pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,270 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'BackendConfigCmpv2AuthenticatorsArgs',
|
|
19
|
+
'BackendConfigCmpv2AuthenticatorsArgsDict',
|
|
20
|
+
'BackendConfigEstAuthenticatorsArgs',
|
|
21
|
+
'BackendConfigEstAuthenticatorsArgsDict',
|
|
22
|
+
'BackendConfigScepAuthenticatorsArgs',
|
|
23
|
+
'BackendConfigScepAuthenticatorsArgsDict',
|
|
24
|
+
'BackendConfigScepExternalValidationArgs',
|
|
25
|
+
'BackendConfigScepExternalValidationArgsDict',
|
|
26
|
+
'SecretBackendRolePolicyIdentifierArgs',
|
|
27
|
+
'SecretBackendRolePolicyIdentifierArgsDict',
|
|
28
|
+
]
|
|
29
|
+
|
|
30
|
+
MYPY = False
|
|
31
|
+
|
|
32
|
+
if not MYPY:
|
|
33
|
+
class BackendConfigCmpv2AuthenticatorsArgsDict(TypedDict):
|
|
34
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
|
35
|
+
"""
|
|
36
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
|
37
|
+
"""
|
|
38
|
+
elif False:
|
|
39
|
+
BackendConfigCmpv2AuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
|
|
40
|
+
|
|
41
|
+
@pulumi.input_type
|
|
42
|
+
class BackendConfigCmpv2AuthenticatorsArgs:
|
|
43
|
+
def __init__(__self__, *,
|
|
44
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
|
45
|
+
"""
|
|
46
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
|
47
|
+
"""
|
|
48
|
+
if cert is not None:
|
|
49
|
+
pulumi.set(__self__, "cert", cert)
|
|
50
|
+
|
|
51
|
+
@_builtins.property
|
|
52
|
+
@pulumi.getter
|
|
53
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
54
|
+
"""
|
|
55
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
|
56
|
+
"""
|
|
57
|
+
return pulumi.get(self, "cert")
|
|
58
|
+
|
|
59
|
+
@cert.setter
|
|
60
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
61
|
+
pulumi.set(self, "cert", value)
|
|
62
|
+
|
|
63
|
+
|
|
64
|
+
if not MYPY:
|
|
65
|
+
class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
|
|
66
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
|
67
|
+
"""
|
|
68
|
+
The accessor (required) and cert_role (optional) properties for cert auth backends.
|
|
69
|
+
"""
|
|
70
|
+
userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
|
71
|
+
"""
|
|
72
|
+
The accessor (required) property for user pass auth backends.
|
|
73
|
+
"""
|
|
74
|
+
elif False:
|
|
75
|
+
BackendConfigEstAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
|
|
76
|
+
|
|
77
|
+
@pulumi.input_type
|
|
78
|
+
class BackendConfigEstAuthenticatorsArgs:
|
|
79
|
+
def __init__(__self__, *,
|
|
80
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
81
|
+
userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
|
82
|
+
"""
|
|
83
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
|
|
84
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] userpass: The accessor (required) property for user pass auth backends.
|
|
85
|
+
"""
|
|
86
|
+
if cert is not None:
|
|
87
|
+
pulumi.set(__self__, "cert", cert)
|
|
88
|
+
if userpass is not None:
|
|
89
|
+
pulumi.set(__self__, "userpass", userpass)
|
|
90
|
+
|
|
91
|
+
@_builtins.property
|
|
92
|
+
@pulumi.getter
|
|
93
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
94
|
+
"""
|
|
95
|
+
The accessor (required) and cert_role (optional) properties for cert auth backends.
|
|
96
|
+
"""
|
|
97
|
+
return pulumi.get(self, "cert")
|
|
98
|
+
|
|
99
|
+
@cert.setter
|
|
100
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
101
|
+
pulumi.set(self, "cert", value)
|
|
102
|
+
|
|
103
|
+
@_builtins.property
|
|
104
|
+
@pulumi.getter
|
|
105
|
+
def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
106
|
+
"""
|
|
107
|
+
The accessor (required) property for user pass auth backends.
|
|
108
|
+
"""
|
|
109
|
+
return pulumi.get(self, "userpass")
|
|
110
|
+
|
|
111
|
+
@userpass.setter
|
|
112
|
+
def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
113
|
+
pulumi.set(self, "userpass", value)
|
|
114
|
+
|
|
115
|
+
|
|
116
|
+
if not MYPY:
|
|
117
|
+
class BackendConfigScepAuthenticatorsArgsDict(TypedDict):
|
|
118
|
+
cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
|
119
|
+
"""
|
|
120
|
+
The accessor and cert_role properties for cert auth backends
|
|
121
|
+
"""
|
|
122
|
+
scep: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
|
123
|
+
"""
|
|
124
|
+
The accessor property for SCEP auth backends
|
|
125
|
+
"""
|
|
126
|
+
elif False:
|
|
127
|
+
BackendConfigScepAuthenticatorsArgsDict: TypeAlias = Mapping[str, Any]
|
|
128
|
+
|
|
129
|
+
@pulumi.input_type
|
|
130
|
+
class BackendConfigScepAuthenticatorsArgs:
|
|
131
|
+
def __init__(__self__, *,
|
|
132
|
+
cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
|
|
133
|
+
scep: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
|
134
|
+
"""
|
|
135
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: The accessor and cert_role properties for cert auth backends
|
|
136
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] scep: The accessor property for SCEP auth backends
|
|
137
|
+
"""
|
|
138
|
+
if cert is not None:
|
|
139
|
+
pulumi.set(__self__, "cert", cert)
|
|
140
|
+
if scep is not None:
|
|
141
|
+
pulumi.set(__self__, "scep", scep)
|
|
142
|
+
|
|
143
|
+
@_builtins.property
|
|
144
|
+
@pulumi.getter
|
|
145
|
+
def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
146
|
+
"""
|
|
147
|
+
The accessor and cert_role properties for cert auth backends
|
|
148
|
+
"""
|
|
149
|
+
return pulumi.get(self, "cert")
|
|
150
|
+
|
|
151
|
+
@cert.setter
|
|
152
|
+
def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
153
|
+
pulumi.set(self, "cert", value)
|
|
154
|
+
|
|
155
|
+
@_builtins.property
|
|
156
|
+
@pulumi.getter
|
|
157
|
+
def scep(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
158
|
+
"""
|
|
159
|
+
The accessor property for SCEP auth backends
|
|
160
|
+
"""
|
|
161
|
+
return pulumi.get(self, "scep")
|
|
162
|
+
|
|
163
|
+
@scep.setter
|
|
164
|
+
def scep(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
165
|
+
pulumi.set(self, "scep", value)
|
|
166
|
+
|
|
167
|
+
|
|
168
|
+
if not MYPY:
|
|
169
|
+
class BackendConfigScepExternalValidationArgsDict(TypedDict):
|
|
170
|
+
intune: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
|
|
171
|
+
"""
|
|
172
|
+
The credentials to enable Microsoft Intune validation of SCEP requests
|
|
173
|
+
"""
|
|
174
|
+
elif False:
|
|
175
|
+
BackendConfigScepExternalValidationArgsDict: TypeAlias = Mapping[str, Any]
|
|
176
|
+
|
|
177
|
+
@pulumi.input_type
|
|
178
|
+
class BackendConfigScepExternalValidationArgs:
|
|
179
|
+
def __init__(__self__, *,
|
|
180
|
+
intune: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
|
|
181
|
+
"""
|
|
182
|
+
:param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] intune: The credentials to enable Microsoft Intune validation of SCEP requests
|
|
183
|
+
"""
|
|
184
|
+
if intune is not None:
|
|
185
|
+
pulumi.set(__self__, "intune", intune)
|
|
186
|
+
|
|
187
|
+
@_builtins.property
|
|
188
|
+
@pulumi.getter
|
|
189
|
+
def intune(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
|
|
190
|
+
"""
|
|
191
|
+
The credentials to enable Microsoft Intune validation of SCEP requests
|
|
192
|
+
"""
|
|
193
|
+
return pulumi.get(self, "intune")
|
|
194
|
+
|
|
195
|
+
@intune.setter
|
|
196
|
+
def intune(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
|
|
197
|
+
pulumi.set(self, "intune", value)
|
|
198
|
+
|
|
199
|
+
|
|
200
|
+
if not MYPY:
|
|
201
|
+
class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
|
|
202
|
+
oid: pulumi.Input[_builtins.str]
|
|
203
|
+
"""
|
|
204
|
+
The OID for the policy identifier
|
|
205
|
+
"""
|
|
206
|
+
cps: NotRequired[pulumi.Input[_builtins.str]]
|
|
207
|
+
"""
|
|
208
|
+
The URL of the CPS for the policy identifier
|
|
209
|
+
"""
|
|
210
|
+
notice: NotRequired[pulumi.Input[_builtins.str]]
|
|
211
|
+
"""
|
|
212
|
+
A notice for the policy identifier
|
|
213
|
+
"""
|
|
214
|
+
elif False:
|
|
215
|
+
SecretBackendRolePolicyIdentifierArgsDict: TypeAlias = Mapping[str, Any]
|
|
216
|
+
|
|
217
|
+
@pulumi.input_type
|
|
218
|
+
class SecretBackendRolePolicyIdentifierArgs:
|
|
219
|
+
def __init__(__self__, *,
|
|
220
|
+
oid: pulumi.Input[_builtins.str],
|
|
221
|
+
cps: Optional[pulumi.Input[_builtins.str]] = None,
|
|
222
|
+
notice: Optional[pulumi.Input[_builtins.str]] = None):
|
|
223
|
+
"""
|
|
224
|
+
:param pulumi.Input[_builtins.str] oid: The OID for the policy identifier
|
|
225
|
+
:param pulumi.Input[_builtins.str] cps: The URL of the CPS for the policy identifier
|
|
226
|
+
:param pulumi.Input[_builtins.str] notice: A notice for the policy identifier
|
|
227
|
+
"""
|
|
228
|
+
pulumi.set(__self__, "oid", oid)
|
|
229
|
+
if cps is not None:
|
|
230
|
+
pulumi.set(__self__, "cps", cps)
|
|
231
|
+
if notice is not None:
|
|
232
|
+
pulumi.set(__self__, "notice", notice)
|
|
233
|
+
|
|
234
|
+
@_builtins.property
|
|
235
|
+
@pulumi.getter
|
|
236
|
+
def oid(self) -> pulumi.Input[_builtins.str]:
|
|
237
|
+
"""
|
|
238
|
+
The OID for the policy identifier
|
|
239
|
+
"""
|
|
240
|
+
return pulumi.get(self, "oid")
|
|
241
|
+
|
|
242
|
+
@oid.setter
|
|
243
|
+
def oid(self, value: pulumi.Input[_builtins.str]):
|
|
244
|
+
pulumi.set(self, "oid", value)
|
|
245
|
+
|
|
246
|
+
@_builtins.property
|
|
247
|
+
@pulumi.getter
|
|
248
|
+
def cps(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
249
|
+
"""
|
|
250
|
+
The URL of the CPS for the policy identifier
|
|
251
|
+
"""
|
|
252
|
+
return pulumi.get(self, "cps")
|
|
253
|
+
|
|
254
|
+
@cps.setter
|
|
255
|
+
def cps(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
256
|
+
pulumi.set(self, "cps", value)
|
|
257
|
+
|
|
258
|
+
@_builtins.property
|
|
259
|
+
@pulumi.getter
|
|
260
|
+
def notice(self) -> Optional[pulumi.Input[_builtins.str]]:
|
|
261
|
+
"""
|
|
262
|
+
A notice for the policy identifier
|
|
263
|
+
"""
|
|
264
|
+
return pulumi.get(self, "notice")
|
|
265
|
+
|
|
266
|
+
@notice.setter
|
|
267
|
+
def notice(self, value: Optional[pulumi.Input[_builtins.str]]):
|
|
268
|
+
pulumi.set(self, "notice", value)
|
|
269
|
+
|
|
270
|
+
|