[_builtins.str]]):
|
315
314
|
pulumi.set(self, "last_updated", value)
|
316
315
|
|
317
|
-
@property
|
316
|
+
@_builtins.property
|
318
317
|
@pulumi.getter
|
319
|
-
def namespace(self) -> Optional[pulumi.Input[
|
318
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
320
319
|
"""
|
321
320
|
The namespace of the target resource.
|
322
321
|
The value should not contain leading or trailing forward slashes.
|
@@ -326,7 +325,7 @@ class _BackendConfigCmpv2State:
|
|
326
325
|
return pulumi.get(self, "namespace")
|
327
326
|
|
328
327
|
@namespace.setter
|
329
|
-
def namespace(self, value: Optional[pulumi.Input[
|
328
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
330
329
|
pulumi.set(self, "namespace", value)
|
331
330
|
|
332
331
|
|
@@ -336,14 +335,14 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
336
335
|
def __init__(__self__,
|
337
336
|
resource_name: str,
|
338
337
|
opts: Optional[pulumi.ResourceOptions] = None,
|
339
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[
|
338
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
340
339
|
authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
|
341
|
-
backend: Optional[pulumi.Input[
|
342
|
-
default_path_policy: Optional[pulumi.Input[
|
343
|
-
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[
|
344
|
-
enable_sentinel_parsing: Optional[pulumi.Input[
|
345
|
-
enabled: Optional[pulumi.Input[
|
346
|
-
namespace: Optional[pulumi.Input[
|
340
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
341
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
342
|
+
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
343
|
+
enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
|
344
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
345
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
347
346
|
__props__=None):
|
348
347
|
"""
|
349
348
|
Allows setting the CMPv2 configuration on a PKI Secret Backend
|
@@ -360,17 +359,17 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
360
359
|
|
361
360
|
:param str resource_name: The name of the resource.
|
362
361
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
363
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
362
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
364
363
|
:param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
|
365
|
-
:param pulumi.Input[
|
364
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
366
365
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
367
|
-
:param pulumi.Input[
|
368
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
366
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
367
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
369
368
|
|
370
369
|
<a id="nestedatt--authenticators"></a>
|
371
|
-
:param pulumi.Input[
|
372
|
-
:param pulumi.Input[
|
373
|
-
:param pulumi.Input[
|
370
|
+
:param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
371
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
|
372
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
374
373
|
The value should not contain leading or trailing forward slashes.
|
375
374
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
376
375
|
*Available only for Vault Enterprise*.
|
@@ -409,14 +408,14 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
409
408
|
def _internal_init(__self__,
|
410
409
|
resource_name: str,
|
411
410
|
opts: Optional[pulumi.ResourceOptions] = None,
|
412
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[
|
411
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
413
412
|
authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
|
414
|
-
backend: Optional[pulumi.Input[
|
415
|
-
default_path_policy: Optional[pulumi.Input[
|
416
|
-
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[
|
417
|
-
enable_sentinel_parsing: Optional[pulumi.Input[
|
418
|
-
enabled: Optional[pulumi.Input[
|
419
|
-
namespace: Optional[pulumi.Input[
|
413
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
414
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
415
|
+
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
416
|
+
enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
|
417
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
418
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
420
419
|
__props__=None):
|
421
420
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
422
421
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -447,15 +446,15 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
447
446
|
def get(resource_name: str,
|
448
447
|
id: pulumi.Input[str],
|
449
448
|
opts: Optional[pulumi.ResourceOptions] = None,
|
450
|
-
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[
|
449
|
+
audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
451
450
|
authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
|
452
|
-
backend: Optional[pulumi.Input[
|
453
|
-
default_path_policy: Optional[pulumi.Input[
|
454
|
-
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[
|
455
|
-
enable_sentinel_parsing: Optional[pulumi.Input[
|
456
|
-
enabled: Optional[pulumi.Input[
|
457
|
-
last_updated: Optional[pulumi.Input[
|
458
|
-
namespace: Optional[pulumi.Input[
|
451
|
+
backend: Optional[pulumi.Input[_builtins.str]] = None,
|
452
|
+
default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
|
453
|
+
disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
|
454
|
+
enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
|
455
|
+
enabled: Optional[pulumi.Input[_builtins.bool]] = None,
|
456
|
+
last_updated: Optional[pulumi.Input[_builtins.str]] = None,
|
457
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'BackendConfigCmpv2':
|
459
458
|
"""
|
460
459
|
Get an existing BackendConfigCmpv2 resource's state with the given name, id, and optional extra
|
461
460
|
properties used to qualify the lookup.
|
@@ -463,18 +462,18 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
463
462
|
:param str resource_name: The unique name of the resulting resource.
|
464
463
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
465
464
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
466
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
465
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
467
466
|
:param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
|
468
|
-
:param pulumi.Input[
|
467
|
+
:param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
|
469
468
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
470
|
-
:param pulumi.Input[
|
471
|
-
:param pulumi.Input[Sequence[pulumi.Input[
|
469
|
+
:param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
470
|
+
:param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
|
472
471
|
|
473
472
|
<a id="nestedatt--authenticators"></a>
|
474
|
-
:param pulumi.Input[
|
475
|
-
:param pulumi.Input[
|
476
|
-
:param pulumi.Input[
|
477
|
-
:param pulumi.Input[
|
473
|
+
:param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
474
|
+
:param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
|
475
|
+
:param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
|
476
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
|
478
477
|
The value should not contain leading or trailing forward slashes.
|
479
478
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
480
479
|
*Available only for Vault Enterprise*.
|
@@ -494,15 +493,15 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
494
493
|
__props__.__dict__["namespace"] = namespace
|
495
494
|
return BackendConfigCmpv2(resource_name, opts=opts, __props__=__props__)
|
496
495
|
|
497
|
-
@property
|
496
|
+
@_builtins.property
|
498
497
|
@pulumi.getter(name="auditFields")
|
499
|
-
def audit_fields(self) -> pulumi.Output[Sequence[
|
498
|
+
def audit_fields(self) -> pulumi.Output[Sequence[_builtins.str]]:
|
500
499
|
"""
|
501
500
|
Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
|
502
501
|
"""
|
503
502
|
return pulumi.get(self, "audit_fields")
|
504
503
|
|
505
|
-
@property
|
504
|
+
@_builtins.property
|
506
505
|
@pulumi.getter
|
507
506
|
def authenticators(self) -> pulumi.Output['outputs.BackendConfigCmpv2Authenticators']:
|
508
507
|
"""
|
@@ -510,26 +509,26 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
510
509
|
"""
|
511
510
|
return pulumi.get(self, "authenticators")
|
512
511
|
|
513
|
-
@property
|
512
|
+
@_builtins.property
|
514
513
|
@pulumi.getter
|
515
|
-
def backend(self) -> pulumi.Output[
|
514
|
+
def backend(self) -> pulumi.Output[_builtins.str]:
|
516
515
|
"""
|
517
516
|
The path to the PKI secret backend to
|
518
517
|
read the CMPv2 configuration from, with no leading or trailing `/`s.
|
519
518
|
"""
|
520
519
|
return pulumi.get(self, "backend")
|
521
520
|
|
522
|
-
@property
|
521
|
+
@_builtins.property
|
523
522
|
@pulumi.getter(name="defaultPathPolicy")
|
524
|
-
def default_path_policy(self) -> pulumi.Output[Optional[
|
523
|
+
def default_path_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
|
525
524
|
"""
|
526
525
|
Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
|
527
526
|
"""
|
528
527
|
return pulumi.get(self, "default_path_policy")
|
529
528
|
|
530
|
-
@property
|
529
|
+
@_builtins.property
|
531
530
|
@pulumi.getter(name="disabledValidations")
|
532
|
-
def disabled_validations(self) -> pulumi.Output[Optional[Sequence[
|
531
|
+
def disabled_validations(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
|
533
532
|
"""
|
534
533
|
A comma-separated list of validations not to perform on CMPv2 messages.
|
535
534
|
|
@@ -537,33 +536,33 @@ class BackendConfigCmpv2(pulumi.CustomResource):
|
|
537
536
|
"""
|
538
537
|
return pulumi.get(self, "disabled_validations")
|
539
538
|
|
540
|
-
@property
|
539
|
+
@_builtins.property
|
541
540
|
@pulumi.getter(name="enableSentinelParsing")
|
542
|
-
def enable_sentinel_parsing(self) -> pulumi.Output[Optional[
|
541
|
+
def enable_sentinel_parsing(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
543
542
|
"""
|
544
543
|
If set, parse out fields from the provided CSR making them available for Sentinel policies.
|
545
544
|
"""
|
546
545
|
return pulumi.get(self, "enable_sentinel_parsing")
|
547
546
|
|
548
|
-
@property
|
547
|
+
@_builtins.property
|
549
548
|
@pulumi.getter
|
550
|
-
def enabled(self) -> pulumi.Output[Optional[
|
549
|
+
def enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
551
550
|
"""
|
552
551
|
Specifies whether CMPv2 is enabled.
|
553
552
|
"""
|
554
553
|
return pulumi.get(self, "enabled")
|
555
554
|
|
556
|
-
@property
|
555
|
+
@_builtins.property
|
557
556
|
@pulumi.getter(name="lastUpdated")
|
558
|
-
def last_updated(self) -> pulumi.Output[
|
557
|
+
def last_updated(self) -> pulumi.Output[_builtins.str]:
|
559
558
|
"""
|
560
559
|
A read-only timestamp representing the last time the configuration was updated.
|
561
560
|
"""
|
562
561
|
return pulumi.get(self, "last_updated")
|
563
562
|
|
564
|
-
@property
|
563
|
+
@_builtins.property
|
565
564
|
@pulumi.getter
|
566
|
-
def namespace(self) -> pulumi.Output[Optional[
|
565
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
567
566
|
"""
|
568
567
|
The namespace of the target resource.
|
569
568
|
The value should not contain leading or trailing forward slashes.
|