pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 6.5.0a1736836139__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (229) hide show
  1. pulumi_vault/__init__.py +52 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +26 -9
  5. pulumi_vault/ad/secret_backend.py +16 -142
  6. pulumi_vault/ad/secret_library.py +16 -9
  7. pulumi_vault/ad/secret_role.py +14 -9
  8. pulumi_vault/alicloud/auth_backend_role.py +76 -190
  9. pulumi_vault/approle/auth_backend_login.py +12 -7
  10. pulumi_vault/approle/auth_backend_role.py +77 -191
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -7
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -5
  13. pulumi_vault/audit.py +30 -21
  14. pulumi_vault/audit_request_header.py +11 -2
  15. pulumi_vault/auth_backend.py +66 -14
  16. pulumi_vault/aws/auth_backend_cert.py +18 -9
  17. pulumi_vault/aws/auth_backend_client.py +267 -22
  18. pulumi_vault/aws/auth_backend_config_identity.py +14 -9
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +20 -15
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +77 -191
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -13
  24. pulumi_vault/aws/auth_backend_sts_role.py +14 -9
  25. pulumi_vault/aws/get_access_credentials.py +38 -9
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +77 -9
  28. pulumi_vault/aws/secret_backend_role.py +185 -9
  29. pulumi_vault/aws/secret_backend_static_role.py +20 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +153 -15
  32. pulumi_vault/azure/auth_backend_role.py +77 -191
  33. pulumi_vault/azure/backend.py +227 -21
  34. pulumi_vault/azure/backend_role.py +42 -37
  35. pulumi_vault/azure/get_access_credentials.py +41 -7
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -267
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +28 -19
  44. pulumi_vault/consul/secret_backend_role.py +18 -78
  45. pulumi_vault/database/_inputs.py +2770 -881
  46. pulumi_vault/database/outputs.py +721 -838
  47. pulumi_vault/database/secret_backend_connection.py +119 -112
  48. pulumi_vault/database/secret_backend_role.py +31 -22
  49. pulumi_vault/database/secret_backend_static_role.py +87 -13
  50. pulumi_vault/database/secrets_mount.py +427 -136
  51. pulumi_vault/egp_policy.py +16 -11
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +250 -33
  54. pulumi_vault/gcp/auth_backend_role.py +77 -269
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -5
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -12
  58. pulumi_vault/gcp/secret_impersonated_account.py +76 -15
  59. pulumi_vault/gcp/secret_roleset.py +31 -24
  60. pulumi_vault/gcp/secret_static_account.py +39 -32
  61. pulumi_vault/generic/endpoint.py +24 -17
  62. pulumi_vault/generic/get_secret.py +64 -8
  63. pulumi_vault/generic/secret.py +21 -16
  64. pulumi_vault/get_auth_backend.py +24 -7
  65. pulumi_vault/get_auth_backends.py +51 -9
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -11
  69. pulumi_vault/get_policy_document.py +34 -19
  70. pulumi_vault/get_raft_autopilot_state.py +29 -10
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +19 -14
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +16 -11
  75. pulumi_vault/github/user.py +16 -11
  76. pulumi_vault/identity/entity.py +20 -13
  77. pulumi_vault/identity/entity_alias.py +20 -13
  78. pulumi_vault/identity/entity_policies.py +28 -11
  79. pulumi_vault/identity/get_entity.py +42 -10
  80. pulumi_vault/identity/get_group.py +47 -9
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -7
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -9
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -10
  84. pulumi_vault/identity/group.py +58 -39
  85. pulumi_vault/identity/group_alias.py +16 -9
  86. pulumi_vault/identity/group_member_entity_ids.py +28 -66
  87. pulumi_vault/identity/group_member_group_ids.py +40 -19
  88. pulumi_vault/identity/group_policies.py +20 -7
  89. pulumi_vault/identity/mfa_duo.py +11 -6
  90. pulumi_vault/identity/mfa_login_enforcement.py +15 -6
  91. pulumi_vault/identity/mfa_okta.py +11 -6
  92. pulumi_vault/identity/mfa_pingid.py +7 -2
  93. pulumi_vault/identity/mfa_totp.py +7 -2
  94. pulumi_vault/identity/oidc.py +12 -7
  95. pulumi_vault/identity/oidc_assignment.py +24 -11
  96. pulumi_vault/identity/oidc_client.py +36 -23
  97. pulumi_vault/identity/oidc_key.py +30 -17
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -15
  99. pulumi_vault/identity/oidc_provider.py +36 -21
  100. pulumi_vault/identity/oidc_role.py +42 -21
  101. pulumi_vault/identity/oidc_scope.py +20 -13
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +45 -40
  105. pulumi_vault/jwt/auth_backend_role.py +133 -254
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +24 -19
  108. pulumi_vault/kmip/secret_role.py +14 -9
  109. pulumi_vault/kmip/secret_scope.py +14 -9
  110. pulumi_vault/kubernetes/auth_backend_config.py +57 -5
  111. pulumi_vault/kubernetes/auth_backend_role.py +70 -177
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -11
  115. pulumi_vault/kubernetes/secret_backend.py +316 -27
  116. pulumi_vault/kubernetes/secret_backend_role.py +137 -46
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +25 -8
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +33 -10
  120. pulumi_vault/kv/get_secret_v2.py +85 -9
  121. pulumi_vault/kv/get_secrets_list.py +24 -11
  122. pulumi_vault/kv/get_secrets_list_v2.py +37 -15
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +23 -16
  125. pulumi_vault/kv/secret_backend_v2.py +20 -11
  126. pulumi_vault/kv/secret_v2.py +59 -50
  127. pulumi_vault/ldap/auth_backend.py +127 -166
  128. pulumi_vault/ldap/auth_backend_group.py +14 -9
  129. pulumi_vault/ldap/auth_backend_user.py +14 -9
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +354 -82
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +18 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +16 -9
  135. pulumi_vault/ldap/secret_backend_static_role.py +73 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +29 -57
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +18 -11
  140. pulumi_vault/mfa_okta.py +18 -11
  141. pulumi_vault/mfa_pingid.py +18 -11
  142. pulumi_vault/mfa_totp.py +24 -17
  143. pulumi_vault/mongodbatlas/secret_backend.py +20 -15
  144. pulumi_vault/mongodbatlas/secret_role.py +47 -38
  145. pulumi_vault/mount.py +391 -51
  146. pulumi_vault/namespace.py +68 -83
  147. pulumi_vault/nomad_secret_backend.py +18 -13
  148. pulumi_vault/nomad_secret_role.py +14 -9
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +485 -39
  151. pulumi_vault/okta/auth_backend_group.py +14 -9
  152. pulumi_vault/okta/auth_backend_user.py +14 -9
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +20 -13
  156. pulumi_vault/pkisecret/__init__.py +3 -0
  157. pulumi_vault/pkisecret/_inputs.py +81 -0
  158. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  159. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  160. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  161. pulumi_vault/pkisecret/get_backend_issuer.py +67 -9
  162. pulumi_vault/pkisecret/get_backend_issuers.py +21 -8
  163. pulumi_vault/pkisecret/get_backend_key.py +24 -9
  164. pulumi_vault/pkisecret/get_backend_keys.py +21 -8
  165. pulumi_vault/pkisecret/outputs.py +69 -0
  166. pulumi_vault/pkisecret/secret_backend_cert.py +18 -11
  167. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -11
  168. pulumi_vault/pkisecret/secret_backend_config_issuers.py +14 -9
  169. pulumi_vault/pkisecret/secret_backend_config_urls.py +67 -11
  170. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -9
  171. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -11
  172. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -17
  173. pulumi_vault/pkisecret/secret_backend_issuer.py +14 -9
  174. pulumi_vault/pkisecret/secret_backend_key.py +14 -9
  175. pulumi_vault/pkisecret/secret_backend_role.py +21 -14
  176. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -48
  177. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -56
  178. pulumi_vault/pkisecret/secret_backend_sign.py +18 -54
  179. pulumi_vault/plugin.py +595 -0
  180. pulumi_vault/plugin_pinned_version.py +298 -0
  181. pulumi_vault/policy.py +14 -9
  182. pulumi_vault/provider.py +48 -53
  183. pulumi_vault/pulumi-plugin.json +2 -1
  184. pulumi_vault/quota_lease_count.py +60 -6
  185. pulumi_vault/quota_rate_limit.py +56 -2
  186. pulumi_vault/rabbitmq/_inputs.py +61 -0
  187. pulumi_vault/rabbitmq/outputs.py +5 -0
  188. pulumi_vault/rabbitmq/secret_backend.py +18 -13
  189. pulumi_vault/rabbitmq/secret_backend_role.py +54 -47
  190. pulumi_vault/raft_autopilot.py +14 -9
  191. pulumi_vault/raft_snapshot_agent_config.py +129 -224
  192. pulumi_vault/rgp_policy.py +14 -9
  193. pulumi_vault/saml/auth_backend.py +22 -17
  194. pulumi_vault/saml/auth_backend_role.py +92 -197
  195. pulumi_vault/secrets/__init__.py +3 -0
  196. pulumi_vault/secrets/_inputs.py +110 -0
  197. pulumi_vault/secrets/outputs.py +94 -0
  198. pulumi_vault/secrets/sync_association.py +56 -71
  199. pulumi_vault/secrets/sync_aws_destination.py +242 -27
  200. pulumi_vault/secrets/sync_azure_destination.py +92 -31
  201. pulumi_vault/secrets/sync_config.py +9 -4
  202. pulumi_vault/secrets/sync_gcp_destination.py +158 -25
  203. pulumi_vault/secrets/sync_gh_destination.py +189 -13
  204. pulumi_vault/secrets/sync_github_apps.py +375 -0
  205. pulumi_vault/secrets/sync_vercel_destination.py +74 -13
  206. pulumi_vault/ssh/_inputs.py +28 -28
  207. pulumi_vault/ssh/outputs.py +11 -28
  208. pulumi_vault/ssh/secret_backend_ca.py +108 -9
  209. pulumi_vault/ssh/secret_backend_role.py +85 -118
  210. pulumi_vault/terraformcloud/secret_backend.py +7 -54
  211. pulumi_vault/terraformcloud/secret_creds.py +14 -20
  212. pulumi_vault/terraformcloud/secret_role.py +16 -74
  213. pulumi_vault/token.py +28 -23
  214. pulumi_vault/tokenauth/auth_backend_role.py +78 -199
  215. pulumi_vault/transform/alphabet.py +16 -9
  216. pulumi_vault/transform/get_decode.py +45 -17
  217. pulumi_vault/transform/get_encode.py +45 -17
  218. pulumi_vault/transform/role.py +16 -9
  219. pulumi_vault/transform/template.py +30 -21
  220. pulumi_vault/transform/transformation.py +12 -7
  221. pulumi_vault/transit/get_decrypt.py +26 -21
  222. pulumi_vault/transit/get_encrypt.py +24 -19
  223. pulumi_vault/transit/secret_backend_key.py +27 -93
  224. pulumi_vault/transit/secret_cache_config.py +12 -7
  225. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/METADATA +8 -7
  226. pulumi_vault-6.5.0a1736836139.dist-info/RECORD +256 -0
  227. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/WHEEL +1 -1
  228. pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
  229. {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-6.5.0a1736836139.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,251 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+
18
+ __all__ = [
19
+ 'GetBackendConfigEstResult',
20
+ 'AwaitableGetBackendConfigEstResult',
21
+ 'get_backend_config_est',
22
+ 'get_backend_config_est_output',
23
+ ]
24
+
25
+ @pulumi.output_type
26
+ class GetBackendConfigEstResult:
27
+ """
28
+ A collection of values returned by getBackendConfigEst.
29
+ """
30
+ def __init__(__self__, audit_fields=None, authenticators=None, backend=None, default_mount=None, default_path_policy=None, enable_sentinel_parsing=None, enabled=None, id=None, label_to_path_policy=None, last_updated=None, namespace=None):
31
+ if audit_fields and not isinstance(audit_fields, list):
32
+ raise TypeError("Expected argument 'audit_fields' to be a list")
33
+ pulumi.set(__self__, "audit_fields", audit_fields)
34
+ if authenticators and not isinstance(authenticators, list):
35
+ raise TypeError("Expected argument 'authenticators' to be a list")
36
+ pulumi.set(__self__, "authenticators", authenticators)
37
+ if backend and not isinstance(backend, str):
38
+ raise TypeError("Expected argument 'backend' to be a str")
39
+ pulumi.set(__self__, "backend", backend)
40
+ if default_mount and not isinstance(default_mount, bool):
41
+ raise TypeError("Expected argument 'default_mount' to be a bool")
42
+ pulumi.set(__self__, "default_mount", default_mount)
43
+ if default_path_policy and not isinstance(default_path_policy, str):
44
+ raise TypeError("Expected argument 'default_path_policy' to be a str")
45
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
46
+ if enable_sentinel_parsing and not isinstance(enable_sentinel_parsing, bool):
47
+ raise TypeError("Expected argument 'enable_sentinel_parsing' to be a bool")
48
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
49
+ if enabled and not isinstance(enabled, bool):
50
+ raise TypeError("Expected argument 'enabled' to be a bool")
51
+ pulumi.set(__self__, "enabled", enabled)
52
+ if id and not isinstance(id, str):
53
+ raise TypeError("Expected argument 'id' to be a str")
54
+ pulumi.set(__self__, "id", id)
55
+ if label_to_path_policy and not isinstance(label_to_path_policy, dict):
56
+ raise TypeError("Expected argument 'label_to_path_policy' to be a dict")
57
+ pulumi.set(__self__, "label_to_path_policy", label_to_path_policy)
58
+ if last_updated and not isinstance(last_updated, str):
59
+ raise TypeError("Expected argument 'last_updated' to be a str")
60
+ pulumi.set(__self__, "last_updated", last_updated)
61
+ if namespace and not isinstance(namespace, str):
62
+ raise TypeError("Expected argument 'namespace' to be a str")
63
+ pulumi.set(__self__, "namespace", namespace)
64
+
65
+ @property
66
+ @pulumi.getter(name="auditFields")
67
+ def audit_fields(self) -> Sequence[str]:
68
+ """
69
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
70
+ """
71
+ return pulumi.get(self, "audit_fields")
72
+
73
+ @property
74
+ @pulumi.getter
75
+ def authenticators(self) -> Sequence['outputs.GetBackendConfigEstAuthenticatorResult']:
76
+ """
77
+ Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
78
+ """
79
+ return pulumi.get(self, "authenticators")
80
+
81
+ @property
82
+ @pulumi.getter
83
+ def backend(self) -> str:
84
+ return pulumi.get(self, "backend")
85
+
86
+ @property
87
+ @pulumi.getter(name="defaultMount")
88
+ def default_mount(self) -> bool:
89
+ """
90
+ If set, this mount is registered as the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
91
+ """
92
+ return pulumi.get(self, "default_mount")
93
+
94
+ @property
95
+ @pulumi.getter(name="defaultPathPolicy")
96
+ def default_path_policy(self) -> str:
97
+ """
98
+ Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
99
+ """
100
+ return pulumi.get(self, "default_path_policy")
101
+
102
+ @property
103
+ @pulumi.getter(name="enableSentinelParsing")
104
+ def enable_sentinel_parsing(self) -> bool:
105
+ """
106
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
107
+ """
108
+ return pulumi.get(self, "enable_sentinel_parsing")
109
+
110
+ @property
111
+ @pulumi.getter
112
+ def enabled(self) -> bool:
113
+ """
114
+ Specifies whether EST is enabled.
115
+ """
116
+ return pulumi.get(self, "enabled")
117
+
118
+ @property
119
+ @pulumi.getter
120
+ def id(self) -> str:
121
+ """
122
+ The provider-assigned unique ID for this managed resource.
123
+ """
124
+ return pulumi.get(self, "id")
125
+
126
+ @property
127
+ @pulumi.getter(name="labelToPathPolicy")
128
+ def label_to_path_policy(self) -> Mapping[str, str]:
129
+ """
130
+ A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
131
+ """
132
+ return pulumi.get(self, "label_to_path_policy")
133
+
134
+ @property
135
+ @pulumi.getter(name="lastUpdated")
136
+ def last_updated(self) -> str:
137
+ """
138
+ A read-only timestamp representing the last time the configuration was updated.
139
+ """
140
+ return pulumi.get(self, "last_updated")
141
+
142
+ @property
143
+ @pulumi.getter
144
+ def namespace(self) -> Optional[str]:
145
+ return pulumi.get(self, "namespace")
146
+
147
+
148
+ class AwaitableGetBackendConfigEstResult(GetBackendConfigEstResult):
149
+ # pylint: disable=using-constant-test
150
+ def __await__(self):
151
+ if False:
152
+ yield self
153
+ return GetBackendConfigEstResult(
154
+ audit_fields=self.audit_fields,
155
+ authenticators=self.authenticators,
156
+ backend=self.backend,
157
+ default_mount=self.default_mount,
158
+ default_path_policy=self.default_path_policy,
159
+ enable_sentinel_parsing=self.enable_sentinel_parsing,
160
+ enabled=self.enabled,
161
+ id=self.id,
162
+ label_to_path_policy=self.label_to_path_policy,
163
+ last_updated=self.last_updated,
164
+ namespace=self.namespace)
165
+
166
+
167
+ def get_backend_config_est(backend: Optional[str] = None,
168
+ namespace: Optional[str] = None,
169
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigEstResult:
170
+ """
171
+ ## Example Usage
172
+
173
+ ```python
174
+ import pulumi
175
+ import pulumi_vault as vault
176
+
177
+ pki = vault.Mount("pki",
178
+ path="pki",
179
+ type="pki",
180
+ description="PKI secret engine mount")
181
+ est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
182
+ ```
183
+
184
+
185
+ :param str backend: The path to the PKI secret backend to
186
+ read the EST configuration from, with no leading or trailing `/`s.
187
+ :param str namespace: The namespace of the target resource.
188
+ The value should not contain leading or trailing forward slashes.
189
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
190
+ *Available only for Vault Enterprise*.
191
+ """
192
+ __args__ = dict()
193
+ __args__['backend'] = backend
194
+ __args__['namespace'] = namespace
195
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
196
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult).value
197
+
198
+ return AwaitableGetBackendConfigEstResult(
199
+ audit_fields=pulumi.get(__ret__, 'audit_fields'),
200
+ authenticators=pulumi.get(__ret__, 'authenticators'),
201
+ backend=pulumi.get(__ret__, 'backend'),
202
+ default_mount=pulumi.get(__ret__, 'default_mount'),
203
+ default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
204
+ enable_sentinel_parsing=pulumi.get(__ret__, 'enable_sentinel_parsing'),
205
+ enabled=pulumi.get(__ret__, 'enabled'),
206
+ id=pulumi.get(__ret__, 'id'),
207
+ label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
208
+ last_updated=pulumi.get(__ret__, 'last_updated'),
209
+ namespace=pulumi.get(__ret__, 'namespace'))
210
+ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
211
+ namespace: Optional[pulumi.Input[Optional[str]]] = None,
212
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
213
+ """
214
+ ## Example Usage
215
+
216
+ ```python
217
+ import pulumi
218
+ import pulumi_vault as vault
219
+
220
+ pki = vault.Mount("pki",
221
+ path="pki",
222
+ type="pki",
223
+ description="PKI secret engine mount")
224
+ est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
225
+ ```
226
+
227
+
228
+ :param str backend: The path to the PKI secret backend to
229
+ read the EST configuration from, with no leading or trailing `/`s.
230
+ :param str namespace: The namespace of the target resource.
231
+ The value should not contain leading or trailing forward slashes.
232
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
233
+ *Available only for Vault Enterprise*.
234
+ """
235
+ __args__ = dict()
236
+ __args__['backend'] = backend
237
+ __args__['namespace'] = namespace
238
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
239
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
240
+ return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
241
+ audit_fields=pulumi.get(__response__, 'audit_fields'),
242
+ authenticators=pulumi.get(__response__, 'authenticators'),
243
+ backend=pulumi.get(__response__, 'backend'),
244
+ default_mount=pulumi.get(__response__, 'default_mount'),
245
+ default_path_policy=pulumi.get(__response__, 'default_path_policy'),
246
+ enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
247
+ enabled=pulumi.get(__response__, 'enabled'),
248
+ id=pulumi.get(__response__, 'id'),
249
+ label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
250
+ last_updated=pulumi.get(__response__, 'last_updated'),
251
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -173,14 +178,33 @@ def get_backend_issuer(backend: Optional[str] = None,
173
178
  namespace: Optional[str] = None,
174
179
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
175
180
  """
176
- Use this data source to access information about an existing resource.
181
+ ## Example Usage
182
+
183
+ ```python
184
+ import pulumi
185
+ import pulumi_vault as vault
186
+
187
+ pki = vault.Mount("pki",
188
+ path="pki",
189
+ type="pki",
190
+ description="PKI secret engine mount")
191
+ root = vault.pki_secret.SecretBackendRootCert("root",
192
+ backend=pki.path,
193
+ type="internal",
194
+ common_name="example",
195
+ ttl="86400",
196
+ issuer_name="example")
197
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
198
+ issuer_ref=issuer_id))
199
+ ```
200
+
177
201
 
178
202
  :param str backend: The path to the PKI secret backend to
179
203
  read the issuer from, with no leading or trailing `/`s.
180
204
  :param str issuer_ref: Reference to an existing issuer.
181
205
  :param str namespace: The namespace of the target resource.
182
206
  The value should not contain leading or trailing forward slashes.
183
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
207
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
184
208
  *Available only for Vault Enterprise*.
185
209
  """
186
210
  __args__ = dict()
@@ -203,22 +227,56 @@ def get_backend_issuer(backend: Optional[str] = None,
203
227
  manual_chains=pulumi.get(__ret__, 'manual_chains'),
204
228
  namespace=pulumi.get(__ret__, 'namespace'),
205
229
  usage=pulumi.get(__ret__, 'usage'))
206
-
207
-
208
- @_utilities.lift_output_func(get_backend_issuer)
209
230
  def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
210
231
  issuer_ref: Optional[pulumi.Input[str]] = None,
211
232
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
212
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuerResult]:
233
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
213
234
  """
214
- Use this data source to access information about an existing resource.
235
+ ## Example Usage
236
+
237
+ ```python
238
+ import pulumi
239
+ import pulumi_vault as vault
240
+
241
+ pki = vault.Mount("pki",
242
+ path="pki",
243
+ type="pki",
244
+ description="PKI secret engine mount")
245
+ root = vault.pki_secret.SecretBackendRootCert("root",
246
+ backend=pki.path,
247
+ type="internal",
248
+ common_name="example",
249
+ ttl="86400",
250
+ issuer_name="example")
251
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
252
+ issuer_ref=issuer_id))
253
+ ```
254
+
215
255
 
216
256
  :param str backend: The path to the PKI secret backend to
217
257
  read the issuer from, with no leading or trailing `/`s.
218
258
  :param str issuer_ref: Reference to an existing issuer.
219
259
  :param str namespace: The namespace of the target resource.
220
260
  The value should not contain leading or trailing forward slashes.
221
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
261
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
222
262
  *Available only for Vault Enterprise*.
223
263
  """
224
- ...
264
+ __args__ = dict()
265
+ __args__['backend'] = backend
266
+ __args__['issuerRef'] = issuer_ref
267
+ __args__['namespace'] = namespace
268
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
269
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
270
+ return __ret__.apply(lambda __response__: GetBackendIssuerResult(
271
+ backend=pulumi.get(__response__, 'backend'),
272
+ ca_chains=pulumi.get(__response__, 'ca_chains'),
273
+ certificate=pulumi.get(__response__, 'certificate'),
274
+ id=pulumi.get(__response__, 'id'),
275
+ issuer_id=pulumi.get(__response__, 'issuer_id'),
276
+ issuer_name=pulumi.get(__response__, 'issuer_name'),
277
+ issuer_ref=pulumi.get(__response__, 'issuer_ref'),
278
+ key_id=pulumi.get(__response__, 'key_id'),
279
+ leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
280
+ manual_chains=pulumi.get(__response__, 'manual_chains'),
281
+ namespace=pulumi.get(__response__, 'namespace'),
282
+ usage=pulumi.get(__response__, 'usage')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -56,7 +61,7 @@ class GetBackendIssuersResult:
56
61
 
57
62
  @property
58
63
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
64
+ def key_info(self) -> Mapping[str, str]:
60
65
  """
61
66
  Map of issuer strings read from Vault.
62
67
  """
@@ -126,7 +131,7 @@ def get_backend_issuers(backend: Optional[str] = None,
126
131
  read the issuers from, with no leading or trailing `/`s.
127
132
  :param str namespace: The namespace of the target resource.
128
133
  The value should not contain leading or trailing forward slashes.
129
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
130
135
  *Available only for Vault Enterprise*.
131
136
  """
132
137
  __args__ = dict()
@@ -142,12 +147,9 @@ def get_backend_issuers(backend: Optional[str] = None,
142
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
143
148
  keys=pulumi.get(__ret__, 'keys'),
144
149
  namespace=pulumi.get(__ret__, 'namespace'))
145
-
146
-
147
- @_utilities.lift_output_func(get_backend_issuers)
148
150
  def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
149
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
150
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
152
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
151
153
  """
152
154
  ## Example Usage
153
155
 
@@ -173,7 +175,18 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
173
175
  read the issuers from, with no leading or trailing `/`s.
174
176
  :param str namespace: The namespace of the target resource.
175
177
  The value should not contain leading or trailing forward slashes.
176
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
178
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
179
  *Available only for Vault Enterprise*.
178
180
  """
179
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
186
+ return __ret__.apply(lambda __response__: GetBackendIssuersResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -128,7 +133,7 @@ def get_backend_key(backend: Optional[str] = None,
128
133
  key_name="example",
129
134
  key_type="rsa",
130
135
  key_bits=4096)
131
- example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
136
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
132
137
  key_ref=key_id))
133
138
  ```
134
139
 
@@ -138,7 +143,7 @@ def get_backend_key(backend: Optional[str] = None,
138
143
  :param str key_ref: Reference to an existing key.
139
144
  :param str namespace: The namespace of the target resource.
140
145
  The value should not contain leading or trailing forward slashes.
141
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
146
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
142
147
  *Available only for Vault Enterprise*.
143
148
  """
144
149
  __args__ = dict()
@@ -156,13 +161,10 @@ def get_backend_key(backend: Optional[str] = None,
156
161
  key_ref=pulumi.get(__ret__, 'key_ref'),
157
162
  key_type=pulumi.get(__ret__, 'key_type'),
158
163
  namespace=pulumi.get(__ret__, 'namespace'))
159
-
160
-
161
- @_utilities.lift_output_func(get_backend_key)
162
164
  def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
163
165
  key_ref: Optional[pulumi.Input[str]] = None,
164
166
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
165
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeyResult]:
167
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
166
168
  """
167
169
  ## Example Usage
168
170
 
@@ -180,7 +182,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
180
182
  key_name="example",
181
183
  key_type="rsa",
182
184
  key_bits=4096)
183
- example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=vault_mount["key"]["path"],
185
+ example = key.key_id.apply(lambda key_id: vault.pkiSecret.get_backend_key_output(backend=key_vault_mount["path"],
184
186
  key_ref=key_id))
185
187
  ```
186
188
 
@@ -190,7 +192,20 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
190
192
  :param str key_ref: Reference to an existing key.
191
193
  :param str namespace: The namespace of the target resource.
192
194
  The value should not contain leading or trailing forward slashes.
193
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
195
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
194
196
  *Available only for Vault Enterprise*.
195
197
  """
196
- ...
198
+ __args__ = dict()
199
+ __args__['backend'] = backend
200
+ __args__['keyRef'] = key_ref
201
+ __args__['namespace'] = namespace
202
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
203
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKey:getBackendKey', __args__, opts=opts, typ=GetBackendKeyResult)
204
+ return __ret__.apply(lambda __response__: GetBackendKeyResult(
205
+ backend=pulumi.get(__response__, 'backend'),
206
+ id=pulumi.get(__response__, 'id'),
207
+ key_id=pulumi.get(__response__, 'key_id'),
208
+ key_name=pulumi.get(__response__, 'key_name'),
209
+ key_ref=pulumi.get(__response__, 'key_ref'),
210
+ key_type=pulumi.get(__response__, 'key_type'),
211
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -56,7 +61,7 @@ class GetBackendKeysResult:
56
61
 
57
62
  @property
58
63
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
64
+ def key_info(self) -> Mapping[str, str]:
60
65
  """
61
66
  Map of key strings read from Vault.
62
67
  """
@@ -126,7 +131,7 @@ def get_backend_keys(backend: Optional[str] = None,
126
131
  read the keys from, with no leading or trailing `/`s.
127
132
  :param str namespace: The namespace of the target resource.
128
133
  The value should not contain leading or trailing forward slashes.
129
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
130
135
  *Available only for Vault Enterprise*.
131
136
  """
132
137
  __args__ = dict()
@@ -142,12 +147,9 @@ def get_backend_keys(backend: Optional[str] = None,
142
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
143
148
  keys=pulumi.get(__ret__, 'keys'),
144
149
  namespace=pulumi.get(__ret__, 'namespace'))
145
-
146
-
147
- @_utilities.lift_output_func(get_backend_keys)
148
150
  def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
149
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
150
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendKeysResult]:
152
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
151
153
  """
152
154
  ## Example Usage
153
155
 
@@ -173,7 +175,18 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
173
175
  read the keys from, with no leading or trailing `/`s.
174
176
  :param str namespace: The namespace of the target resource.
175
177
  The value should not contain leading or trailing forward slashes.
176
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
178
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
179
  *Available only for Vault Enterprise*.
178
180
  """
179
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendKeys:getBackendKeys', __args__, opts=opts, typ=GetBackendKeysResult)
186
+ return __ret__.apply(lambda __response__: GetBackendKeysResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,15 +4,53 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
18
+ 'BackendConfigEstAuthenticators',
13
19
  'SecretBackendRolePolicyIdentifier',
20
+ 'GetBackendConfigEstAuthenticatorResult',
14
21
  ]
15
22
 
23
+ @pulumi.output_type
24
+ class BackendConfigEstAuthenticators(dict):
25
+ def __init__(__self__, *,
26
+ cert: Optional[Mapping[str, str]] = None,
27
+ userpass: Optional[Mapping[str, str]] = None):
28
+ """
29
+ :param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
30
+ :param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
31
+ """
32
+ if cert is not None:
33
+ pulumi.set(__self__, "cert", cert)
34
+ if userpass is not None:
35
+ pulumi.set(__self__, "userpass", userpass)
36
+
37
+ @property
38
+ @pulumi.getter
39
+ def cert(self) -> Optional[Mapping[str, str]]:
40
+ """
41
+ "The accessor (required) and cert_role (optional) properties for cert auth backends".
42
+ """
43
+ return pulumi.get(self, "cert")
44
+
45
+ @property
46
+ @pulumi.getter
47
+ def userpass(self) -> Optional[Mapping[str, str]]:
48
+ """
49
+ "The accessor (required) property for user pass auth backends".
50
+ """
51
+ return pulumi.get(self, "userpass")
52
+
53
+
16
54
  @pulumi.output_type
17
55
  class SecretBackendRolePolicyIdentifier(dict):
18
56
  def __init__(__self__, *,
@@ -59,3 +97,34 @@ class SecretBackendRolePolicyIdentifier(dict):
59
97
  return pulumi.get(self, "notice")
60
98
 
61
99
 
100
+ @pulumi.output_type
101
+ class GetBackendConfigEstAuthenticatorResult(dict):
102
+ def __init__(__self__, *,
103
+ cert: Optional[Mapping[str, str]] = None,
104
+ userpass: Optional[Mapping[str, str]] = None):
105
+ """
106
+ :param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
107
+ :param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
108
+ """
109
+ if cert is not None:
110
+ pulumi.set(__self__, "cert", cert)
111
+ if userpass is not None:
112
+ pulumi.set(__self__, "userpass", userpass)
113
+
114
+ @property
115
+ @pulumi.getter
116
+ def cert(self) -> Optional[Mapping[str, str]]:
117
+ """
118
+ "The accessor and cert_role properties for cert auth backends".
119
+ """
120
+ return pulumi.get(self, "cert")
121
+
122
+ @property
123
+ @pulumi.getter
124
+ def userpass(self) -> Optional[Mapping[str, str]]:
125
+ """
126
+ "The accessor property for user pass auth backends".
127
+ """
128
+ return pulumi.get(self, "userpass")
129
+
130
+