1. Packages
  2. HashiCorp Vault Provider
  3. API Docs
  4. pkiSecret
  5. getBackendConfigCmpv2
HashiCorp Vault v6.5.0 published on Thursday, Jan 16, 2025 by Pulumi

vault.pkiSecret.getBackendConfigCmpv2

Explore with Pulumi AI

vault logo
HashiCorp Vault v6.5.0 published on Thursday, Jan 16, 2025 by Pulumi

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as vault from "@pulumi/vault";
    
    const pki = new vault.Mount("pki", {
        path: "pki",
        type: "pki",
        description: "PKI secret engine mount",
    });
    const cmpv2Config = vault.pkiSecret.getBackendConfigCmpv2Output({
        backend: pki.path,
    });
    
    import pulumi
    import pulumi_vault as vault
    
    pki = vault.Mount("pki",
        path="pki",
        type="pki",
        description="PKI secret engine mount")
    cmpv2_config = vault.pkiSecret.get_backend_config_cmpv2_output(backend=pki.path)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
    	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkisecret"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		pki, err := vault.NewMount(ctx, "pki", &vault.MountArgs{
    			Path:        pulumi.String("pki"),
    			Type:        pulumi.String("pki"),
    			Description: pulumi.String("PKI secret engine mount"),
    		})
    		if err != nil {
    			return err
    		}
    		_ = pkisecret.GetBackendConfigCmpv2Output(ctx, pkisecret.GetBackendConfigCmpv2OutputArgs{
    			Backend: pki.Path,
    		}, nil)
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Vault = Pulumi.Vault;
    
    return await Deployment.RunAsync(() => 
    {
        var pki = new Vault.Mount("pki", new()
        {
            Path = "pki",
            Type = "pki",
            Description = "PKI secret engine mount",
        });
    
        var cmpv2Config = Vault.PkiSecret.GetBackendConfigCmpv2.Invoke(new()
        {
            Backend = pki.Path,
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.vault.Mount;
    import com.pulumi.vault.MountArgs;
    import com.pulumi.vault.pkiSecret.PkiSecretFunctions;
    import com.pulumi.vault.pkiSecret.inputs.GetBackendConfigCmpv2Args;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var pki = new Mount("pki", MountArgs.builder()
                .path("pki")
                .type("pki")
                .description("PKI secret engine mount")
                .build());
    
            final var cmpv2Config = PkiSecretFunctions.getBackendConfigCmpv2(GetBackendConfigCmpv2Args.builder()
                .backend(pki.path())
                .build());
    
        }
    }
    
    resources:
      pki:
        type: vault:Mount
        properties:
          path: pki
          type: pki
          description: PKI secret engine mount
    variables:
      cmpv2Config:
        fn::invoke:
          function: vault:pkiSecret:getBackendConfigCmpv2
          arguments:
            backend: ${pki.path}
    

    Using getBackendConfigCmpv2

    Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.

    function getBackendConfigCmpv2(args: GetBackendConfigCmpv2Args, opts?: InvokeOptions): Promise<GetBackendConfigCmpv2Result>
    function getBackendConfigCmpv2Output(args: GetBackendConfigCmpv2OutputArgs, opts?: InvokeOptions): Output<GetBackendConfigCmpv2Result>
    def get_backend_config_cmpv2(backend: Optional[str] = None,
                                 namespace: Optional[str] = None,
                                 opts: Optional[InvokeOptions] = None) -> GetBackendConfigCmpv2Result
    def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[str]] = None,
                                 namespace: Optional[pulumi.Input[str]] = None,
                                 opts: Optional[InvokeOptions] = None) -> Output[GetBackendConfigCmpv2Result]
    func GetBackendConfigCmpv2(ctx *Context, args *GetBackendConfigCmpv2Args, opts ...InvokeOption) (*GetBackendConfigCmpv2Result, error)
    func GetBackendConfigCmpv2Output(ctx *Context, args *GetBackendConfigCmpv2OutputArgs, opts ...InvokeOption) GetBackendConfigCmpv2ResultOutput

    > Note: This function is named GetBackendConfigCmpv2 in the Go SDK.

    public static class GetBackendConfigCmpv2 
    {
        public static Task<GetBackendConfigCmpv2Result> InvokeAsync(GetBackendConfigCmpv2Args args, InvokeOptions? opts = null)
        public static Output<GetBackendConfigCmpv2Result> Invoke(GetBackendConfigCmpv2InvokeArgs args, InvokeOptions? opts = null)
    }
    public static CompletableFuture<GetBackendConfigCmpv2Result> getBackendConfigCmpv2(GetBackendConfigCmpv2Args args, InvokeOptions options)
    public static Output<GetBackendConfigCmpv2Result> getBackendConfigCmpv2(GetBackendConfigCmpv2Args args, InvokeOptions options)
    
    fn::invoke:
      function: vault:pkiSecret/getBackendConfigCmpv2:getBackendConfigCmpv2
      arguments:
        # arguments dictionary

    The following arguments are supported:

    Backend string
    The path to the PKI secret backend to read the CMPv2 configuration from, with no leading or trailing /s.

    Attributes Reference

    Namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    Backend string
    The path to the PKI secret backend to read the CMPv2 configuration from, with no leading or trailing /s.

    Attributes Reference

    Namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    backend String
    The path to the PKI secret backend to read the CMPv2 configuration from, with no leading or trailing /s.

    Attributes Reference

    namespace String
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    backend string
    The path to the PKI secret backend to read the CMPv2 configuration from, with no leading or trailing /s.

    Attributes Reference

    namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    backend str
    The path to the PKI secret backend to read the CMPv2 configuration from, with no leading or trailing /s.

    Attributes Reference

    namespace str
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    backend String
    The path to the PKI secret backend to read the CMPv2 configuration from, with no leading or trailing /s.

    Attributes Reference

    namespace String
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.

    getBackendConfigCmpv2 Result

    The following output properties are available:

    AuditFields List<string>
    Authenticators List<GetBackendConfigCmpv2Authenticator>
    Backend string
    DefaultPathPolicy string
    EnableSentinelParsing bool
    Enabled bool
    Id string
    The provider-assigned unique ID for this managed resource.
    LastUpdated string
    Namespace string
    AuditFields []string
    Authenticators []GetBackendConfigCmpv2Authenticator
    Backend string
    DefaultPathPolicy string
    EnableSentinelParsing bool
    Enabled bool
    Id string
    The provider-assigned unique ID for this managed resource.
    LastUpdated string
    Namespace string
    auditFields List<String>
    authenticators List<GetBackendConfigCmpv2Authenticator>
    backend String
    defaultPathPolicy String
    enableSentinelParsing Boolean
    enabled Boolean
    id String
    The provider-assigned unique ID for this managed resource.
    lastUpdated String
    namespace String
    auditFields string[]
    authenticators GetBackendConfigCmpv2Authenticator[]
    backend string
    defaultPathPolicy string
    enableSentinelParsing boolean
    enabled boolean
    id string
    The provider-assigned unique ID for this managed resource.
    lastUpdated string
    namespace string
    auditFields List<String>
    authenticators List<Property Map>
    backend String
    defaultPathPolicy String
    enableSentinelParsing Boolean
    enabled Boolean
    id String
    The provider-assigned unique ID for this managed resource.
    lastUpdated String
    namespace String

    Supporting Types

    GetBackendConfigCmpv2Authenticator

    Cert Dictionary<string, string>
    The accessor and cert_role properties for cert auth backends
    Cert map[string]string
    The accessor and cert_role properties for cert auth backends
    cert Map<String,String>
    The accessor and cert_role properties for cert auth backends
    cert {[key: string]: string}
    The accessor and cert_role properties for cert auth backends
    cert Mapping[str, str]
    The accessor and cert_role properties for cert auth backends
    cert Map<String>
    The accessor and cert_role properties for cert auth backends

    Package Details

    Repository
    Vault pulumi/pulumi-vault
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the vault Terraform Provider.
    vault logo
    HashiCorp Vault v6.5.0 published on Thursday, Jan 16, 2025 by Pulumi