HashiCorp Vault v6.5.0 published on Thursday, Jan 16, 2025 by Pulumi
vault.pkiSecret.getBackendConfigCmpv2
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const pki = new vault.Mount("pki", {
path: "pki",
type: "pki",
description: "PKI secret engine mount",
});
const cmpv2Config = vault.pkiSecret.getBackendConfigCmpv2Output({
backend: pki.path,
});
import pulumi
import pulumi_vault as vault
pki = vault.Mount("pki",
path="pki",
type="pki",
description="PKI secret engine mount")
cmpv2_config = vault.pkiSecret.get_backend_config_cmpv2_output(backend=pki.path)
package main
import (
"github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkisecret"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
pki, err := vault.NewMount(ctx, "pki", &vault.MountArgs{
Path: pulumi.String("pki"),
Type: pulumi.String("pki"),
Description: pulumi.String("PKI secret engine mount"),
})
if err != nil {
return err
}
_ = pkisecret.GetBackendConfigCmpv2Output(ctx, pkisecret.GetBackendConfigCmpv2OutputArgs{
Backend: pki.Path,
}, nil)
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var pki = new Vault.Mount("pki", new()
{
Path = "pki",
Type = "pki",
Description = "PKI secret engine mount",
});
var cmpv2Config = Vault.PkiSecret.GetBackendConfigCmpv2.Invoke(new()
{
Backend = pki.Path,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.Mount;
import com.pulumi.vault.MountArgs;
import com.pulumi.vault.pkiSecret.PkiSecretFunctions;
import com.pulumi.vault.pkiSecret.inputs.GetBackendConfigCmpv2Args;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var pki = new Mount("pki", MountArgs.builder()
.path("pki")
.type("pki")
.description("PKI secret engine mount")
.build());
final var cmpv2Config = PkiSecretFunctions.getBackendConfigCmpv2(GetBackendConfigCmpv2Args.builder()
.backend(pki.path())
.build());
}
}
resources:
pki:
type: vault:Mount
properties:
path: pki
type: pki
description: PKI secret engine mount
variables:
cmpv2Config:
fn::invoke:
function: vault:pkiSecret:getBackendConfigCmpv2
arguments:
backend: ${pki.path}
Using getBackendConfigCmpv2
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getBackendConfigCmpv2(args: GetBackendConfigCmpv2Args, opts?: InvokeOptions): Promise<GetBackendConfigCmpv2Result>
function getBackendConfigCmpv2Output(args: GetBackendConfigCmpv2OutputArgs, opts?: InvokeOptions): Output<GetBackendConfigCmpv2Result>
def get_backend_config_cmpv2(backend: Optional[str] = None,
namespace: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetBackendConfigCmpv2Result
def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[str]] = None,
namespace: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetBackendConfigCmpv2Result]
func GetBackendConfigCmpv2(ctx *Context, args *GetBackendConfigCmpv2Args, opts ...InvokeOption) (*GetBackendConfigCmpv2Result, error)
func GetBackendConfigCmpv2Output(ctx *Context, args *GetBackendConfigCmpv2OutputArgs, opts ...InvokeOption) GetBackendConfigCmpv2ResultOutput
> Note: This function is named GetBackendConfigCmpv2
in the Go SDK.
public static class GetBackendConfigCmpv2
{
public static Task<GetBackendConfigCmpv2Result> InvokeAsync(GetBackendConfigCmpv2Args args, InvokeOptions? opts = null)
public static Output<GetBackendConfigCmpv2Result> Invoke(GetBackendConfigCmpv2InvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetBackendConfigCmpv2Result> getBackendConfigCmpv2(GetBackendConfigCmpv2Args args, InvokeOptions options)
public static Output<GetBackendConfigCmpv2Result> getBackendConfigCmpv2(GetBackendConfigCmpv2Args args, InvokeOptions options)
fn::invoke:
function: vault:pkiSecret/getBackendConfigCmpv2:getBackendConfigCmpv2
arguments:
# arguments dictionary
The following arguments are supported:
- Backend string
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing
/
s.Attributes Reference
- Namespace string
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Backend string
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing
/
s.Attributes Reference
- Namespace string
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend String
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing
/
s.Attributes Reference
- namespace String
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend string
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing
/
s.Attributes Reference
- namespace string
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend str
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing
/
s.Attributes Reference
- namespace str
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend String
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing
/
s.Attributes Reference
- namespace String
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise.
getBackendConfigCmpv2 Result
The following output properties are available:
- Audit
Fields List<string> - Authenticators
List<Get
Backend Config Cmpv2Authenticator> - Backend string
- Default
Path stringPolicy - Enable
Sentinel boolParsing - Enabled bool
- Id string
- The provider-assigned unique ID for this managed resource.
- Last
Updated string - Namespace string
- Audit
Fields []string - Authenticators
[]Get
Backend Config Cmpv2Authenticator - Backend string
- Default
Path stringPolicy - Enable
Sentinel boolParsing - Enabled bool
- Id string
- The provider-assigned unique ID for this managed resource.
- Last
Updated string - Namespace string
- audit
Fields List<String> - authenticators
List<Get
Backend Config Cmpv2Authenticator> - backend String
- default
Path StringPolicy - enable
Sentinel BooleanParsing - enabled Boolean
- id String
- The provider-assigned unique ID for this managed resource.
- last
Updated String - namespace String
- audit
Fields string[] - authenticators
Get
Backend Config Cmpv2Authenticator[] - backend string
- default
Path stringPolicy - enable
Sentinel booleanParsing - enabled boolean
- id string
- The provider-assigned unique ID for this managed resource.
- last
Updated string - namespace string
- audit_
fields Sequence[str] - authenticators
Sequence[pkisecret.
Get Backend Config Cmpv2Authenticator] - backend str
- default_
path_ strpolicy - enable_
sentinel_ boolparsing - enabled bool
- id str
- The provider-assigned unique ID for this managed resource.
- last_
updated str - namespace str
- audit
Fields List<String> - authenticators List<Property Map>
- backend String
- default
Path StringPolicy - enable
Sentinel BooleanParsing - enabled Boolean
- id String
- The provider-assigned unique ID for this managed resource.
- last
Updated String - namespace String
Supporting Types
GetBackendConfigCmpv2Authenticator
- Cert Dictionary<string, string>
- The accessor and cert_role properties for cert auth backends
- Cert map[string]string
- The accessor and cert_role properties for cert auth backends
- cert Map<String,String>
- The accessor and cert_role properties for cert auth backends
- cert {[key: string]: string}
- The accessor and cert_role properties for cert auth backends
- cert Mapping[str, str]
- The accessor and cert_role properties for cert auth backends
- cert Map<String>
- The accessor and cert_role properties for cert auth backends
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
vault
Terraform Provider.