pulumi-vault 6.5.0a1736850018__py3-none-any.whl → 6.6.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (48) hide show
  1. pulumi_vault/__init__.py +32 -0
  2. pulumi_vault/_utilities.py +8 -4
  3. pulumi_vault/aws/auth_backend_client.py +228 -4
  4. pulumi_vault/aws/auth_backend_sts_role.py +47 -0
  5. pulumi_vault/aws/secret_backend.py +395 -38
  6. pulumi_vault/aws/secret_backend_static_role.py +217 -0
  7. pulumi_vault/azure/auth_backend_config.py +257 -5
  8. pulumi_vault/azure/backend.py +249 -4
  9. pulumi_vault/database/_inputs.py +1740 -44
  10. pulumi_vault/database/outputs.py +1198 -18
  11. pulumi_vault/database/secret_backend_connection.py +220 -0
  12. pulumi_vault/database/secret_backend_static_role.py +143 -1
  13. pulumi_vault/database/secrets_mount.py +8 -0
  14. pulumi_vault/gcp/auth_backend.py +222 -2
  15. pulumi_vault/gcp/secret_backend.py +244 -4
  16. pulumi_vault/ldap/auth_backend.py +222 -2
  17. pulumi_vault/ldap/secret_backend.py +222 -2
  18. pulumi_vault/pkisecret/__init__.py +6 -0
  19. pulumi_vault/pkisecret/_inputs.py +34 -6
  20. pulumi_vault/pkisecret/backend_acme_eab.py +549 -0
  21. pulumi_vault/pkisecret/backend_config_acme.py +689 -0
  22. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1376 -0
  23. pulumi_vault/pkisecret/backend_config_cmpv2.py +572 -0
  24. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  25. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  26. pulumi_vault/pkisecret/get_backend_issuer.py +114 -1
  27. pulumi_vault/pkisecret/outputs.py +40 -4
  28. pulumi_vault/pkisecret/secret_backend_cert.py +148 -7
  29. pulumi_vault/pkisecret/secret_backend_crl_config.py +54 -0
  30. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +141 -0
  31. pulumi_vault/pkisecret/secret_backend_issuer.py +265 -0
  32. pulumi_vault/pkisecret/secret_backend_role.py +299 -3
  33. pulumi_vault/pkisecret/secret_backend_root_cert.py +423 -0
  34. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +581 -3
  35. pulumi_vault/pkisecret/secret_backend_sign.py +94 -0
  36. pulumi_vault/pulumi-plugin.json +1 -1
  37. pulumi_vault/ssh/__init__.py +1 -0
  38. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  39. pulumi_vault/ssh/secret_backend_role.py +27 -0
  40. pulumi_vault/terraformcloud/secret_role.py +7 -7
  41. pulumi_vault/transit/__init__.py +2 -0
  42. pulumi_vault/transit/get_sign.py +324 -0
  43. pulumi_vault/transit/get_verify.py +354 -0
  44. pulumi_vault/transit/secret_backend_key.py +162 -0
  45. {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/METADATA +1 -1
  46. {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/RECORD +48 -39
  47. {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/WHEEL +1 -1
  48. {pulumi_vault-6.5.0a1736850018.dist-info → pulumi_vault-6.6.0.dist-info}/top_level.txt +0 -0
@@ -0,0 +1,277 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = [
18
+ 'GetBackendCertMetadataResult',
19
+ 'AwaitableGetBackendCertMetadataResult',
20
+ 'get_backend_cert_metadata',
21
+ 'get_backend_cert_metadata_output',
22
+ ]
23
+
24
+ @pulumi.output_type
25
+ class GetBackendCertMetadataResult:
26
+ """
27
+ A collection of values returned by getBackendCertMetadata.
28
+ """
29
+ def __init__(__self__, cert_metadata=None, expiration=None, id=None, issuer_id=None, namespace=None, path=None, role=None, serial=None, serial_number=None):
30
+ if cert_metadata and not isinstance(cert_metadata, str):
31
+ raise TypeError("Expected argument 'cert_metadata' to be a str")
32
+ pulumi.set(__self__, "cert_metadata", cert_metadata)
33
+ if expiration and not isinstance(expiration, str):
34
+ raise TypeError("Expected argument 'expiration' to be a str")
35
+ pulumi.set(__self__, "expiration", expiration)
36
+ if id and not isinstance(id, str):
37
+ raise TypeError("Expected argument 'id' to be a str")
38
+ pulumi.set(__self__, "id", id)
39
+ if issuer_id and not isinstance(issuer_id, str):
40
+ raise TypeError("Expected argument 'issuer_id' to be a str")
41
+ pulumi.set(__self__, "issuer_id", issuer_id)
42
+ if namespace and not isinstance(namespace, str):
43
+ raise TypeError("Expected argument 'namespace' to be a str")
44
+ pulumi.set(__self__, "namespace", namespace)
45
+ if path and not isinstance(path, str):
46
+ raise TypeError("Expected argument 'path' to be a str")
47
+ pulumi.set(__self__, "path", path)
48
+ if role and not isinstance(role, str):
49
+ raise TypeError("Expected argument 'role' to be a str")
50
+ pulumi.set(__self__, "role", role)
51
+ if serial and not isinstance(serial, str):
52
+ raise TypeError("Expected argument 'serial' to be a str")
53
+ pulumi.set(__self__, "serial", serial)
54
+ if serial_number and not isinstance(serial_number, str):
55
+ raise TypeError("Expected argument 'serial_number' to be a str")
56
+ pulumi.set(__self__, "serial_number", serial_number)
57
+
58
+ @property
59
+ @pulumi.getter(name="certMetadata")
60
+ def cert_metadata(self) -> str:
61
+ """
62
+ The metadata associated with the certificate
63
+ """
64
+ return pulumi.get(self, "cert_metadata")
65
+
66
+ @property
67
+ @pulumi.getter
68
+ def expiration(self) -> str:
69
+ """
70
+ The expiration date of the certificate in unix epoch format
71
+ """
72
+ return pulumi.get(self, "expiration")
73
+
74
+ @property
75
+ @pulumi.getter
76
+ def id(self) -> str:
77
+ """
78
+ The provider-assigned unique ID for this managed resource.
79
+ """
80
+ return pulumi.get(self, "id")
81
+
82
+ @property
83
+ @pulumi.getter(name="issuerId")
84
+ def issuer_id(self) -> str:
85
+ """
86
+ ID of the issuer.
87
+ """
88
+ return pulumi.get(self, "issuer_id")
89
+
90
+ @property
91
+ @pulumi.getter
92
+ def namespace(self) -> Optional[str]:
93
+ return pulumi.get(self, "namespace")
94
+
95
+ @property
96
+ @pulumi.getter
97
+ def path(self) -> str:
98
+ return pulumi.get(self, "path")
99
+
100
+ @property
101
+ @pulumi.getter
102
+ def role(self) -> str:
103
+ """
104
+ The role used to create the certificate
105
+ """
106
+ return pulumi.get(self, "role")
107
+
108
+ @property
109
+ @pulumi.getter
110
+ def serial(self) -> str:
111
+ return pulumi.get(self, "serial")
112
+
113
+ @property
114
+ @pulumi.getter(name="serialNumber")
115
+ def serial_number(self) -> str:
116
+ """
117
+ The serial number
118
+ """
119
+ return pulumi.get(self, "serial_number")
120
+
121
+
122
+ class AwaitableGetBackendCertMetadataResult(GetBackendCertMetadataResult):
123
+ # pylint: disable=using-constant-test
124
+ def __await__(self):
125
+ if False:
126
+ yield self
127
+ return GetBackendCertMetadataResult(
128
+ cert_metadata=self.cert_metadata,
129
+ expiration=self.expiration,
130
+ id=self.id,
131
+ issuer_id=self.issuer_id,
132
+ namespace=self.namespace,
133
+ path=self.path,
134
+ role=self.role,
135
+ serial=self.serial,
136
+ serial_number=self.serial_number)
137
+
138
+
139
+ def get_backend_cert_metadata(namespace: Optional[str] = None,
140
+ path: Optional[str] = None,
141
+ serial: Optional[str] = None,
142
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendCertMetadataResult:
143
+ """
144
+ ## Example Usage
145
+
146
+ ```python
147
+ import pulumi
148
+ import pulumi_vault as vault
149
+
150
+ pki = vault.Mount("pki",
151
+ path="pki",
152
+ type="pki",
153
+ description="PKI secret engine mount")
154
+ root = vault.pki_secret.SecretBackendRootCert("root",
155
+ backend=pki.path,
156
+ type="internal",
157
+ common_name="example",
158
+ ttl="86400",
159
+ issuer_name="example")
160
+ test_secret_backend_role = vault.pki_secret.SecretBackendRole("test",
161
+ backend=test_vault_pki_secret_backend_root_cert["backend"],
162
+ name="test",
163
+ allowed_domains=["test.my.domain"],
164
+ allow_subdomains=True,
165
+ max_ttl="3600",
166
+ key_usages=[
167
+ "DigitalSignature",
168
+ "KeyAgreement",
169
+ "KeyEncipherment",
170
+ ],
171
+ no_store_metadata=False)
172
+ test_secret_backend_cert = vault.pki_secret.SecretBackendCert("test",
173
+ backend=test_secret_backend_role.backend,
174
+ name=test_secret_backend_role.name,
175
+ common_name="cert.test.my.domain",
176
+ ttl="720h",
177
+ min_seconds_remaining=60,
178
+ cert_metadata="dGVzdCBtZXRhZGF0YQ==")
179
+ test = test_secret_backend_cert.serial_number.apply(lambda serial_number: vault.pkiSecret.get_backend_cert_metadata_output(path=test_root["path"],
180
+ serial=serial_number))
181
+ ```
182
+
183
+
184
+ :param str namespace: The namespace of the target resource.
185
+ The value should not contain leading or trailing forward slashes.
186
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
187
+ *Available only for Vault Enterprise*.
188
+ :param str path: The path to the PKI secret backend to
189
+ read the cert metadata from, with no leading or trailing `/`s.
190
+ :param str serial: Specifies the serial of the certificate whose metadata to read.
191
+ """
192
+ __args__ = dict()
193
+ __args__['namespace'] = namespace
194
+ __args__['path'] = path
195
+ __args__['serial'] = serial
196
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
197
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendCertMetadata:getBackendCertMetadata', __args__, opts=opts, typ=GetBackendCertMetadataResult).value
198
+
199
+ return AwaitableGetBackendCertMetadataResult(
200
+ cert_metadata=pulumi.get(__ret__, 'cert_metadata'),
201
+ expiration=pulumi.get(__ret__, 'expiration'),
202
+ id=pulumi.get(__ret__, 'id'),
203
+ issuer_id=pulumi.get(__ret__, 'issuer_id'),
204
+ namespace=pulumi.get(__ret__, 'namespace'),
205
+ path=pulumi.get(__ret__, 'path'),
206
+ role=pulumi.get(__ret__, 'role'),
207
+ serial=pulumi.get(__ret__, 'serial'),
208
+ serial_number=pulumi.get(__ret__, 'serial_number'))
209
+ def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
210
+ path: Optional[pulumi.Input[str]] = None,
211
+ serial: Optional[pulumi.Input[str]] = None,
212
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendCertMetadataResult]:
213
+ """
214
+ ## Example Usage
215
+
216
+ ```python
217
+ import pulumi
218
+ import pulumi_vault as vault
219
+
220
+ pki = vault.Mount("pki",
221
+ path="pki",
222
+ type="pki",
223
+ description="PKI secret engine mount")
224
+ root = vault.pki_secret.SecretBackendRootCert("root",
225
+ backend=pki.path,
226
+ type="internal",
227
+ common_name="example",
228
+ ttl="86400",
229
+ issuer_name="example")
230
+ test_secret_backend_role = vault.pki_secret.SecretBackendRole("test",
231
+ backend=test_vault_pki_secret_backend_root_cert["backend"],
232
+ name="test",
233
+ allowed_domains=["test.my.domain"],
234
+ allow_subdomains=True,
235
+ max_ttl="3600",
236
+ key_usages=[
237
+ "DigitalSignature",
238
+ "KeyAgreement",
239
+ "KeyEncipherment",
240
+ ],
241
+ no_store_metadata=False)
242
+ test_secret_backend_cert = vault.pki_secret.SecretBackendCert("test",
243
+ backend=test_secret_backend_role.backend,
244
+ name=test_secret_backend_role.name,
245
+ common_name="cert.test.my.domain",
246
+ ttl="720h",
247
+ min_seconds_remaining=60,
248
+ cert_metadata="dGVzdCBtZXRhZGF0YQ==")
249
+ test = test_secret_backend_cert.serial_number.apply(lambda serial_number: vault.pkiSecret.get_backend_cert_metadata_output(path=test_root["path"],
250
+ serial=serial_number))
251
+ ```
252
+
253
+
254
+ :param str namespace: The namespace of the target resource.
255
+ The value should not contain leading or trailing forward slashes.
256
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
257
+ *Available only for Vault Enterprise*.
258
+ :param str path: The path to the PKI secret backend to
259
+ read the cert metadata from, with no leading or trailing `/`s.
260
+ :param str serial: Specifies the serial of the certificate whose metadata to read.
261
+ """
262
+ __args__ = dict()
263
+ __args__['namespace'] = namespace
264
+ __args__['path'] = path
265
+ __args__['serial'] = serial
266
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
267
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendCertMetadata:getBackendCertMetadata', __args__, opts=opts, typ=GetBackendCertMetadataResult)
268
+ return __ret__.apply(lambda __response__: GetBackendCertMetadataResult(
269
+ cert_metadata=pulumi.get(__response__, 'cert_metadata'),
270
+ expiration=pulumi.get(__response__, 'expiration'),
271
+ id=pulumi.get(__response__, 'id'),
272
+ issuer_id=pulumi.get(__response__, 'issuer_id'),
273
+ namespace=pulumi.get(__response__, 'namespace'),
274
+ path=pulumi.get(__response__, 'path'),
275
+ role=pulumi.get(__response__, 'role'),
276
+ serial=pulumi.get(__response__, 'serial'),
277
+ serial_number=pulumi.get(__response__, 'serial_number')))
@@ -0,0 +1,226 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+
18
+ __all__ = [
19
+ 'GetBackendConfigCmpv2Result',
20
+ 'AwaitableGetBackendConfigCmpv2Result',
21
+ 'get_backend_config_cmpv2',
22
+ 'get_backend_config_cmpv2_output',
23
+ ]
24
+
25
+ @pulumi.output_type
26
+ class GetBackendConfigCmpv2Result:
27
+ """
28
+ A collection of values returned by getBackendConfigCmpv2.
29
+ """
30
+ def __init__(__self__, audit_fields=None, authenticators=None, backend=None, default_path_policy=None, disabled_validations=None, enable_sentinel_parsing=None, enabled=None, id=None, last_updated=None, namespace=None):
31
+ if audit_fields and not isinstance(audit_fields, list):
32
+ raise TypeError("Expected argument 'audit_fields' to be a list")
33
+ pulumi.set(__self__, "audit_fields", audit_fields)
34
+ if authenticators and not isinstance(authenticators, list):
35
+ raise TypeError("Expected argument 'authenticators' to be a list")
36
+ pulumi.set(__self__, "authenticators", authenticators)
37
+ if backend and not isinstance(backend, str):
38
+ raise TypeError("Expected argument 'backend' to be a str")
39
+ pulumi.set(__self__, "backend", backend)
40
+ if default_path_policy and not isinstance(default_path_policy, str):
41
+ raise TypeError("Expected argument 'default_path_policy' to be a str")
42
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
43
+ if disabled_validations and not isinstance(disabled_validations, list):
44
+ raise TypeError("Expected argument 'disabled_validations' to be a list")
45
+ pulumi.set(__self__, "disabled_validations", disabled_validations)
46
+ if enable_sentinel_parsing and not isinstance(enable_sentinel_parsing, bool):
47
+ raise TypeError("Expected argument 'enable_sentinel_parsing' to be a bool")
48
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
49
+ if enabled and not isinstance(enabled, bool):
50
+ raise TypeError("Expected argument 'enabled' to be a bool")
51
+ pulumi.set(__self__, "enabled", enabled)
52
+ if id and not isinstance(id, str):
53
+ raise TypeError("Expected argument 'id' to be a str")
54
+ pulumi.set(__self__, "id", id)
55
+ if last_updated and not isinstance(last_updated, str):
56
+ raise TypeError("Expected argument 'last_updated' to be a str")
57
+ pulumi.set(__self__, "last_updated", last_updated)
58
+ if namespace and not isinstance(namespace, str):
59
+ raise TypeError("Expected argument 'namespace' to be a str")
60
+ pulumi.set(__self__, "namespace", namespace)
61
+
62
+ @property
63
+ @pulumi.getter(name="auditFields")
64
+ def audit_fields(self) -> Sequence[str]:
65
+ return pulumi.get(self, "audit_fields")
66
+
67
+ @property
68
+ @pulumi.getter
69
+ def authenticators(self) -> Sequence['outputs.GetBackendConfigCmpv2AuthenticatorResult']:
70
+ return pulumi.get(self, "authenticators")
71
+
72
+ @property
73
+ @pulumi.getter
74
+ def backend(self) -> str:
75
+ return pulumi.get(self, "backend")
76
+
77
+ @property
78
+ @pulumi.getter(name="defaultPathPolicy")
79
+ def default_path_policy(self) -> str:
80
+ return pulumi.get(self, "default_path_policy")
81
+
82
+ @property
83
+ @pulumi.getter(name="disabledValidations")
84
+ def disabled_validations(self) -> Optional[Sequence[str]]:
85
+ return pulumi.get(self, "disabled_validations")
86
+
87
+ @property
88
+ @pulumi.getter(name="enableSentinelParsing")
89
+ def enable_sentinel_parsing(self) -> bool:
90
+ return pulumi.get(self, "enable_sentinel_parsing")
91
+
92
+ @property
93
+ @pulumi.getter
94
+ def enabled(self) -> bool:
95
+ return pulumi.get(self, "enabled")
96
+
97
+ @property
98
+ @pulumi.getter
99
+ def id(self) -> str:
100
+ """
101
+ The provider-assigned unique ID for this managed resource.
102
+ """
103
+ return pulumi.get(self, "id")
104
+
105
+ @property
106
+ @pulumi.getter(name="lastUpdated")
107
+ def last_updated(self) -> str:
108
+ return pulumi.get(self, "last_updated")
109
+
110
+ @property
111
+ @pulumi.getter
112
+ def namespace(self) -> Optional[str]:
113
+ return pulumi.get(self, "namespace")
114
+
115
+
116
+ class AwaitableGetBackendConfigCmpv2Result(GetBackendConfigCmpv2Result):
117
+ # pylint: disable=using-constant-test
118
+ def __await__(self):
119
+ if False:
120
+ yield self
121
+ return GetBackendConfigCmpv2Result(
122
+ audit_fields=self.audit_fields,
123
+ authenticators=self.authenticators,
124
+ backend=self.backend,
125
+ default_path_policy=self.default_path_policy,
126
+ disabled_validations=self.disabled_validations,
127
+ enable_sentinel_parsing=self.enable_sentinel_parsing,
128
+ enabled=self.enabled,
129
+ id=self.id,
130
+ last_updated=self.last_updated,
131
+ namespace=self.namespace)
132
+
133
+
134
+ def get_backend_config_cmpv2(backend: Optional[str] = None,
135
+ disabled_validations: Optional[Sequence[str]] = None,
136
+ namespace: Optional[str] = None,
137
+ opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigCmpv2Result:
138
+ """
139
+ ## Example Usage
140
+
141
+ ```python
142
+ import pulumi
143
+ import pulumi_vault as vault
144
+
145
+ pki = vault.Mount("pki",
146
+ path="pki",
147
+ type="pki",
148
+ description="PKI secret engine mount")
149
+ cmpv2_config = vault.pkiSecret.get_backend_config_cmpv2_output(backend=pki.path)
150
+ ```
151
+
152
+
153
+ :param str backend: The path to the PKI secret backend to
154
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
155
+
156
+ # Attributes Reference
157
+ :param Sequence[str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
158
+ :param str namespace: The namespace of the target resource.
159
+ The value should not contain leading or trailing forward slashes.
160
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
161
+ *Available only for Vault Enterprise*.
162
+ """
163
+ __args__ = dict()
164
+ __args__['backend'] = backend
165
+ __args__['disabledValidations'] = disabled_validations
166
+ __args__['namespace'] = namespace
167
+ opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
168
+ __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigCmpv2:getBackendConfigCmpv2', __args__, opts=opts, typ=GetBackendConfigCmpv2Result).value
169
+
170
+ return AwaitableGetBackendConfigCmpv2Result(
171
+ audit_fields=pulumi.get(__ret__, 'audit_fields'),
172
+ authenticators=pulumi.get(__ret__, 'authenticators'),
173
+ backend=pulumi.get(__ret__, 'backend'),
174
+ default_path_policy=pulumi.get(__ret__, 'default_path_policy'),
175
+ disabled_validations=pulumi.get(__ret__, 'disabled_validations'),
176
+ enable_sentinel_parsing=pulumi.get(__ret__, 'enable_sentinel_parsing'),
177
+ enabled=pulumi.get(__ret__, 'enabled'),
178
+ id=pulumi.get(__ret__, 'id'),
179
+ last_updated=pulumi.get(__ret__, 'last_updated'),
180
+ namespace=pulumi.get(__ret__, 'namespace'))
181
+ def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[str]] = None,
182
+ disabled_validations: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
183
+ namespace: Optional[pulumi.Input[Optional[str]]] = None,
184
+ opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigCmpv2Result]:
185
+ """
186
+ ## Example Usage
187
+
188
+ ```python
189
+ import pulumi
190
+ import pulumi_vault as vault
191
+
192
+ pki = vault.Mount("pki",
193
+ path="pki",
194
+ type="pki",
195
+ description="PKI secret engine mount")
196
+ cmpv2_config = vault.pkiSecret.get_backend_config_cmpv2_output(backend=pki.path)
197
+ ```
198
+
199
+
200
+ :param str backend: The path to the PKI secret backend to
201
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
202
+
203
+ # Attributes Reference
204
+ :param Sequence[str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
205
+ :param str namespace: The namespace of the target resource.
206
+ The value should not contain leading or trailing forward slashes.
207
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
208
+ *Available only for Vault Enterprise*.
209
+ """
210
+ __args__ = dict()
211
+ __args__['backend'] = backend
212
+ __args__['disabledValidations'] = disabled_validations
213
+ __args__['namespace'] = namespace
214
+ opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
215
+ __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigCmpv2:getBackendConfigCmpv2', __args__, opts=opts, typ=GetBackendConfigCmpv2Result)
216
+ return __ret__.apply(lambda __response__: GetBackendConfigCmpv2Result(
217
+ audit_fields=pulumi.get(__response__, 'audit_fields'),
218
+ authenticators=pulumi.get(__response__, 'authenticators'),
219
+ backend=pulumi.get(__response__, 'backend'),
220
+ default_path_policy=pulumi.get(__response__, 'default_path_policy'),
221
+ disabled_validations=pulumi.get(__response__, 'disabled_validations'),
222
+ enable_sentinel_parsing=pulumi.get(__response__, 'enable_sentinel_parsing'),
223
+ enabled=pulumi.get(__response__, 'enabled'),
224
+ id=pulumi.get(__response__, 'id'),
225
+ last_updated=pulumi.get(__response__, 'last_updated'),
226
+ namespace=pulumi.get(__response__, 'namespace')))