pulumi-vault 7.6.0a1764657486__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1399 -0
- pulumi_vault/_inputs.py +2701 -0
- pulumi_vault/_utilities.py +331 -0
- pulumi_vault/ad/__init__.py +12 -0
- pulumi_vault/ad/get_access_credentials.py +177 -0
- pulumi_vault/ad/secret_backend.py +1916 -0
- pulumi_vault/ad/secret_library.py +546 -0
- pulumi_vault/ad/secret_role.py +499 -0
- pulumi_vault/alicloud/__init__.py +9 -0
- pulumi_vault/alicloud/auth_backend_role.py +866 -0
- pulumi_vault/approle/__init__.py +12 -0
- pulumi_vault/approle/auth_backend_login.py +571 -0
- pulumi_vault/approle/auth_backend_role.py +1082 -0
- pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
- pulumi_vault/audit.py +499 -0
- pulumi_vault/audit_request_header.py +277 -0
- pulumi_vault/auth_backend.py +565 -0
- pulumi_vault/aws/__init__.py +22 -0
- pulumi_vault/aws/auth_backend_cert.py +420 -0
- pulumi_vault/aws/auth_backend_client.py +1259 -0
- pulumi_vault/aws/auth_backend_config_identity.py +494 -0
- pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
- pulumi_vault/aws/auth_backend_login.py +1046 -0
- pulumi_vault/aws/auth_backend_role.py +1961 -0
- pulumi_vault/aws/auth_backend_role_tag.py +638 -0
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
- pulumi_vault/aws/auth_backend_sts_role.py +414 -0
- pulumi_vault/aws/get_access_credentials.py +369 -0
- pulumi_vault/aws/get_static_access_credentials.py +137 -0
- pulumi_vault/aws/secret_backend.py +2018 -0
- pulumi_vault/aws/secret_backend_role.py +1188 -0
- pulumi_vault/aws/secret_backend_static_role.py +639 -0
- pulumi_vault/azure/__init__.py +15 -0
- pulumi_vault/azure/_inputs.py +108 -0
- pulumi_vault/azure/auth_backend_config.py +1096 -0
- pulumi_vault/azure/auth_backend_role.py +1176 -0
- pulumi_vault/azure/backend.py +1793 -0
- pulumi_vault/azure/backend_role.py +883 -0
- pulumi_vault/azure/get_access_credentials.py +400 -0
- pulumi_vault/azure/outputs.py +107 -0
- pulumi_vault/cert_auth_backend_role.py +1539 -0
- pulumi_vault/config/__init__.py +9 -0
- pulumi_vault/config/__init__.pyi +164 -0
- pulumi_vault/config/_inputs.py +73 -0
- pulumi_vault/config/outputs.py +1225 -0
- pulumi_vault/config/ui_custom_message.py +530 -0
- pulumi_vault/config/vars.py +230 -0
- pulumi_vault/consul/__init__.py +10 -0
- pulumi_vault/consul/secret_backend.py +1517 -0
- pulumi_vault/consul/secret_backend_role.py +847 -0
- pulumi_vault/database/__init__.py +14 -0
- pulumi_vault/database/_inputs.py +11907 -0
- pulumi_vault/database/outputs.py +8496 -0
- pulumi_vault/database/secret_backend_connection.py +1676 -0
- pulumi_vault/database/secret_backend_role.py +840 -0
- pulumi_vault/database/secret_backend_static_role.py +881 -0
- pulumi_vault/database/secrets_mount.py +2160 -0
- pulumi_vault/egp_policy.py +399 -0
- pulumi_vault/gcp/__init__.py +17 -0
- pulumi_vault/gcp/_inputs.py +441 -0
- pulumi_vault/gcp/auth_backend.py +1486 -0
- pulumi_vault/gcp/auth_backend_role.py +1235 -0
- pulumi_vault/gcp/get_auth_backend_role.py +514 -0
- pulumi_vault/gcp/outputs.py +302 -0
- pulumi_vault/gcp/secret_backend.py +1807 -0
- pulumi_vault/gcp/secret_impersonated_account.py +484 -0
- pulumi_vault/gcp/secret_roleset.py +554 -0
- pulumi_vault/gcp/secret_static_account.py +557 -0
- pulumi_vault/generic/__init__.py +11 -0
- pulumi_vault/generic/endpoint.py +786 -0
- pulumi_vault/generic/get_secret.py +306 -0
- pulumi_vault/generic/secret.py +486 -0
- pulumi_vault/get_auth_backend.py +226 -0
- pulumi_vault/get_auth_backends.py +170 -0
- pulumi_vault/get_namespace.py +226 -0
- pulumi_vault/get_namespaces.py +202 -0
- pulumi_vault/get_nomad_access_token.py +210 -0
- pulumi_vault/get_policy_document.py +160 -0
- pulumi_vault/get_raft_autopilot_state.py +267 -0
- pulumi_vault/github/__init__.py +13 -0
- pulumi_vault/github/_inputs.py +225 -0
- pulumi_vault/github/auth_backend.py +1194 -0
- pulumi_vault/github/outputs.py +174 -0
- pulumi_vault/github/team.py +380 -0
- pulumi_vault/github/user.py +380 -0
- pulumi_vault/identity/__init__.py +35 -0
- pulumi_vault/identity/entity.py +447 -0
- pulumi_vault/identity/entity_alias.py +398 -0
- pulumi_vault/identity/entity_policies.py +455 -0
- pulumi_vault/identity/get_entity.py +384 -0
- pulumi_vault/identity/get_group.py +467 -0
- pulumi_vault/identity/get_oidc_client_creds.py +175 -0
- pulumi_vault/identity/get_oidc_openid_config.py +334 -0
- pulumi_vault/identity/get_oidc_public_keys.py +179 -0
- pulumi_vault/identity/group.py +805 -0
- pulumi_vault/identity/group_alias.py +386 -0
- pulumi_vault/identity/group_member_entity_ids.py +444 -0
- pulumi_vault/identity/group_member_group_ids.py +467 -0
- pulumi_vault/identity/group_policies.py +471 -0
- pulumi_vault/identity/mfa_duo.py +674 -0
- pulumi_vault/identity/mfa_login_enforcement.py +566 -0
- pulumi_vault/identity/mfa_okta.py +626 -0
- pulumi_vault/identity/mfa_pingid.py +616 -0
- pulumi_vault/identity/mfa_totp.py +758 -0
- pulumi_vault/identity/oidc.py +268 -0
- pulumi_vault/identity/oidc_assignment.py +375 -0
- pulumi_vault/identity/oidc_client.py +667 -0
- pulumi_vault/identity/oidc_key.py +474 -0
- pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
- pulumi_vault/identity/oidc_provider.py +550 -0
- pulumi_vault/identity/oidc_role.py +543 -0
- pulumi_vault/identity/oidc_scope.py +355 -0
- pulumi_vault/identity/outputs.py +137 -0
- pulumi_vault/jwt/__init__.py +12 -0
- pulumi_vault/jwt/_inputs.py +225 -0
- pulumi_vault/jwt/auth_backend.py +1347 -0
- pulumi_vault/jwt/auth_backend_role.py +1847 -0
- pulumi_vault/jwt/outputs.py +174 -0
- pulumi_vault/kmip/__init__.py +11 -0
- pulumi_vault/kmip/secret_backend.py +1591 -0
- pulumi_vault/kmip/secret_role.py +1194 -0
- pulumi_vault/kmip/secret_scope.py +372 -0
- pulumi_vault/kubernetes/__init__.py +15 -0
- pulumi_vault/kubernetes/auth_backend_config.py +654 -0
- pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
- pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
- pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
- pulumi_vault/kubernetes/get_service_account_token.py +344 -0
- pulumi_vault/kubernetes/secret_backend.py +1341 -0
- pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
- pulumi_vault/kv/__init__.py +18 -0
- pulumi_vault/kv/_inputs.py +124 -0
- pulumi_vault/kv/get_secret.py +240 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
- pulumi_vault/kv/get_secret_v2.py +315 -0
- pulumi_vault/kv/get_secrets_list.py +186 -0
- pulumi_vault/kv/get_secrets_list_v2.py +243 -0
- pulumi_vault/kv/outputs.py +102 -0
- pulumi_vault/kv/secret.py +397 -0
- pulumi_vault/kv/secret_backend_v2.py +455 -0
- pulumi_vault/kv/secret_v2.py +970 -0
- pulumi_vault/ldap/__init__.py +19 -0
- pulumi_vault/ldap/_inputs.py +225 -0
- pulumi_vault/ldap/auth_backend.py +2520 -0
- pulumi_vault/ldap/auth_backend_group.py +386 -0
- pulumi_vault/ldap/auth_backend_user.py +439 -0
- pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
- pulumi_vault/ldap/get_static_credentials.py +192 -0
- pulumi_vault/ldap/outputs.py +174 -0
- pulumi_vault/ldap/secret_backend.py +2207 -0
- pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
- pulumi_vault/ldap/secret_backend_library_set.py +552 -0
- pulumi_vault/ldap/secret_backend_static_role.py +541 -0
- pulumi_vault/managed/__init__.py +11 -0
- pulumi_vault/managed/_inputs.py +944 -0
- pulumi_vault/managed/keys.py +398 -0
- pulumi_vault/managed/outputs.py +667 -0
- pulumi_vault/mfa_duo.py +589 -0
- pulumi_vault/mfa_okta.py +623 -0
- pulumi_vault/mfa_pingid.py +670 -0
- pulumi_vault/mfa_totp.py +620 -0
- pulumi_vault/mongodbatlas/__init__.py +10 -0
- pulumi_vault/mongodbatlas/secret_backend.py +388 -0
- pulumi_vault/mongodbatlas/secret_role.py +726 -0
- pulumi_vault/mount.py +1262 -0
- pulumi_vault/namespace.py +452 -0
- pulumi_vault/nomad_secret_backend.py +1559 -0
- pulumi_vault/nomad_secret_role.py +489 -0
- pulumi_vault/oci_auth_backend.py +676 -0
- pulumi_vault/oci_auth_backend_role.py +852 -0
- pulumi_vault/okta/__init__.py +13 -0
- pulumi_vault/okta/_inputs.py +320 -0
- pulumi_vault/okta/auth_backend.py +1231 -0
- pulumi_vault/okta/auth_backend_group.py +369 -0
- pulumi_vault/okta/auth_backend_user.py +416 -0
- pulumi_vault/okta/outputs.py +244 -0
- pulumi_vault/outputs.py +502 -0
- pulumi_vault/pkisecret/__init__.py +38 -0
- pulumi_vault/pkisecret/_inputs.py +270 -0
- pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
- pulumi_vault/pkisecret/backend_config_acme.py +690 -0
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
- pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
- pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
- pulumi_vault/pkisecret/backend_config_est.py +756 -0
- pulumi_vault/pkisecret/backend_config_scep.py +738 -0
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
- pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
- pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
- pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
- pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
- pulumi_vault/pkisecret/get_backend_key.py +211 -0
- pulumi_vault/pkisecret/get_backend_keys.py +192 -0
- pulumi_vault/pkisecret/outputs.py +270 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
- pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
- pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
- pulumi_vault/pkisecret/secret_backend_key.py +613 -0
- pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
- pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
- pulumi_vault/plugin.py +596 -0
- pulumi_vault/plugin_pinned_version.py +299 -0
- pulumi_vault/policy.py +279 -0
- pulumi_vault/provider.py +781 -0
- pulumi_vault/pulumi-plugin.json +5 -0
- pulumi_vault/py.typed +0 -0
- pulumi_vault/quota_lease_count.py +504 -0
- pulumi_vault/quota_rate_limit.py +751 -0
- pulumi_vault/rabbitmq/__init__.py +12 -0
- pulumi_vault/rabbitmq/_inputs.py +235 -0
- pulumi_vault/rabbitmq/outputs.py +144 -0
- pulumi_vault/rabbitmq/secret_backend.py +1437 -0
- pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
- pulumi_vault/raft_autopilot.py +609 -0
- pulumi_vault/raft_snapshot_agent_config.py +1591 -0
- pulumi_vault/rgp_policy.py +349 -0
- pulumi_vault/saml/__init__.py +12 -0
- pulumi_vault/saml/_inputs.py +225 -0
- pulumi_vault/saml/auth_backend.py +811 -0
- pulumi_vault/saml/auth_backend_role.py +1068 -0
- pulumi_vault/saml/outputs.py +174 -0
- pulumi_vault/scep_auth_backend_role.py +908 -0
- pulumi_vault/secrets/__init__.py +18 -0
- pulumi_vault/secrets/_inputs.py +110 -0
- pulumi_vault/secrets/outputs.py +94 -0
- pulumi_vault/secrets/sync_association.py +450 -0
- pulumi_vault/secrets/sync_aws_destination.py +780 -0
- pulumi_vault/secrets/sync_azure_destination.py +736 -0
- pulumi_vault/secrets/sync_config.py +303 -0
- pulumi_vault/secrets/sync_gcp_destination.py +572 -0
- pulumi_vault/secrets/sync_gh_destination.py +688 -0
- pulumi_vault/secrets/sync_github_apps.py +376 -0
- pulumi_vault/secrets/sync_vercel_destination.py +603 -0
- pulumi_vault/ssh/__init__.py +13 -0
- pulumi_vault/ssh/_inputs.py +76 -0
- pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
- pulumi_vault/ssh/outputs.py +51 -0
- pulumi_vault/ssh/secret_backend_ca.py +588 -0
- pulumi_vault/ssh/secret_backend_role.py +1493 -0
- pulumi_vault/terraformcloud/__init__.py +11 -0
- pulumi_vault/terraformcloud/secret_backend.py +1321 -0
- pulumi_vault/terraformcloud/secret_creds.py +445 -0
- pulumi_vault/terraformcloud/secret_role.py +563 -0
- pulumi_vault/token.py +1026 -0
- pulumi_vault/tokenauth/__init__.py +9 -0
- pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
- pulumi_vault/transform/__init__.py +14 -0
- pulumi_vault/transform/alphabet.py +348 -0
- pulumi_vault/transform/get_decode.py +287 -0
- pulumi_vault/transform/get_encode.py +291 -0
- pulumi_vault/transform/role.py +350 -0
- pulumi_vault/transform/template.py +592 -0
- pulumi_vault/transform/transformation.py +608 -0
- pulumi_vault/transit/__init__.py +15 -0
- pulumi_vault/transit/get_cmac.py +256 -0
- pulumi_vault/transit/get_decrypt.py +181 -0
- pulumi_vault/transit/get_encrypt.py +174 -0
- pulumi_vault/transit/get_sign.py +328 -0
- pulumi_vault/transit/get_verify.py +373 -0
- pulumi_vault/transit/secret_backend_key.py +1202 -0
- pulumi_vault/transit/secret_cache_config.py +302 -0
- pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
- pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
- pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
- pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,211 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetBackendKeyResult',
|
|
19
|
+
'AwaitableGetBackendKeyResult',
|
|
20
|
+
'get_backend_key',
|
|
21
|
+
'get_backend_key_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetBackendKeyResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getBackendKey.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, backend=None, id=None, key_id=None, key_name=None, key_ref=None, key_type=None, namespace=None):
|
|
30
|
+
if backend and not isinstance(backend, str):
|
|
31
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
|
32
|
+
pulumi.set(__self__, "backend", backend)
|
|
33
|
+
if id and not isinstance(id, str):
|
|
34
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
35
|
+
pulumi.set(__self__, "id", id)
|
|
36
|
+
if key_id and not isinstance(key_id, str):
|
|
37
|
+
raise TypeError("Expected argument 'key_id' to be a str")
|
|
38
|
+
pulumi.set(__self__, "key_id", key_id)
|
|
39
|
+
if key_name and not isinstance(key_name, str):
|
|
40
|
+
raise TypeError("Expected argument 'key_name' to be a str")
|
|
41
|
+
pulumi.set(__self__, "key_name", key_name)
|
|
42
|
+
if key_ref and not isinstance(key_ref, str):
|
|
43
|
+
raise TypeError("Expected argument 'key_ref' to be a str")
|
|
44
|
+
pulumi.set(__self__, "key_ref", key_ref)
|
|
45
|
+
if key_type and not isinstance(key_type, str):
|
|
46
|
+
raise TypeError("Expected argument 'key_type' to be a str")
|
|
47
|
+
pulumi.set(__self__, "key_type", key_type)
|
|
48
|
+
if namespace and not isinstance(namespace, str):
|
|
49
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
50
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
51
|
+
|
|
52
|
+
@_builtins.property
|
|
53
|
+
@pulumi.getter
|
|
54
|
+
def backend(self) -> _builtins.str:
|
|
55
|
+
return pulumi.get(self, "backend")
|
|
56
|
+
|
|
57
|
+
@_builtins.property
|
|
58
|
+
@pulumi.getter
|
|
59
|
+
def id(self) -> _builtins.str:
|
|
60
|
+
"""
|
|
61
|
+
The provider-assigned unique ID for this managed resource.
|
|
62
|
+
"""
|
|
63
|
+
return pulumi.get(self, "id")
|
|
64
|
+
|
|
65
|
+
@_builtins.property
|
|
66
|
+
@pulumi.getter(name="keyId")
|
|
67
|
+
def key_id(self) -> _builtins.str:
|
|
68
|
+
"""
|
|
69
|
+
ID of the key.
|
|
70
|
+
"""
|
|
71
|
+
return pulumi.get(self, "key_id")
|
|
72
|
+
|
|
73
|
+
@_builtins.property
|
|
74
|
+
@pulumi.getter(name="keyName")
|
|
75
|
+
def key_name(self) -> _builtins.str:
|
|
76
|
+
"""
|
|
77
|
+
Name of the key.
|
|
78
|
+
"""
|
|
79
|
+
return pulumi.get(self, "key_name")
|
|
80
|
+
|
|
81
|
+
@_builtins.property
|
|
82
|
+
@pulumi.getter(name="keyRef")
|
|
83
|
+
def key_ref(self) -> _builtins.str:
|
|
84
|
+
return pulumi.get(self, "key_ref")
|
|
85
|
+
|
|
86
|
+
@_builtins.property
|
|
87
|
+
@pulumi.getter(name="keyType")
|
|
88
|
+
def key_type(self) -> _builtins.str:
|
|
89
|
+
"""
|
|
90
|
+
Type of the key.
|
|
91
|
+
"""
|
|
92
|
+
return pulumi.get(self, "key_type")
|
|
93
|
+
|
|
94
|
+
@_builtins.property
|
|
95
|
+
@pulumi.getter
|
|
96
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
97
|
+
return pulumi.get(self, "namespace")
|
|
98
|
+
|
|
99
|
+
|
|
100
|
+
class AwaitableGetBackendKeyResult(GetBackendKeyResult):
|
|
101
|
+
# pylint: disable=using-constant-test
|
|
102
|
+
def __await__(self):
|
|
103
|
+
if False:
|
|
104
|
+
yield self
|
|
105
|
+
return GetBackendKeyResult(
|
|
106
|
+
backend=self.backend,
|
|
107
|
+
id=self.id,
|
|
108
|
+
key_id=self.key_id,
|
|
109
|
+
key_name=self.key_name,
|
|
110
|
+
key_ref=self.key_ref,
|
|
111
|
+
key_type=self.key_type,
|
|
112
|
+
namespace=self.namespace)
|
|
113
|
+
|
|
114
|
+
|
|
115
|
+
def get_backend_key(backend: Optional[_builtins.str] = None,
|
|
116
|
+
key_ref: Optional[_builtins.str] = None,
|
|
117
|
+
namespace: Optional[_builtins.str] = None,
|
|
118
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeyResult:
|
|
119
|
+
"""
|
|
120
|
+
## Example Usage
|
|
121
|
+
|
|
122
|
+
```python
|
|
123
|
+
import pulumi
|
|
124
|
+
import pulumi_vault as vault
|
|
125
|
+
|
|
126
|
+
pki = vault.Mount("pki",
|
|
127
|
+
path="pki",
|
|
128
|
+
type="pki",
|
|
129
|
+
description="PKI secret engine mount")
|
|
130
|
+
key = vault.pkisecret.SecretBackendKey("key",
|
|
131
|
+
backend=pki.path,
|
|
132
|
+
type="internal",
|
|
133
|
+
key_name="example",
|
|
134
|
+
key_type="rsa",
|
|
135
|
+
key_bits=4096)
|
|
136
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
|
137
|
+
key_ref=key_id))
|
|
138
|
+
```
|
|
139
|
+
|
|
140
|
+
|
|
141
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
|
142
|
+
read the key from, with no leading or trailing `/`s.
|
|
143
|
+
:param _builtins.str key_ref: Reference to an existing key.
|
|
144
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
145
|
+
The value should not contain leading or trailing forward slashes.
|
|
146
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
147
|
+
*Available only for Vault Enterprise*.
|
|
148
|
+
"""
|
|
149
|
+
__args__ = dict()
|
|
150
|
+
__args__['backend'] = backend
|
|
151
|
+
__args__['keyRef'] = key_ref
|
|
152
|
+
__args__['namespace'] = namespace
|
|
153
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
154
|
+
__ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult).value
|
|
155
|
+
|
|
156
|
+
return AwaitableGetBackendKeyResult(
|
|
157
|
+
backend=pulumi.get(__ret__, 'backend'),
|
|
158
|
+
id=pulumi.get(__ret__, 'id'),
|
|
159
|
+
key_id=pulumi.get(__ret__, 'key_id'),
|
|
160
|
+
key_name=pulumi.get(__ret__, 'key_name'),
|
|
161
|
+
key_ref=pulumi.get(__ret__, 'key_ref'),
|
|
162
|
+
key_type=pulumi.get(__ret__, 'key_type'),
|
|
163
|
+
namespace=pulumi.get(__ret__, 'namespace'))
|
|
164
|
+
def get_backend_key_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
165
|
+
key_ref: Optional[pulumi.Input[_builtins.str]] = None,
|
|
166
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
167
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
|
|
168
|
+
"""
|
|
169
|
+
## Example Usage
|
|
170
|
+
|
|
171
|
+
```python
|
|
172
|
+
import pulumi
|
|
173
|
+
import pulumi_vault as vault
|
|
174
|
+
|
|
175
|
+
pki = vault.Mount("pki",
|
|
176
|
+
path="pki",
|
|
177
|
+
type="pki",
|
|
178
|
+
description="PKI secret engine mount")
|
|
179
|
+
key = vault.pkisecret.SecretBackendKey("key",
|
|
180
|
+
backend=pki.path,
|
|
181
|
+
type="internal",
|
|
182
|
+
key_name="example",
|
|
183
|
+
key_type="rsa",
|
|
184
|
+
key_bits=4096)
|
|
185
|
+
example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
|
|
186
|
+
key_ref=key_id))
|
|
187
|
+
```
|
|
188
|
+
|
|
189
|
+
|
|
190
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
|
191
|
+
read the key from, with no leading or trailing `/`s.
|
|
192
|
+
:param _builtins.str key_ref: Reference to an existing key.
|
|
193
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
194
|
+
The value should not contain leading or trailing forward slashes.
|
|
195
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
196
|
+
*Available only for Vault Enterprise*.
|
|
197
|
+
"""
|
|
198
|
+
__args__ = dict()
|
|
199
|
+
__args__['backend'] = backend
|
|
200
|
+
__args__['keyRef'] = key_ref
|
|
201
|
+
__args__['namespace'] = namespace
|
|
202
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
203
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
|
|
204
|
+
return __ret__.apply(lambda __response__: GetBackendKeyResult(
|
|
205
|
+
backend=pulumi.get(__response__, 'backend'),
|
|
206
|
+
id=pulumi.get(__response__, 'id'),
|
|
207
|
+
key_id=pulumi.get(__response__, 'key_id'),
|
|
208
|
+
key_name=pulumi.get(__response__, 'key_name'),
|
|
209
|
+
key_ref=pulumi.get(__response__, 'key_ref'),
|
|
210
|
+
key_type=pulumi.get(__response__, 'key_type'),
|
|
211
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
|
@@ -0,0 +1,192 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'GetBackendKeysResult',
|
|
19
|
+
'AwaitableGetBackendKeysResult',
|
|
20
|
+
'get_backend_keys',
|
|
21
|
+
'get_backend_keys_output',
|
|
22
|
+
]
|
|
23
|
+
|
|
24
|
+
@pulumi.output_type
|
|
25
|
+
class GetBackendKeysResult:
|
|
26
|
+
"""
|
|
27
|
+
A collection of values returned by getBackendKeys.
|
|
28
|
+
"""
|
|
29
|
+
def __init__(__self__, backend=None, id=None, key_info=None, key_info_json=None, keys=None, namespace=None):
|
|
30
|
+
if backend and not isinstance(backend, str):
|
|
31
|
+
raise TypeError("Expected argument 'backend' to be a str")
|
|
32
|
+
pulumi.set(__self__, "backend", backend)
|
|
33
|
+
if id and not isinstance(id, str):
|
|
34
|
+
raise TypeError("Expected argument 'id' to be a str")
|
|
35
|
+
pulumi.set(__self__, "id", id)
|
|
36
|
+
if key_info and not isinstance(key_info, dict):
|
|
37
|
+
raise TypeError("Expected argument 'key_info' to be a dict")
|
|
38
|
+
pulumi.set(__self__, "key_info", key_info)
|
|
39
|
+
if key_info_json and not isinstance(key_info_json, str):
|
|
40
|
+
raise TypeError("Expected argument 'key_info_json' to be a str")
|
|
41
|
+
pulumi.set(__self__, "key_info_json", key_info_json)
|
|
42
|
+
if keys and not isinstance(keys, list):
|
|
43
|
+
raise TypeError("Expected argument 'keys' to be a list")
|
|
44
|
+
pulumi.set(__self__, "keys", keys)
|
|
45
|
+
if namespace and not isinstance(namespace, str):
|
|
46
|
+
raise TypeError("Expected argument 'namespace' to be a str")
|
|
47
|
+
pulumi.set(__self__, "namespace", namespace)
|
|
48
|
+
|
|
49
|
+
@_builtins.property
|
|
50
|
+
@pulumi.getter
|
|
51
|
+
def backend(self) -> _builtins.str:
|
|
52
|
+
return pulumi.get(self, "backend")
|
|
53
|
+
|
|
54
|
+
@_builtins.property
|
|
55
|
+
@pulumi.getter
|
|
56
|
+
def id(self) -> _builtins.str:
|
|
57
|
+
"""
|
|
58
|
+
The provider-assigned unique ID for this managed resource.
|
|
59
|
+
"""
|
|
60
|
+
return pulumi.get(self, "id")
|
|
61
|
+
|
|
62
|
+
@_builtins.property
|
|
63
|
+
@pulumi.getter(name="keyInfo")
|
|
64
|
+
def key_info(self) -> Mapping[str, _builtins.str]:
|
|
65
|
+
"""
|
|
66
|
+
Map of key strings read from Vault.
|
|
67
|
+
"""
|
|
68
|
+
return pulumi.get(self, "key_info")
|
|
69
|
+
|
|
70
|
+
@_builtins.property
|
|
71
|
+
@pulumi.getter(name="keyInfoJson")
|
|
72
|
+
def key_info_json(self) -> _builtins.str:
|
|
73
|
+
"""
|
|
74
|
+
JSON-encoded key data read from Vault.
|
|
75
|
+
"""
|
|
76
|
+
return pulumi.get(self, "key_info_json")
|
|
77
|
+
|
|
78
|
+
@_builtins.property
|
|
79
|
+
@pulumi.getter
|
|
80
|
+
def keys(self) -> Sequence[_builtins.str]:
|
|
81
|
+
"""
|
|
82
|
+
Keys used under the backend path.
|
|
83
|
+
"""
|
|
84
|
+
return pulumi.get(self, "keys")
|
|
85
|
+
|
|
86
|
+
@_builtins.property
|
|
87
|
+
@pulumi.getter
|
|
88
|
+
def namespace(self) -> Optional[_builtins.str]:
|
|
89
|
+
return pulumi.get(self, "namespace")
|
|
90
|
+
|
|
91
|
+
|
|
92
|
+
class AwaitableGetBackendKeysResult(GetBackendKeysResult):
|
|
93
|
+
# pylint: disable=using-constant-test
|
|
94
|
+
def __await__(self):
|
|
95
|
+
if False:
|
|
96
|
+
yield self
|
|
97
|
+
return GetBackendKeysResult(
|
|
98
|
+
backend=self.backend,
|
|
99
|
+
id=self.id,
|
|
100
|
+
key_info=self.key_info,
|
|
101
|
+
key_info_json=self.key_info_json,
|
|
102
|
+
keys=self.keys,
|
|
103
|
+
namespace=self.namespace)
|
|
104
|
+
|
|
105
|
+
|
|
106
|
+
def get_backend_keys(backend: Optional[_builtins.str] = None,
|
|
107
|
+
namespace: Optional[_builtins.str] = None,
|
|
108
|
+
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeysResult:
|
|
109
|
+
"""
|
|
110
|
+
## Example Usage
|
|
111
|
+
|
|
112
|
+
```python
|
|
113
|
+
import pulumi
|
|
114
|
+
import pulumi_vault as vault
|
|
115
|
+
|
|
116
|
+
pki = vault.Mount("pki",
|
|
117
|
+
path="pki",
|
|
118
|
+
type="pki",
|
|
119
|
+
description="PKI secret engine mount")
|
|
120
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
|
121
|
+
backend=pki.path,
|
|
122
|
+
type="internal",
|
|
123
|
+
common_name="example",
|
|
124
|
+
ttl="86400",
|
|
125
|
+
key_name="example")
|
|
126
|
+
example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
|
|
127
|
+
```
|
|
128
|
+
|
|
129
|
+
|
|
130
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
|
131
|
+
read the keys from, with no leading or trailing `/`s.
|
|
132
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
133
|
+
The value should not contain leading or trailing forward slashes.
|
|
134
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
135
|
+
*Available only for Vault Enterprise*.
|
|
136
|
+
"""
|
|
137
|
+
__args__ = dict()
|
|
138
|
+
__args__['backend'] = backend
|
|
139
|
+
__args__['namespace'] = namespace
|
|
140
|
+
opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
141
|
+
__ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult).value
|
|
142
|
+
|
|
143
|
+
return AwaitableGetBackendKeysResult(
|
|
144
|
+
backend=pulumi.get(__ret__, 'backend'),
|
|
145
|
+
id=pulumi.get(__ret__, 'id'),
|
|
146
|
+
key_info=pulumi.get(__ret__, 'key_info'),
|
|
147
|
+
key_info_json=pulumi.get(__ret__, 'key_info_json'),
|
|
148
|
+
keys=pulumi.get(__ret__, 'keys'),
|
|
149
|
+
namespace=pulumi.get(__ret__, 'namespace'))
|
|
150
|
+
def get_backend_keys_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
|
|
151
|
+
namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
|
|
152
|
+
opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
|
|
153
|
+
"""
|
|
154
|
+
## Example Usage
|
|
155
|
+
|
|
156
|
+
```python
|
|
157
|
+
import pulumi
|
|
158
|
+
import pulumi_vault as vault
|
|
159
|
+
|
|
160
|
+
pki = vault.Mount("pki",
|
|
161
|
+
path="pki",
|
|
162
|
+
type="pki",
|
|
163
|
+
description="PKI secret engine mount")
|
|
164
|
+
root = vault.pkisecret.SecretBackendRootCert("root",
|
|
165
|
+
backend=pki.path,
|
|
166
|
+
type="internal",
|
|
167
|
+
common_name="example",
|
|
168
|
+
ttl="86400",
|
|
169
|
+
key_name="example")
|
|
170
|
+
example = vault.pkiSecret.get_backend_keys_output(backend=root.backend)
|
|
171
|
+
```
|
|
172
|
+
|
|
173
|
+
|
|
174
|
+
:param _builtins.str backend: The path to the PKI secret backend to
|
|
175
|
+
read the keys from, with no leading or trailing `/`s.
|
|
176
|
+
:param _builtins.str namespace: The namespace of the target resource.
|
|
177
|
+
The value should not contain leading or trailing forward slashes.
|
|
178
|
+
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
|
179
|
+
*Available only for Vault Enterprise*.
|
|
180
|
+
"""
|
|
181
|
+
__args__ = dict()
|
|
182
|
+
__args__['backend'] = backend
|
|
183
|
+
__args__['namespace'] = namespace
|
|
184
|
+
opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
|
|
185
|
+
__ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
|
|
186
|
+
return __ret__.apply(lambda __response__: GetBackendKeysResult(
|
|
187
|
+
backend=pulumi.get(__response__, 'backend'),
|
|
188
|
+
id=pulumi.get(__response__, 'id'),
|
|
189
|
+
key_info=pulumi.get(__response__, 'key_info'),
|
|
190
|
+
key_info_json=pulumi.get(__response__, 'key_info_json'),
|
|
191
|
+
keys=pulumi.get(__response__, 'keys'),
|
|
192
|
+
namespace=pulumi.get(__response__, 'namespace')))
|
|
@@ -0,0 +1,270 @@
|
|
|
1
|
+
# coding=utf-8
|
|
2
|
+
# *** WARNING: this file was generated by pulumi-language-python. ***
|
|
3
|
+
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
|
|
5
|
+
import builtins as _builtins
|
|
6
|
+
import warnings
|
|
7
|
+
import sys
|
|
8
|
+
import pulumi
|
|
9
|
+
import pulumi.runtime
|
|
10
|
+
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
+
if sys.version_info >= (3, 11):
|
|
12
|
+
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
+
else:
|
|
14
|
+
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
+
from .. import _utilities
|
|
16
|
+
|
|
17
|
+
__all__ = [
|
|
18
|
+
'BackendConfigCmpv2Authenticators',
|
|
19
|
+
'BackendConfigEstAuthenticators',
|
|
20
|
+
'BackendConfigScepAuthenticators',
|
|
21
|
+
'BackendConfigScepExternalValidation',
|
|
22
|
+
'SecretBackendRolePolicyIdentifier',
|
|
23
|
+
'GetBackendConfigCmpv2AuthenticatorResult',
|
|
24
|
+
'GetBackendConfigEstAuthenticatorResult',
|
|
25
|
+
'GetBackendConfigScepAuthenticatorResult',
|
|
26
|
+
'GetBackendConfigScepExternalValidationResult',
|
|
27
|
+
]
|
|
28
|
+
|
|
29
|
+
@pulumi.output_type
|
|
30
|
+
class BackendConfigCmpv2Authenticators(dict):
|
|
31
|
+
def __init__(__self__, *,
|
|
32
|
+
cert: Optional[Mapping[str, _builtins.str]] = None):
|
|
33
|
+
"""
|
|
34
|
+
:param Mapping[str, _builtins.str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
|
|
35
|
+
"""
|
|
36
|
+
if cert is not None:
|
|
37
|
+
pulumi.set(__self__, "cert", cert)
|
|
38
|
+
|
|
39
|
+
@_builtins.property
|
|
40
|
+
@pulumi.getter
|
|
41
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
42
|
+
"""
|
|
43
|
+
"The accessor (required) and cert_role (optional) properties for cert auth backends".
|
|
44
|
+
"""
|
|
45
|
+
return pulumi.get(self, "cert")
|
|
46
|
+
|
|
47
|
+
|
|
48
|
+
@pulumi.output_type
|
|
49
|
+
class BackendConfigEstAuthenticators(dict):
|
|
50
|
+
def __init__(__self__, *,
|
|
51
|
+
cert: Optional[Mapping[str, _builtins.str]] = None,
|
|
52
|
+
userpass: Optional[Mapping[str, _builtins.str]] = None):
|
|
53
|
+
"""
|
|
54
|
+
:param Mapping[str, _builtins.str] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
|
|
55
|
+
:param Mapping[str, _builtins.str] userpass: The accessor (required) property for user pass auth backends.
|
|
56
|
+
"""
|
|
57
|
+
if cert is not None:
|
|
58
|
+
pulumi.set(__self__, "cert", cert)
|
|
59
|
+
if userpass is not None:
|
|
60
|
+
pulumi.set(__self__, "userpass", userpass)
|
|
61
|
+
|
|
62
|
+
@_builtins.property
|
|
63
|
+
@pulumi.getter
|
|
64
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
65
|
+
"""
|
|
66
|
+
The accessor (required) and cert_role (optional) properties for cert auth backends.
|
|
67
|
+
"""
|
|
68
|
+
return pulumi.get(self, "cert")
|
|
69
|
+
|
|
70
|
+
@_builtins.property
|
|
71
|
+
@pulumi.getter
|
|
72
|
+
def userpass(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
73
|
+
"""
|
|
74
|
+
The accessor (required) property for user pass auth backends.
|
|
75
|
+
"""
|
|
76
|
+
return pulumi.get(self, "userpass")
|
|
77
|
+
|
|
78
|
+
|
|
79
|
+
@pulumi.output_type
|
|
80
|
+
class BackendConfigScepAuthenticators(dict):
|
|
81
|
+
def __init__(__self__, *,
|
|
82
|
+
cert: Optional[Mapping[str, _builtins.str]] = None,
|
|
83
|
+
scep: Optional[Mapping[str, _builtins.str]] = None):
|
|
84
|
+
"""
|
|
85
|
+
:param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends
|
|
86
|
+
:param Mapping[str, _builtins.str] scep: The accessor property for SCEP auth backends
|
|
87
|
+
"""
|
|
88
|
+
if cert is not None:
|
|
89
|
+
pulumi.set(__self__, "cert", cert)
|
|
90
|
+
if scep is not None:
|
|
91
|
+
pulumi.set(__self__, "scep", scep)
|
|
92
|
+
|
|
93
|
+
@_builtins.property
|
|
94
|
+
@pulumi.getter
|
|
95
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
96
|
+
"""
|
|
97
|
+
The accessor and cert_role properties for cert auth backends
|
|
98
|
+
"""
|
|
99
|
+
return pulumi.get(self, "cert")
|
|
100
|
+
|
|
101
|
+
@_builtins.property
|
|
102
|
+
@pulumi.getter
|
|
103
|
+
def scep(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
104
|
+
"""
|
|
105
|
+
The accessor property for SCEP auth backends
|
|
106
|
+
"""
|
|
107
|
+
return pulumi.get(self, "scep")
|
|
108
|
+
|
|
109
|
+
|
|
110
|
+
@pulumi.output_type
|
|
111
|
+
class BackendConfigScepExternalValidation(dict):
|
|
112
|
+
def __init__(__self__, *,
|
|
113
|
+
intune: Optional[Mapping[str, _builtins.str]] = None):
|
|
114
|
+
"""
|
|
115
|
+
:param Mapping[str, _builtins.str] intune: The credentials to enable Microsoft Intune validation of SCEP requests
|
|
116
|
+
"""
|
|
117
|
+
if intune is not None:
|
|
118
|
+
pulumi.set(__self__, "intune", intune)
|
|
119
|
+
|
|
120
|
+
@_builtins.property
|
|
121
|
+
@pulumi.getter
|
|
122
|
+
def intune(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
123
|
+
"""
|
|
124
|
+
The credentials to enable Microsoft Intune validation of SCEP requests
|
|
125
|
+
"""
|
|
126
|
+
return pulumi.get(self, "intune")
|
|
127
|
+
|
|
128
|
+
|
|
129
|
+
@pulumi.output_type
|
|
130
|
+
class SecretBackendRolePolicyIdentifier(dict):
|
|
131
|
+
def __init__(__self__, *,
|
|
132
|
+
oid: _builtins.str,
|
|
133
|
+
cps: Optional[_builtins.str] = None,
|
|
134
|
+
notice: Optional[_builtins.str] = None):
|
|
135
|
+
"""
|
|
136
|
+
:param _builtins.str oid: The OID for the policy identifier
|
|
137
|
+
:param _builtins.str cps: The URL of the CPS for the policy identifier
|
|
138
|
+
:param _builtins.str notice: A notice for the policy identifier
|
|
139
|
+
"""
|
|
140
|
+
pulumi.set(__self__, "oid", oid)
|
|
141
|
+
if cps is not None:
|
|
142
|
+
pulumi.set(__self__, "cps", cps)
|
|
143
|
+
if notice is not None:
|
|
144
|
+
pulumi.set(__self__, "notice", notice)
|
|
145
|
+
|
|
146
|
+
@_builtins.property
|
|
147
|
+
@pulumi.getter
|
|
148
|
+
def oid(self) -> _builtins.str:
|
|
149
|
+
"""
|
|
150
|
+
The OID for the policy identifier
|
|
151
|
+
"""
|
|
152
|
+
return pulumi.get(self, "oid")
|
|
153
|
+
|
|
154
|
+
@_builtins.property
|
|
155
|
+
@pulumi.getter
|
|
156
|
+
def cps(self) -> Optional[_builtins.str]:
|
|
157
|
+
"""
|
|
158
|
+
The URL of the CPS for the policy identifier
|
|
159
|
+
"""
|
|
160
|
+
return pulumi.get(self, "cps")
|
|
161
|
+
|
|
162
|
+
@_builtins.property
|
|
163
|
+
@pulumi.getter
|
|
164
|
+
def notice(self) -> Optional[_builtins.str]:
|
|
165
|
+
"""
|
|
166
|
+
A notice for the policy identifier
|
|
167
|
+
"""
|
|
168
|
+
return pulumi.get(self, "notice")
|
|
169
|
+
|
|
170
|
+
|
|
171
|
+
@pulumi.output_type
|
|
172
|
+
class GetBackendConfigCmpv2AuthenticatorResult(dict):
|
|
173
|
+
def __init__(__self__, *,
|
|
174
|
+
cert: Optional[Mapping[str, _builtins.str]] = None):
|
|
175
|
+
"""
|
|
176
|
+
:param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends
|
|
177
|
+
"""
|
|
178
|
+
if cert is not None:
|
|
179
|
+
pulumi.set(__self__, "cert", cert)
|
|
180
|
+
|
|
181
|
+
@_builtins.property
|
|
182
|
+
@pulumi.getter
|
|
183
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
184
|
+
"""
|
|
185
|
+
The accessor and cert_role properties for cert auth backends
|
|
186
|
+
"""
|
|
187
|
+
return pulumi.get(self, "cert")
|
|
188
|
+
|
|
189
|
+
|
|
190
|
+
@pulumi.output_type
|
|
191
|
+
class GetBackendConfigEstAuthenticatorResult(dict):
|
|
192
|
+
def __init__(__self__, *,
|
|
193
|
+
cert: Optional[Mapping[str, _builtins.str]] = None,
|
|
194
|
+
userpass: Optional[Mapping[str, _builtins.str]] = None):
|
|
195
|
+
"""
|
|
196
|
+
:param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends.
|
|
197
|
+
:param Mapping[str, _builtins.str] userpass: The accessor property for user pass auth backends.
|
|
198
|
+
"""
|
|
199
|
+
if cert is not None:
|
|
200
|
+
pulumi.set(__self__, "cert", cert)
|
|
201
|
+
if userpass is not None:
|
|
202
|
+
pulumi.set(__self__, "userpass", userpass)
|
|
203
|
+
|
|
204
|
+
@_builtins.property
|
|
205
|
+
@pulumi.getter
|
|
206
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
207
|
+
"""
|
|
208
|
+
The accessor and cert_role properties for cert auth backends.
|
|
209
|
+
"""
|
|
210
|
+
return pulumi.get(self, "cert")
|
|
211
|
+
|
|
212
|
+
@_builtins.property
|
|
213
|
+
@pulumi.getter
|
|
214
|
+
def userpass(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
215
|
+
"""
|
|
216
|
+
The accessor property for user pass auth backends.
|
|
217
|
+
"""
|
|
218
|
+
return pulumi.get(self, "userpass")
|
|
219
|
+
|
|
220
|
+
|
|
221
|
+
@pulumi.output_type
|
|
222
|
+
class GetBackendConfigScepAuthenticatorResult(dict):
|
|
223
|
+
def __init__(__self__, *,
|
|
224
|
+
cert: Optional[Mapping[str, _builtins.str]] = None,
|
|
225
|
+
scep: Optional[Mapping[str, _builtins.str]] = None):
|
|
226
|
+
"""
|
|
227
|
+
:param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends.
|
|
228
|
+
:param Mapping[str, _builtins.str] scep: The accessor property for scep auth backends.
|
|
229
|
+
"""
|
|
230
|
+
if cert is not None:
|
|
231
|
+
pulumi.set(__self__, "cert", cert)
|
|
232
|
+
if scep is not None:
|
|
233
|
+
pulumi.set(__self__, "scep", scep)
|
|
234
|
+
|
|
235
|
+
@_builtins.property
|
|
236
|
+
@pulumi.getter
|
|
237
|
+
def cert(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
238
|
+
"""
|
|
239
|
+
The accessor and cert_role properties for cert auth backends.
|
|
240
|
+
"""
|
|
241
|
+
return pulumi.get(self, "cert")
|
|
242
|
+
|
|
243
|
+
@_builtins.property
|
|
244
|
+
@pulumi.getter
|
|
245
|
+
def scep(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
246
|
+
"""
|
|
247
|
+
The accessor property for scep auth backends.
|
|
248
|
+
"""
|
|
249
|
+
return pulumi.get(self, "scep")
|
|
250
|
+
|
|
251
|
+
|
|
252
|
+
@pulumi.output_type
|
|
253
|
+
class GetBackendConfigScepExternalValidationResult(dict):
|
|
254
|
+
def __init__(__self__, *,
|
|
255
|
+
intune: Optional[Mapping[str, _builtins.str]] = None):
|
|
256
|
+
"""
|
|
257
|
+
:param Mapping[str, _builtins.str] intune: The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
|
|
258
|
+
"""
|
|
259
|
+
if intune is not None:
|
|
260
|
+
pulumi.set(__self__, "intune", intune)
|
|
261
|
+
|
|
262
|
+
@_builtins.property
|
|
263
|
+
@pulumi.getter
|
|
264
|
+
def intune(self) -> Optional[Mapping[str, _builtins.str]]:
|
|
265
|
+
"""
|
|
266
|
+
The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
|
|
267
|
+
"""
|
|
268
|
+
return pulumi.get(self, "intune")
|
|
269
|
+
|
|
270
|
+
|