pulumi-vault 5.21.0a1710160723__py3-none-any.whl → 6.5.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (233) hide show
  1. pulumi_vault/__init__.py +76 -0
  2. pulumi_vault/_inputs.py +560 -0
  3. pulumi_vault/_utilities.py +41 -5
  4. pulumi_vault/ad/get_access_credentials.py +22 -7
  5. pulumi_vault/ad/secret_backend.py +14 -144
  6. pulumi_vault/ad/secret_library.py +14 -11
  7. pulumi_vault/ad/secret_role.py +12 -11
  8. pulumi_vault/alicloud/auth_backend_role.py +74 -192
  9. pulumi_vault/approle/auth_backend_login.py +12 -11
  10. pulumi_vault/approle/auth_backend_role.py +75 -193
  11. pulumi_vault/approle/auth_backend_role_secret_id.py +106 -11
  12. pulumi_vault/approle/get_auth_backend_role_id.py +18 -9
  13. pulumi_vault/audit.py +24 -27
  14. pulumi_vault/audit_request_header.py +11 -6
  15. pulumi_vault/auth_backend.py +64 -12
  16. pulumi_vault/aws/auth_backend_cert.py +12 -7
  17. pulumi_vault/aws/auth_backend_client.py +265 -24
  18. pulumi_vault/aws/auth_backend_config_identity.py +12 -11
  19. pulumi_vault/aws/auth_backend_identity_whitelist.py +18 -17
  20. pulumi_vault/aws/auth_backend_login.py +19 -22
  21. pulumi_vault/aws/auth_backend_role.py +75 -193
  22. pulumi_vault/aws/auth_backend_role_tag.py +12 -7
  23. pulumi_vault/aws/auth_backend_roletag_blacklist.py +18 -17
  24. pulumi_vault/aws/auth_backend_sts_role.py +59 -11
  25. pulumi_vault/aws/get_access_credentials.py +34 -7
  26. pulumi_vault/aws/get_static_access_credentials.py +19 -5
  27. pulumi_vault/aws/secret_backend.py +216 -7
  28. pulumi_vault/aws/secret_backend_role.py +183 -11
  29. pulumi_vault/aws/secret_backend_static_role.py +14 -11
  30. pulumi_vault/azure/_inputs.py +24 -0
  31. pulumi_vault/azure/auth_backend_config.py +151 -17
  32. pulumi_vault/azure/auth_backend_role.py +75 -193
  33. pulumi_vault/azure/backend.py +223 -29
  34. pulumi_vault/azure/backend_role.py +42 -41
  35. pulumi_vault/azure/get_access_credentials.py +39 -11
  36. pulumi_vault/azure/outputs.py +5 -0
  37. pulumi_vault/cert_auth_backend_role.py +87 -271
  38. pulumi_vault/config/__init__.pyi +5 -0
  39. pulumi_vault/config/_inputs.py +73 -0
  40. pulumi_vault/config/outputs.py +35 -0
  41. pulumi_vault/config/ui_custom_message.py +529 -0
  42. pulumi_vault/config/vars.py +5 -0
  43. pulumi_vault/consul/secret_backend.py +22 -25
  44. pulumi_vault/consul/secret_backend_role.py +14 -80
  45. pulumi_vault/database/_inputs.py +2808 -879
  46. pulumi_vault/database/outputs.py +749 -838
  47. pulumi_vault/database/secret_backend_connection.py +117 -114
  48. pulumi_vault/database/secret_backend_role.py +29 -24
  49. pulumi_vault/database/secret_backend_static_role.py +85 -15
  50. pulumi_vault/database/secrets_mount.py +425 -138
  51. pulumi_vault/egp_policy.py +16 -15
  52. pulumi_vault/gcp/_inputs.py +111 -0
  53. pulumi_vault/gcp/auth_backend.py +248 -35
  54. pulumi_vault/gcp/auth_backend_role.py +75 -271
  55. pulumi_vault/gcp/get_auth_backend_role.py +43 -9
  56. pulumi_vault/gcp/outputs.py +5 -0
  57. pulumi_vault/gcp/secret_backend.py +287 -16
  58. pulumi_vault/gcp/secret_impersonated_account.py +74 -17
  59. pulumi_vault/gcp/secret_roleset.py +29 -26
  60. pulumi_vault/gcp/secret_static_account.py +37 -34
  61. pulumi_vault/generic/endpoint.py +22 -21
  62. pulumi_vault/generic/get_secret.py +68 -12
  63. pulumi_vault/generic/secret.py +19 -14
  64. pulumi_vault/get_auth_backend.py +24 -11
  65. pulumi_vault/get_auth_backends.py +33 -11
  66. pulumi_vault/get_namespace.py +226 -0
  67. pulumi_vault/get_namespaces.py +153 -0
  68. pulumi_vault/get_nomad_access_token.py +31 -15
  69. pulumi_vault/get_policy_document.py +34 -23
  70. pulumi_vault/get_raft_autopilot_state.py +29 -14
  71. pulumi_vault/github/_inputs.py +55 -0
  72. pulumi_vault/github/auth_backend.py +17 -16
  73. pulumi_vault/github/outputs.py +5 -0
  74. pulumi_vault/github/team.py +14 -13
  75. pulumi_vault/github/user.py +14 -13
  76. pulumi_vault/identity/entity.py +18 -15
  77. pulumi_vault/identity/entity_alias.py +18 -15
  78. pulumi_vault/identity/entity_policies.py +24 -19
  79. pulumi_vault/identity/get_entity.py +40 -14
  80. pulumi_vault/identity/get_group.py +45 -13
  81. pulumi_vault/identity/get_oidc_client_creds.py +21 -11
  82. pulumi_vault/identity/get_oidc_openid_config.py +39 -13
  83. pulumi_vault/identity/get_oidc_public_keys.py +29 -14
  84. pulumi_vault/identity/group.py +50 -49
  85. pulumi_vault/identity/group_alias.py +14 -11
  86. pulumi_vault/identity/group_member_entity_ids.py +24 -74
  87. pulumi_vault/identity/group_member_group_ids.py +36 -27
  88. pulumi_vault/identity/group_policies.py +16 -15
  89. pulumi_vault/identity/mfa_duo.py +9 -8
  90. pulumi_vault/identity/mfa_login_enforcement.py +13 -8
  91. pulumi_vault/identity/mfa_okta.py +9 -8
  92. pulumi_vault/identity/mfa_pingid.py +5 -4
  93. pulumi_vault/identity/mfa_totp.py +5 -4
  94. pulumi_vault/identity/oidc.py +12 -11
  95. pulumi_vault/identity/oidc_assignment.py +22 -13
  96. pulumi_vault/identity/oidc_client.py +34 -25
  97. pulumi_vault/identity/oidc_key.py +28 -19
  98. pulumi_vault/identity/oidc_key_allowed_client_id.py +28 -19
  99. pulumi_vault/identity/oidc_provider.py +34 -23
  100. pulumi_vault/identity/oidc_role.py +40 -27
  101. pulumi_vault/identity/oidc_scope.py +18 -15
  102. pulumi_vault/identity/outputs.py +8 -3
  103. pulumi_vault/jwt/_inputs.py +55 -0
  104. pulumi_vault/jwt/auth_backend.py +39 -46
  105. pulumi_vault/jwt/auth_backend_role.py +131 -260
  106. pulumi_vault/jwt/outputs.py +5 -0
  107. pulumi_vault/kmip/secret_backend.py +22 -21
  108. pulumi_vault/kmip/secret_role.py +12 -11
  109. pulumi_vault/kmip/secret_scope.py +12 -11
  110. pulumi_vault/kubernetes/auth_backend_config.py +55 -7
  111. pulumi_vault/kubernetes/auth_backend_role.py +68 -179
  112. pulumi_vault/kubernetes/get_auth_backend_config.py +60 -8
  113. pulumi_vault/kubernetes/get_auth_backend_role.py +40 -5
  114. pulumi_vault/kubernetes/get_service_account_token.py +39 -15
  115. pulumi_vault/kubernetes/secret_backend.py +314 -29
  116. pulumi_vault/kubernetes/secret_backend_role.py +135 -56
  117. pulumi_vault/kv/_inputs.py +36 -4
  118. pulumi_vault/kv/get_secret.py +23 -12
  119. pulumi_vault/kv/get_secret_subkeys_v2.py +31 -14
  120. pulumi_vault/kv/get_secret_v2.py +89 -9
  121. pulumi_vault/kv/get_secrets_list.py +22 -15
  122. pulumi_vault/kv/get_secrets_list_v2.py +35 -19
  123. pulumi_vault/kv/outputs.py +8 -3
  124. pulumi_vault/kv/secret.py +19 -18
  125. pulumi_vault/kv/secret_backend_v2.py +12 -11
  126. pulumi_vault/kv/secret_v2.py +55 -52
  127. pulumi_vault/ldap/auth_backend.py +125 -168
  128. pulumi_vault/ldap/auth_backend_group.py +12 -11
  129. pulumi_vault/ldap/auth_backend_user.py +12 -11
  130. pulumi_vault/ldap/get_dynamic_credentials.py +23 -5
  131. pulumi_vault/ldap/get_static_credentials.py +24 -5
  132. pulumi_vault/ldap/secret_backend.py +352 -84
  133. pulumi_vault/ldap/secret_backend_dynamic_role.py +12 -11
  134. pulumi_vault/ldap/secret_backend_library_set.py +14 -11
  135. pulumi_vault/ldap/secret_backend_static_role.py +67 -12
  136. pulumi_vault/managed/_inputs.py +289 -132
  137. pulumi_vault/managed/keys.py +27 -43
  138. pulumi_vault/managed/outputs.py +89 -132
  139. pulumi_vault/mfa_duo.py +16 -13
  140. pulumi_vault/mfa_okta.py +16 -13
  141. pulumi_vault/mfa_pingid.py +16 -13
  142. pulumi_vault/mfa_totp.py +22 -19
  143. pulumi_vault/mongodbatlas/secret_backend.py +18 -17
  144. pulumi_vault/mongodbatlas/secret_role.py +41 -38
  145. pulumi_vault/mount.py +389 -65
  146. pulumi_vault/namespace.py +26 -21
  147. pulumi_vault/nomad_secret_backend.py +16 -15
  148. pulumi_vault/nomad_secret_role.py +12 -11
  149. pulumi_vault/okta/_inputs.py +47 -8
  150. pulumi_vault/okta/auth_backend.py +483 -41
  151. pulumi_vault/okta/auth_backend_group.py +12 -11
  152. pulumi_vault/okta/auth_backend_user.py +12 -11
  153. pulumi_vault/okta/outputs.py +13 -8
  154. pulumi_vault/outputs.py +5 -0
  155. pulumi_vault/password_policy.py +18 -15
  156. pulumi_vault/pkisecret/__init__.py +7 -0
  157. pulumi_vault/pkisecret/_inputs.py +115 -0
  158. pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
  159. pulumi_vault/pkisecret/backend_config_acme.py +642 -0
  160. pulumi_vault/pkisecret/backend_config_cluster.py +369 -0
  161. pulumi_vault/pkisecret/backend_config_cmpv2.py +525 -0
  162. pulumi_vault/pkisecret/backend_config_est.py +619 -0
  163. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +209 -0
  164. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  165. pulumi_vault/pkisecret/get_backend_issuer.py +63 -7
  166. pulumi_vault/pkisecret/get_backend_issuers.py +21 -12
  167. pulumi_vault/pkisecret/get_backend_key.py +24 -13
  168. pulumi_vault/pkisecret/get_backend_keys.py +21 -12
  169. pulumi_vault/pkisecret/outputs.py +109 -0
  170. pulumi_vault/pkisecret/secret_backend_cert.py +18 -15
  171. pulumi_vault/pkisecret/secret_backend_config_ca.py +16 -15
  172. pulumi_vault/pkisecret/secret_backend_config_issuers.py +12 -11
  173. pulumi_vault/pkisecret/secret_backend_config_urls.py +59 -11
  174. pulumi_vault/pkisecret/secret_backend_crl_config.py +14 -13
  175. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +16 -15
  176. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +22 -21
  177. pulumi_vault/pkisecret/secret_backend_issuer.py +12 -11
  178. pulumi_vault/pkisecret/secret_backend_key.py +12 -7
  179. pulumi_vault/pkisecret/secret_backend_role.py +66 -16
  180. pulumi_vault/pkisecret/secret_backend_root_cert.py +16 -52
  181. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +18 -62
  182. pulumi_vault/pkisecret/secret_backend_sign.py +18 -60
  183. pulumi_vault/plugin.py +595 -0
  184. pulumi_vault/plugin_pinned_version.py +298 -0
  185. pulumi_vault/policy.py +12 -7
  186. pulumi_vault/provider.py +48 -53
  187. pulumi_vault/pulumi-plugin.json +2 -1
  188. pulumi_vault/quota_lease_count.py +58 -8
  189. pulumi_vault/quota_rate_limit.py +54 -4
  190. pulumi_vault/rabbitmq/_inputs.py +61 -0
  191. pulumi_vault/rabbitmq/outputs.py +5 -0
  192. pulumi_vault/rabbitmq/secret_backend.py +16 -15
  193. pulumi_vault/rabbitmq/secret_backend_role.py +52 -49
  194. pulumi_vault/raft_autopilot.py +12 -11
  195. pulumi_vault/raft_snapshot_agent_config.py +121 -311
  196. pulumi_vault/rgp_policy.py +14 -13
  197. pulumi_vault/saml/auth_backend.py +20 -19
  198. pulumi_vault/saml/auth_backend_role.py +90 -199
  199. pulumi_vault/secrets/__init__.py +3 -0
  200. pulumi_vault/secrets/_inputs.py +110 -0
  201. pulumi_vault/secrets/outputs.py +94 -0
  202. pulumi_vault/secrets/sync_association.py +56 -75
  203. pulumi_vault/secrets/sync_aws_destination.py +240 -29
  204. pulumi_vault/secrets/sync_azure_destination.py +90 -33
  205. pulumi_vault/secrets/sync_config.py +7 -6
  206. pulumi_vault/secrets/sync_gcp_destination.py +156 -27
  207. pulumi_vault/secrets/sync_gh_destination.py +187 -15
  208. pulumi_vault/secrets/sync_github_apps.py +375 -0
  209. pulumi_vault/secrets/sync_vercel_destination.py +72 -15
  210. pulumi_vault/ssh/_inputs.py +28 -32
  211. pulumi_vault/ssh/outputs.py +11 -32
  212. pulumi_vault/ssh/secret_backend_ca.py +106 -11
  213. pulumi_vault/ssh/secret_backend_role.py +110 -120
  214. pulumi_vault/terraformcloud/secret_backend.py +5 -56
  215. pulumi_vault/terraformcloud/secret_creds.py +14 -24
  216. pulumi_vault/terraformcloud/secret_role.py +14 -76
  217. pulumi_vault/token.py +26 -25
  218. pulumi_vault/tokenauth/auth_backend_role.py +76 -201
  219. pulumi_vault/transform/alphabet.py +16 -13
  220. pulumi_vault/transform/get_decode.py +45 -21
  221. pulumi_vault/transform/get_encode.py +45 -21
  222. pulumi_vault/transform/role.py +16 -13
  223. pulumi_vault/transform/template.py +30 -25
  224. pulumi_vault/transform/transformation.py +12 -7
  225. pulumi_vault/transit/get_decrypt.py +26 -25
  226. pulumi_vault/transit/get_encrypt.py +24 -19
  227. pulumi_vault/transit/secret_backend_key.py +25 -97
  228. pulumi_vault/transit/secret_cache_config.py +12 -11
  229. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/METADATA +8 -7
  230. pulumi_vault-6.5.0.dist-info/RECORD +260 -0
  231. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/WHEEL +1 -1
  232. pulumi_vault-5.21.0a1710160723.dist-info/RECORD +0 -244
  233. {pulumi_vault-5.21.0a1710160723.dist-info → pulumi_vault-6.5.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,209 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+
18
+ __all__ = [
19
+ 'GetBackendConfigCmpv2Result',
20
+ 'AwaitableGetBackendConfigCmpv2Result',
21
+ 'get_backend_config_cmpv2',
22
+ 'get_backend_config_cmpv2_output',
23
+ ]
24
+
25
+ @pulumi.output_type
26
+ class GetBackendConfigCmpv2Result:
27
+ """
28
+ A collection of values returned by getBackendConfigCmpv2.
29
+ """
30
+ def __init__(__self__, audit_fields=None, authenticators=None, backend=None, default_path_policy=None, enable_sentinel_parsing=None, enabled=None, id=None, last_updated=None, namespace=None):
31
+ if audit_fields and not isinstance(audit_fields, list):
32
+ raise TypeError("Expected argument 'audit_fields' to be a list")
33
+ pulumi.set(__self__, "audit_fields", audit_fields)
34
+ if authenticators and not isinstance(authenticators, list):
35
+ raise TypeError("Expected argument 'authenticators' to be a list")
36
+ pulumi.set(__self__, "authenticators", authenticators)
37
+ if backend and not isinstance(backend, str):
38
+ raise TypeError("Expected argument 'backend' to be a str")
39
+ pulumi.set(__self__, "backend", backend)
40
+ if default_path_policy and not isinstance(default_path_policy, str):
41
+ raise TypeError("Expected argument 'default_path_policy' to be a str")
42
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
43
+ if enable_sentinel_parsing and not isinstance(enable_sentinel_parsing, bool):
44
+ raise TypeError("Expected argument 'enable_sentinel_parsing' to be a bool")
45
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
46
+ if enabled and not isinstance(enabled, bool):
47
+ raise TypeError("Expected argument 'enabled' to be a bool")
48
+ pulumi.set(__self__, "enabled", enabled)
49
+ if id and not isinstance(id, str):
50
+ raise TypeError("Expected argument 'id' to be a str")
51
+ pulumi.set(__self__, "id", id)
52
+ if last_updated and not isinstance(last_updated, str):
53
+ raise TypeError("Expected argument 'last_updated' to be a str")
54
+ pulumi.set(__self__, "last_updated", last_updated)
55
+ if namespace and not isinstance(namespace, str):
56
+ raise TypeError("Expected argument 'namespace' to be a str")
57
+ pulumi.set(__self__, "namespace", namespace)
58
+
59
+ @property
60
+ @pulumi.getter(name="auditFields")
61
+ def audit_fields(self) -> Sequence[str]:
62
+ return pulumi.get(self, "audit_fields")
63
+
64
+ @property
65
+ @pulumi.getter
66
+ def authenticators(self) -> Sequence['outputs.GetBackendConfigCmpv2AuthenticatorResult']:
67
+ return pulumi.get(self, "authenticators")
68
+
69
+ @property
70
+ @pulumi.getter
71
+ def backend(self) -> str:
72
+ return pulumi.get(self, "backend")
73
+
74
+ @property
75
+ @pulumi.getter(name="defaultPathPolicy")
76
+ def default_path_policy(self) -> str:
77
+ return pulumi.get(self, "default_path_policy")
78
+
79
+ @property
80
+ @pulumi.getter(name="enableSentinelParsing")
81
+ def enable_sentinel_parsing(self) -> bool:
82
+ return pulumi.get(self, "enable_sentinel_parsing")
83
+
84
+ @property
85
+ @pulumi.getter
86
+ def enabled(self) -> bool:
87
+ return pulumi.get(self, "enabled")
88
+
89
+ @property
90
+ @pulumi.getter
91
+ def id(self) -> str:
92
+ """
93
+ The provider-assigned unique ID for this managed resource.
94
+ """
95
+ return pulumi.get(self, "id")
96
+
97
+ @property
98
+ @pulumi.getter(name="lastUpdated")
99
+ def last_updated(self) -> str:
100
+ return pulumi.get(self, "last_updated")
101
+
102
+ @property
103
+ @pulumi.getter
104
+ def namespace(self) -> Optional[str]:
105
+ return pulumi.get(self, "namespace")
106
+
107
+
108
+ class AwaitableGetBackendConfigCmpv2Result(GetBackendConfigCmpv2Result):
109
+ # pylint: disable=using-constant-test
110
+ def __await__(self):
111
+ if False:
112
+ yield self
113
+ return GetBackendConfigCmpv2Result(
114
+ audit_fields=self.audit_fields,
115
+ authenticators=self.authenticators,
116
+ backend=self.backend,
117
+ default_path_policy=self.default_path_policy,
118
+ enable_sentinel_parsing=self.enable_sentinel_parsing,
119
+ enabled=self.enabled,
120
+ id=self.id,
121
+ last_updated=self.last_updated,
122
+ namespace=self.namespace)
123
+
124
+
125
+ def get_backend_config_cmpv2(backend: Optional[str] = None,
126
+ namespace: Optional[str] = None,
127
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigCmpv2Result:
128
+ """
129
+ ## Example Usage
130
+
131
+ ```python
132
+ import pulumi
133
+ import pulumi_vault as vault
134
+
135
+ pki = vault.Mount("pki",
136
+ path="pki",
137
+ type="pki",
138
+ description="PKI secret engine mount")
139
+ cmpv2_config = vault.pkiSecret.get_backend_config_cmpv2_output(backend=pki.path)
140
+ ```
141
+
142
+
143
+ :param str backend: The path to the PKI secret backend to
144
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
145
+
146
+ # Attributes Reference
147
+ :param str namespace: The namespace of the target resource.
148
+ The value should not contain leading or trailing forward slashes.
149
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
150
+ *Available only for Vault Enterprise*.
151
+ """
152
+ __args__ = dict()
153
+ __args__['backend'] = backend
154
+ __args__['namespace'] = namespace
155
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
156
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigCmpv2:getBackendConfigCmpv2', __args__, opts=opts, typ=GetBackendConfigCmpv2Result).value
157
+
158
+ return AwaitableGetBackendConfigCmpv2Result(
159
+ audit_fields=pulumi.get(__ret__, 'audit_fields'),
160
+ authenticators=pulumi.get(__ret__, 'authenticators'),
161
+ backend=pulumi.get(__ret__, 'backend'),
162
+ default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
163
+ enable_sentinel_parsing=pulumi.get(__ret__, 'enable_sentinel_parsing'),
164
+ enabled=pulumi.get(__ret__, 'enabled'),
165
+ id=pulumi.get(__ret__, 'id'),
166
+ last_updated=pulumi.get(__ret__, 'last_updated'),
167
+ namespace=pulumi.get(__ret__, 'namespace'))
168
+ def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[str]] = None,
169
+ namespace: Optional[pulumi.Input[Optional[str]]] = None,
170
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigCmpv2Result]:
171
+ """
172
+ ## Example Usage
173
+
174
+ ```python
175
+ import pulumi
176
+ import pulumi_vault as vault
177
+
178
+ pki = vault.Mount("pki",
179
+ path="pki",
180
+ type="pki",
181
+ description="PKI secret engine mount")
182
+ cmpv2_config = vault.pkiSecret.get_backend_config_cmpv2_output(backend=pki.path)
183
+ ```
184
+
185
+
186
+ :param str backend: The path to the PKI secret backend to
187
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
188
+
189
+ # Attributes Reference
190
+ :param str namespace: The namespace of the target resource.
191
+ The value should not contain leading or trailing forward slashes.
192
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
193
+ *Available only for Vault Enterprise*.
194
+ """
195
+ __args__ = dict()
196
+ __args__['backend'] = backend
197
+ __args__['namespace'] = namespace
198
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
199
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigCmpv2:getBackendConfigCmpv2', __args__, opts=opts, typ=GetBackendConfigCmpv2Result)
200
+ return __ret__.apply(lambda __response__: GetBackendConfigCmpv2Result(
201
+ audit_fields=pulumi.get(__response__, 'audit_fields'),
202
+ authenticators=pulumi.get(__response__, 'authenticators'),
203
+ backend=pulumi.get(__response__, 'backend'),
204
+ default_path_policy=pulumi.get(__response__, 'default_path_policy'),
205
+ enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
206
+ enabled=pulumi.get(__response__, 'enabled'),
207
+ id=pulumi.get(__response__, 'id'),
208
+ last_updated=pulumi.get(__response__, 'last_updated'),
209
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -0,0 +1,251 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+
18
+ __all__ = [
19
+ 'GetBackendConfigEstResult',
20
+ 'AwaitableGetBackendConfigEstResult',
21
+ 'get_backend_config_est',
22
+ 'get_backend_config_est_output',
23
+ ]
24
+
25
+ @pulumi.output_type
26
+ class GetBackendConfigEstResult:
27
+ """
28
+ A collection of values returned by getBackendConfigEst.
29
+ """
30
+ def __init__(__self__, audit_fields=None, authenticators=None, backend=None, default_mount=None, default_path_policy=None, enable_sentinel_parsing=None, enabled=None, id=None, label_to_path_policy=None, last_updated=None, namespace=None):
31
+ if audit_fields and not isinstance(audit_fields, list):
32
+ raise TypeError("Expected argument 'audit_fields' to be a list")
33
+ pulumi.set(__self__, "audit_fields", audit_fields)
34
+ if authenticators and not isinstance(authenticators, list):
35
+ raise TypeError("Expected argument 'authenticators' to be a list")
36
+ pulumi.set(__self__, "authenticators", authenticators)
37
+ if backend and not isinstance(backend, str):
38
+ raise TypeError("Expected argument 'backend' to be a str")
39
+ pulumi.set(__self__, "backend", backend)
40
+ if default_mount and not isinstance(default_mount, bool):
41
+ raise TypeError("Expected argument 'default_mount' to be a bool")
42
+ pulumi.set(__self__, "default_mount", default_mount)
43
+ if default_path_policy and not isinstance(default_path_policy, str):
44
+ raise TypeError("Expected argument 'default_path_policy' to be a str")
45
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
46
+ if enable_sentinel_parsing and not isinstance(enable_sentinel_parsing, bool):
47
+ raise TypeError("Expected argument 'enable_sentinel_parsing' to be a bool")
48
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
49
+ if enabled and not isinstance(enabled, bool):
50
+ raise TypeError("Expected argument 'enabled' to be a bool")
51
+ pulumi.set(__self__, "enabled", enabled)
52
+ if id and not isinstance(id, str):
53
+ raise TypeError("Expected argument 'id' to be a str")
54
+ pulumi.set(__self__, "id", id)
55
+ if label_to_path_policy and not isinstance(label_to_path_policy, dict):
56
+ raise TypeError("Expected argument 'label_to_path_policy' to be a dict")
57
+ pulumi.set(__self__, "label_to_path_policy", label_to_path_policy)
58
+ if last_updated and not isinstance(last_updated, str):
59
+ raise TypeError("Expected argument 'last_updated' to be a str")
60
+ pulumi.set(__self__, "last_updated", last_updated)
61
+ if namespace and not isinstance(namespace, str):
62
+ raise TypeError("Expected argument 'namespace' to be a str")
63
+ pulumi.set(__self__, "namespace", namespace)
64
+
65
+ @property
66
+ @pulumi.getter(name="auditFields")
67
+ def audit_fields(self) -> Sequence[str]:
68
+ """
69
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
70
+ """
71
+ return pulumi.get(self, "audit_fields")
72
+
73
+ @property
74
+ @pulumi.getter
75
+ def authenticators(self) -> Sequence['outputs.GetBackendConfigEstAuthenticatorResult']:
76
+ """
77
+ Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
78
+ """
79
+ return pulumi.get(self, "authenticators")
80
+
81
+ @property
82
+ @pulumi.getter
83
+ def backend(self) -> str:
84
+ return pulumi.get(self, "backend")
85
+
86
+ @property
87
+ @pulumi.getter(name="defaultMount")
88
+ def default_mount(self) -> bool:
89
+ """
90
+ If set, this mount is registered as the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
91
+ """
92
+ return pulumi.get(self, "default_mount")
93
+
94
+ @property
95
+ @pulumi.getter(name="defaultPathPolicy")
96
+ def default_path_policy(self) -> str:
97
+ """
98
+ Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
99
+ """
100
+ return pulumi.get(self, "default_path_policy")
101
+
102
+ @property
103
+ @pulumi.getter(name="enableSentinelParsing")
104
+ def enable_sentinel_parsing(self) -> bool:
105
+ """
106
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
107
+ """
108
+ return pulumi.get(self, "enable_sentinel_parsing")
109
+
110
+ @property
111
+ @pulumi.getter
112
+ def enabled(self) -> bool:
113
+ """
114
+ Specifies whether EST is enabled.
115
+ """
116
+ return pulumi.get(self, "enabled")
117
+
118
+ @property
119
+ @pulumi.getter
120
+ def id(self) -> str:
121
+ """
122
+ The provider-assigned unique ID for this managed resource.
123
+ """
124
+ return pulumi.get(self, "id")
125
+
126
+ @property
127
+ @pulumi.getter(name="labelToPathPolicy")
128
+ def label_to_path_policy(self) -> Mapping[str, str]:
129
+ """
130
+ A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
131
+ """
132
+ return pulumi.get(self, "label_to_path_policy")
133
+
134
+ @property
135
+ @pulumi.getter(name="lastUpdated")
136
+ def last_updated(self) -> str:
137
+ """
138
+ A read-only timestamp representing the last time the configuration was updated.
139
+ """
140
+ return pulumi.get(self, "last_updated")
141
+
142
+ @property
143
+ @pulumi.getter
144
+ def namespace(self) -> Optional[str]:
145
+ return pulumi.get(self, "namespace")
146
+
147
+
148
+ class AwaitableGetBackendConfigEstResult(GetBackendConfigEstResult):
149
+ # pylint: disable=using-constant-test
150
+ def __await__(self):
151
+ if False:
152
+ yield self
153
+ return GetBackendConfigEstResult(
154
+ audit_fields=self.audit_fields,
155
+ authenticators=self.authenticators,
156
+ backend=self.backend,
157
+ default_mount=self.default_mount,
158
+ default_path_policy=self.default_path_policy,
159
+ enable_sentinel_parsing=self.enable_sentinel_parsing,
160
+ enabled=self.enabled,
161
+ id=self.id,
162
+ label_to_path_policy=self.label_to_path_policy,
163
+ last_updated=self.last_updated,
164
+ namespace=self.namespace)
165
+
166
+
167
+ def get_backend_config_est(backend: Optional[str] = None,
168
+ namespace: Optional[str] = None,
169
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigEstResult:
170
+ """
171
+ ## Example Usage
172
+
173
+ ```python
174
+ import pulumi
175
+ import pulumi_vault as vault
176
+
177
+ pki = vault.Mount("pki",
178
+ path="pki",
179
+ type="pki",
180
+ description="PKI secret engine mount")
181
+ est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
182
+ ```
183
+
184
+
185
+ :param str backend: The path to the PKI secret backend to
186
+ read the EST configuration from, with no leading or trailing `/`s.
187
+ :param str namespace: The namespace of the target resource.
188
+ The value should not contain leading or trailing forward slashes.
189
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
190
+ *Available only for Vault Enterprise*.
191
+ """
192
+ __args__ = dict()
193
+ __args__['backend'] = backend
194
+ __args__['namespace'] = namespace
195
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
196
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult).value
197
+
198
+ return AwaitableGetBackendConfigEstResult(
199
+ audit_fields=pulumi.get(__ret__, 'audit_fields'),
200
+ authenticators=pulumi.get(__ret__, 'authenticators'),
201
+ backend=pulumi.get(__ret__, 'backend'),
202
+ default_mount=pulumi.get(__ret__, 'default_mount'),
203
+ default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
204
+ enable_sentinel_parsing=pulumi.get(__ret__, 'enable_sentinel_parsing'),
205
+ enabled=pulumi.get(__ret__, 'enabled'),
206
+ id=pulumi.get(__ret__, 'id'),
207
+ label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
208
+ last_updated=pulumi.get(__ret__, 'last_updated'),
209
+ namespace=pulumi.get(__ret__, 'namespace'))
210
+ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
211
+ namespace: Optional[pulumi.Input[Optional[str]]] = None,
212
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
213
+ """
214
+ ## Example Usage
215
+
216
+ ```python
217
+ import pulumi
218
+ import pulumi_vault as vault
219
+
220
+ pki = vault.Mount("pki",
221
+ path="pki",
222
+ type="pki",
223
+ description="PKI secret engine mount")
224
+ est_config = vault.pkiSecret.get_backend_config_est_output(backend=pki.path)
225
+ ```
226
+
227
+
228
+ :param str backend: The path to the PKI secret backend to
229
+ read the EST configuration from, with no leading or trailing `/`s.
230
+ :param str namespace: The namespace of the target resource.
231
+ The value should not contain leading or trailing forward slashes.
232
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
233
+ *Available only for Vault Enterprise*.
234
+ """
235
+ __args__ = dict()
236
+ __args__['backend'] = backend
237
+ __args__['namespace'] = namespace
238
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
239
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigEst:getBackendConfigEst', __args__, opts=opts, typ=GetBackendConfigEstResult)
240
+ return __ret__.apply(lambda __response__: GetBackendConfigEstResult(
241
+ audit_fields=pulumi.get(__response__, 'audit_fields'),
242
+ authenticators=pulumi.get(__response__, 'authenticators'),
243
+ backend=pulumi.get(__response__, 'backend'),
244
+ default_mount=pulumi.get(__response__, 'default_mount'),
245
+ default_path_policy=pulumi.get(__response__, 'default_path_policy'),
246
+ enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
247
+ enabled=pulumi.get(__response__, 'enabled'),
248
+ id=pulumi.get(__response__, 'id'),
249
+ label_to_path_policy=pulumi.get(__response__, 'label_to_path_policy'),
250
+ last_updated=pulumi.get(__response__, 'last_updated'),
251
+ namespace=pulumi.get(__response__, 'namespace')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -175,13 +180,31 @@ def get_backend_issuer(backend: Optional[str] = None,
175
180
  """
176
181
  ## Example Usage
177
182
 
183
+ ```python
184
+ import pulumi
185
+ import pulumi_vault as vault
186
+
187
+ pki = vault.Mount("pki",
188
+ path="pki",
189
+ type="pki",
190
+ description="PKI secret engine mount")
191
+ root = vault.pki_secret.SecretBackendRootCert("root",
192
+ backend=pki.path,
193
+ type="internal",
194
+ common_name="example",
195
+ ttl="86400",
196
+ issuer_name="example")
197
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
198
+ issuer_ref=issuer_id))
199
+ ```
200
+
178
201
 
179
202
  :param str backend: The path to the PKI secret backend to
180
203
  read the issuer from, with no leading or trailing `/`s.
181
204
  :param str issuer_ref: Reference to an existing issuer.
182
205
  :param str namespace: The namespace of the target resource.
183
206
  The value should not contain leading or trailing forward slashes.
184
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
207
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
185
208
  *Available only for Vault Enterprise*.
186
209
  """
187
210
  __args__ = dict()
@@ -204,23 +227,56 @@ def get_backend_issuer(backend: Optional[str] = None,
204
227
  manual_chains=pulumi.get(__ret__, 'manual_chains'),
205
228
  namespace=pulumi.get(__ret__, 'namespace'),
206
229
  usage=pulumi.get(__ret__, 'usage'))
207
-
208
-
209
- @_utilities.lift_output_func(get_backend_issuer)
210
230
  def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
211
231
  issuer_ref: Optional[pulumi.Input[str]] = None,
212
232
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
213
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuerResult]:
233
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
214
234
  """
215
235
  ## Example Usage
216
236
 
237
+ ```python
238
+ import pulumi
239
+ import pulumi_vault as vault
240
+
241
+ pki = vault.Mount("pki",
242
+ path="pki",
243
+ type="pki",
244
+ description="PKI secret engine mount")
245
+ root = vault.pki_secret.SecretBackendRootCert("root",
246
+ backend=pki.path,
247
+ type="internal",
248
+ common_name="example",
249
+ ttl="86400",
250
+ issuer_name="example")
251
+ example = root.issuer_id.apply(lambda issuer_id: vault.pkiSecret.get_backend_issuer_output(backend=root.path,
252
+ issuer_ref=issuer_id))
253
+ ```
254
+
217
255
 
218
256
  :param str backend: The path to the PKI secret backend to
219
257
  read the issuer from, with no leading or trailing `/`s.
220
258
  :param str issuer_ref: Reference to an existing issuer.
221
259
  :param str namespace: The namespace of the target resource.
222
260
  The value should not contain leading or trailing forward slashes.
223
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
261
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
224
262
  *Available only for Vault Enterprise*.
225
263
  """
226
- ...
264
+ __args__ = dict()
265
+ __args__['backend'] = backend
266
+ __args__['issuerRef'] = issuer_ref
267
+ __args__['namespace'] = namespace
268
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
269
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuer:getBackendIssuer', __args__, opts=opts, typ=GetBackendIssuerResult)
270
+ return __ret__.apply(lambda __response__: GetBackendIssuerResult(
271
+ backend=pulumi.get(__response__, 'backend'),
272
+ ca_chains=pulumi.get(__response__, 'ca_chains'),
273
+ certificate=pulumi.get(__response__, 'certificate'),
274
+ id=pulumi.get(__response__, 'id'),
275
+ issuer_id=pulumi.get(__response__, 'issuer_id'),
276
+ issuer_name=pulumi.get(__response__, 'issuer_name'),
277
+ issuer_ref=pulumi.get(__response__, 'issuer_ref'),
278
+ key_id=pulumi.get(__response__, 'key_id'),
279
+ leaf_not_after_behavior=pulumi.get(__response__, 'leaf_not_after_behavior'),
280
+ manual_chains=pulumi.get(__response__, 'manual_chains'),
281
+ namespace=pulumi.get(__response__, 'namespace'),
282
+ usage=pulumi.get(__response__, 'usage')))
@@ -4,9 +4,14 @@
4
4
 
5
5
  import copy
6
6
  import warnings
7
+ import sys
7
8
  import pulumi
8
9
  import pulumi.runtime
9
10
  from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
10
15
  from .. import _utilities
11
16
 
12
17
  __all__ = [
@@ -56,7 +61,7 @@ class GetBackendIssuersResult:
56
61
 
57
62
  @property
58
63
  @pulumi.getter(name="keyInfo")
59
- def key_info(self) -> Mapping[str, Any]:
64
+ def key_info(self) -> Mapping[str, str]:
60
65
  """
61
66
  Map of issuer strings read from Vault.
62
67
  """
@@ -104,7 +109,6 @@ def get_backend_issuers(backend: Optional[str] = None,
104
109
  """
105
110
  ## Example Usage
106
111
 
107
- <!--Start PulumiCodeChooser -->
108
112
  ```python
109
113
  import pulumi
110
114
  import pulumi_vault as vault
@@ -121,14 +125,13 @@ def get_backend_issuers(backend: Optional[str] = None,
121
125
  issuer_name="example")
122
126
  test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
123
127
  ```
124
- <!--End PulumiCodeChooser -->
125
128
 
126
129
 
127
130
  :param str backend: The path to the PKI secret backend to
128
131
  read the issuers from, with no leading or trailing `/`s.
129
132
  :param str namespace: The namespace of the target resource.
130
133
  The value should not contain leading or trailing forward slashes.
131
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
134
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
132
135
  *Available only for Vault Enterprise*.
133
136
  """
134
137
  __args__ = dict()
@@ -144,16 +147,12 @@ def get_backend_issuers(backend: Optional[str] = None,
144
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
145
148
  keys=pulumi.get(__ret__, 'keys'),
146
149
  namespace=pulumi.get(__ret__, 'namespace'))
147
-
148
-
149
- @_utilities.lift_output_func(get_backend_issuers)
150
150
  def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
151
151
  namespace: Optional[pulumi.Input[Optional[str]]] = None,
152
- opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetBackendIssuersResult]:
152
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
153
153
  """
154
154
  ## Example Usage
155
155
 
156
- <!--Start PulumiCodeChooser -->
157
156
  ```python
158
157
  import pulumi
159
158
  import pulumi_vault as vault
@@ -170,14 +169,24 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
170
169
  issuer_name="example")
171
170
  test = vault.pkiSecret.get_backend_issuers_output(backend=root.backend)
172
171
  ```
173
- <!--End PulumiCodeChooser -->
174
172
 
175
173
 
176
174
  :param str backend: The path to the PKI secret backend to
177
175
  read the issuers from, with no leading or trailing `/`s.
178
176
  :param str namespace: The namespace of the target resource.
179
177
  The value should not contain leading or trailing forward slashes.
180
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
178
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
181
179
  *Available only for Vault Enterprise*.
182
180
  """
183
- ...
181
+ __args__ = dict()
182
+ __args__['backend'] = backend
183
+ __args__['namespace'] = namespace
184
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
185
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendIssuers:getBackendIssuers', __args__, opts=opts, typ=GetBackendIssuersResult)
186
+ return __ret__.apply(lambda __response__: GetBackendIssuersResult(
187
+ backend=pulumi.get(__response__, 'backend'),
188
+ id=pulumi.get(__response__, 'id'),
189
+ key_info=pulumi.get(__response__, 'key_info'),
190
+ key_info_json=pulumi.get(__response__, 'key_info_json'),
191
+ keys=pulumi.get(__response__, 'keys'),
192
+ namespace=pulumi.get(__response__, 'namespace')))