pulumi-vault 6.5.0a1736850018__py3-none-any.whl → 6.6.0a1737095215__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -0,0 +1,525 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import copy
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['BackendConfigCmpv2Args', 'BackendConfigCmpv2']
20
+
21
+ @pulumi.input_type
22
+ class BackendConfigCmpv2Args:
23
+ def __init__(__self__, *,
24
+ backend: pulumi.Input[str],
25
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
26
+ authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
27
+ default_path_policy: Optional[pulumi.Input[str]] = None,
28
+ enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
29
+ enabled: Optional[pulumi.Input[bool]] = None,
30
+ namespace: Optional[pulumi.Input[str]] = None):
31
+ """
32
+ The set of arguments for constructing a BackendConfigCmpv2 resource.
33
+ :param pulumi.Input[str] backend: The path to the PKI secret backend to
34
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
35
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
36
+
37
+ <a id="nestedatt--authenticators"></a>
38
+ :param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
39
+ :param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
40
+ :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
41
+ :param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
42
+ :param pulumi.Input[str] namespace: The namespace of the target resource.
43
+ The value should not contain leading or trailing forward slashes.
44
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
45
+ *Available only for Vault Enterprise*.
46
+ """
47
+ pulumi.set(__self__, "backend", backend)
48
+ if audit_fields is not None:
49
+ pulumi.set(__self__, "audit_fields", audit_fields)
50
+ if authenticators is not None:
51
+ pulumi.set(__self__, "authenticators", authenticators)
52
+ if default_path_policy is not None:
53
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
54
+ if enable_sentinel_parsing is not None:
55
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
56
+ if enabled is not None:
57
+ pulumi.set(__self__, "enabled", enabled)
58
+ if namespace is not None:
59
+ pulumi.set(__self__, "namespace", namespace)
60
+
61
+ @property
62
+ @pulumi.getter
63
+ def backend(self) -> pulumi.Input[str]:
64
+ """
65
+ The path to the PKI secret backend to
66
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
67
+ """
68
+ return pulumi.get(self, "backend")
69
+
70
+ @backend.setter
71
+ def backend(self, value: pulumi.Input[str]):
72
+ pulumi.set(self, "backend", value)
73
+
74
+ @property
75
+ @pulumi.getter(name="auditFields")
76
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
77
+ """
78
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
79
+
80
+ <a id="nestedatt--authenticators"></a>
81
+ """
82
+ return pulumi.get(self, "audit_fields")
83
+
84
+ @audit_fields.setter
85
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
86
+ pulumi.set(self, "audit_fields", value)
87
+
88
+ @property
89
+ @pulumi.getter
90
+ def authenticators(self) -> Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]:
91
+ """
92
+ Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
93
+ """
94
+ return pulumi.get(self, "authenticators")
95
+
96
+ @authenticators.setter
97
+ def authenticators(self, value: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]):
98
+ pulumi.set(self, "authenticators", value)
99
+
100
+ @property
101
+ @pulumi.getter(name="defaultPathPolicy")
102
+ def default_path_policy(self) -> Optional[pulumi.Input[str]]:
103
+ """
104
+ Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
105
+ """
106
+ return pulumi.get(self, "default_path_policy")
107
+
108
+ @default_path_policy.setter
109
+ def default_path_policy(self, value: Optional[pulumi.Input[str]]):
110
+ pulumi.set(self, "default_path_policy", value)
111
+
112
+ @property
113
+ @pulumi.getter(name="enableSentinelParsing")
114
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[bool]]:
115
+ """
116
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
117
+ """
118
+ return pulumi.get(self, "enable_sentinel_parsing")
119
+
120
+ @enable_sentinel_parsing.setter
121
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[bool]]):
122
+ pulumi.set(self, "enable_sentinel_parsing", value)
123
+
124
+ @property
125
+ @pulumi.getter
126
+ def enabled(self) -> Optional[pulumi.Input[bool]]:
127
+ """
128
+ Specifies whether CMPv2 is enabled.
129
+ """
130
+ return pulumi.get(self, "enabled")
131
+
132
+ @enabled.setter
133
+ def enabled(self, value: Optional[pulumi.Input[bool]]):
134
+ pulumi.set(self, "enabled", value)
135
+
136
+ @property
137
+ @pulumi.getter
138
+ def namespace(self) -> Optional[pulumi.Input[str]]:
139
+ """
140
+ The namespace of the target resource.
141
+ The value should not contain leading or trailing forward slashes.
142
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
143
+ *Available only for Vault Enterprise*.
144
+ """
145
+ return pulumi.get(self, "namespace")
146
+
147
+ @namespace.setter
148
+ def namespace(self, value: Optional[pulumi.Input[str]]):
149
+ pulumi.set(self, "namespace", value)
150
+
151
+
152
+ @pulumi.input_type
153
+ class _BackendConfigCmpv2State:
154
+ def __init__(__self__, *,
155
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
156
+ authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
157
+ backend: Optional[pulumi.Input[str]] = None,
158
+ default_path_policy: Optional[pulumi.Input[str]] = None,
159
+ enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
160
+ enabled: Optional[pulumi.Input[bool]] = None,
161
+ last_updated: Optional[pulumi.Input[str]] = None,
162
+ namespace: Optional[pulumi.Input[str]] = None):
163
+ """
164
+ Input properties used for looking up and filtering BackendConfigCmpv2 resources.
165
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
166
+
167
+ <a id="nestedatt--authenticators"></a>
168
+ :param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
169
+ :param pulumi.Input[str] backend: The path to the PKI secret backend to
170
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
171
+ :param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
172
+ :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
173
+ :param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
174
+ :param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
175
+ :param pulumi.Input[str] namespace: The namespace of the target resource.
176
+ The value should not contain leading or trailing forward slashes.
177
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
178
+ *Available only for Vault Enterprise*.
179
+ """
180
+ if audit_fields is not None:
181
+ pulumi.set(__self__, "audit_fields", audit_fields)
182
+ if authenticators is not None:
183
+ pulumi.set(__self__, "authenticators", authenticators)
184
+ if backend is not None:
185
+ pulumi.set(__self__, "backend", backend)
186
+ if default_path_policy is not None:
187
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
188
+ if enable_sentinel_parsing is not None:
189
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
190
+ if enabled is not None:
191
+ pulumi.set(__self__, "enabled", enabled)
192
+ if last_updated is not None:
193
+ pulumi.set(__self__, "last_updated", last_updated)
194
+ if namespace is not None:
195
+ pulumi.set(__self__, "namespace", namespace)
196
+
197
+ @property
198
+ @pulumi.getter(name="auditFields")
199
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
200
+ """
201
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
202
+
203
+ <a id="nestedatt--authenticators"></a>
204
+ """
205
+ return pulumi.get(self, "audit_fields")
206
+
207
+ @audit_fields.setter
208
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
209
+ pulumi.set(self, "audit_fields", value)
210
+
211
+ @property
212
+ @pulumi.getter
213
+ def authenticators(self) -> Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]:
214
+ """
215
+ Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
216
+ """
217
+ return pulumi.get(self, "authenticators")
218
+
219
+ @authenticators.setter
220
+ def authenticators(self, value: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]):
221
+ pulumi.set(self, "authenticators", value)
222
+
223
+ @property
224
+ @pulumi.getter
225
+ def backend(self) -> Optional[pulumi.Input[str]]:
226
+ """
227
+ The path to the PKI secret backend to
228
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
229
+ """
230
+ return pulumi.get(self, "backend")
231
+
232
+ @backend.setter
233
+ def backend(self, value: Optional[pulumi.Input[str]]):
234
+ pulumi.set(self, "backend", value)
235
+
236
+ @property
237
+ @pulumi.getter(name="defaultPathPolicy")
238
+ def default_path_policy(self) -> Optional[pulumi.Input[str]]:
239
+ """
240
+ Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
241
+ """
242
+ return pulumi.get(self, "default_path_policy")
243
+
244
+ @default_path_policy.setter
245
+ def default_path_policy(self, value: Optional[pulumi.Input[str]]):
246
+ pulumi.set(self, "default_path_policy", value)
247
+
248
+ @property
249
+ @pulumi.getter(name="enableSentinelParsing")
250
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[bool]]:
251
+ """
252
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
253
+ """
254
+ return pulumi.get(self, "enable_sentinel_parsing")
255
+
256
+ @enable_sentinel_parsing.setter
257
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[bool]]):
258
+ pulumi.set(self, "enable_sentinel_parsing", value)
259
+
260
+ @property
261
+ @pulumi.getter
262
+ def enabled(self) -> Optional[pulumi.Input[bool]]:
263
+ """
264
+ Specifies whether CMPv2 is enabled.
265
+ """
266
+ return pulumi.get(self, "enabled")
267
+
268
+ @enabled.setter
269
+ def enabled(self, value: Optional[pulumi.Input[bool]]):
270
+ pulumi.set(self, "enabled", value)
271
+
272
+ @property
273
+ @pulumi.getter(name="lastUpdated")
274
+ def last_updated(self) -> Optional[pulumi.Input[str]]:
275
+ """
276
+ A read-only timestamp representing the last time the configuration was updated.
277
+ """
278
+ return pulumi.get(self, "last_updated")
279
+
280
+ @last_updated.setter
281
+ def last_updated(self, value: Optional[pulumi.Input[str]]):
282
+ pulumi.set(self, "last_updated", value)
283
+
284
+ @property
285
+ @pulumi.getter
286
+ def namespace(self) -> Optional[pulumi.Input[str]]:
287
+ """
288
+ The namespace of the target resource.
289
+ The value should not contain leading or trailing forward slashes.
290
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
291
+ *Available only for Vault Enterprise*.
292
+ """
293
+ return pulumi.get(self, "namespace")
294
+
295
+ @namespace.setter
296
+ def namespace(self, value: Optional[pulumi.Input[str]]):
297
+ pulumi.set(self, "namespace", value)
298
+
299
+
300
+ class BackendConfigCmpv2(pulumi.CustomResource):
301
+ @overload
302
+ def __init__(__self__,
303
+ resource_name: str,
304
+ opts: Optional[pulumi.ResourceOptions] = None,
305
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
306
+ authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
307
+ backend: Optional[pulumi.Input[str]] = None,
308
+ default_path_policy: Optional[pulumi.Input[str]] = None,
309
+ enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
310
+ enabled: Optional[pulumi.Input[bool]] = None,
311
+ namespace: Optional[pulumi.Input[str]] = None,
312
+ __props__=None):
313
+ """
314
+ Allows setting the CMPv2 configuration on a PKI Secret Backend
315
+
316
+ ## Import
317
+
318
+ The PKI config cluster can be imported using the resource's `id`.
319
+ In the case of the example above the `id` would be `pki-root/config/cmpv2`,
320
+ where the `pki-root` component is the resource's `backend`, e.g.
321
+
322
+ ```sh
323
+ $ pulumi import vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2 example pki-root/config/cmpv2
324
+ ```
325
+
326
+ :param str resource_name: The name of the resource.
327
+ :param pulumi.ResourceOptions opts: Options for the resource.
328
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
329
+
330
+ <a id="nestedatt--authenticators"></a>
331
+ :param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
332
+ :param pulumi.Input[str] backend: The path to the PKI secret backend to
333
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
334
+ :param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
335
+ :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
336
+ :param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
337
+ :param pulumi.Input[str] namespace: The namespace of the target resource.
338
+ The value should not contain leading or trailing forward slashes.
339
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
340
+ *Available only for Vault Enterprise*.
341
+ """
342
+ ...
343
+ @overload
344
+ def __init__(__self__,
345
+ resource_name: str,
346
+ args: BackendConfigCmpv2Args,
347
+ opts: Optional[pulumi.ResourceOptions] = None):
348
+ """
349
+ Allows setting the CMPv2 configuration on a PKI Secret Backend
350
+
351
+ ## Import
352
+
353
+ The PKI config cluster can be imported using the resource's `id`.
354
+ In the case of the example above the `id` would be `pki-root/config/cmpv2`,
355
+ where the `pki-root` component is the resource's `backend`, e.g.
356
+
357
+ ```sh
358
+ $ pulumi import vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2 example pki-root/config/cmpv2
359
+ ```
360
+
361
+ :param str resource_name: The name of the resource.
362
+ :param BackendConfigCmpv2Args args: The arguments to use to populate this resource's properties.
363
+ :param pulumi.ResourceOptions opts: Options for the resource.
364
+ """
365
+ ...
366
+ def __init__(__self__, resource_name: str, *args, **kwargs):
367
+ resource_args, opts = _utilities.get_resource_args_opts(BackendConfigCmpv2Args, pulumi.ResourceOptions, *args, **kwargs)
368
+ if resource_args is not None:
369
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
370
+ else:
371
+ __self__._internal_init(resource_name, *args, **kwargs)
372
+
373
+ def _internal_init(__self__,
374
+ resource_name: str,
375
+ opts: Optional[pulumi.ResourceOptions] = None,
376
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
377
+ authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
378
+ backend: Optional[pulumi.Input[str]] = None,
379
+ default_path_policy: Optional[pulumi.Input[str]] = None,
380
+ enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
381
+ enabled: Optional[pulumi.Input[bool]] = None,
382
+ namespace: Optional[pulumi.Input[str]] = None,
383
+ __props__=None):
384
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
385
+ if not isinstance(opts, pulumi.ResourceOptions):
386
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
387
+ if opts.id is None:
388
+ if __props__ is not None:
389
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
390
+ __props__ = BackendConfigCmpv2Args.__new__(BackendConfigCmpv2Args)
391
+
392
+ __props__.__dict__["audit_fields"] = audit_fields
393
+ __props__.__dict__["authenticators"] = authenticators
394
+ if backend is None and not opts.urn:
395
+ raise TypeError("Missing required property 'backend'")
396
+ __props__.__dict__["backend"] = backend
397
+ __props__.__dict__["default_path_policy"] = default_path_policy
398
+ __props__.__dict__["enable_sentinel_parsing"] = enable_sentinel_parsing
399
+ __props__.__dict__["enabled"] = enabled
400
+ __props__.__dict__["namespace"] = namespace
401
+ __props__.__dict__["last_updated"] = None
402
+ super(BackendConfigCmpv2, __self__).__init__(
403
+ 'vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2',
404
+ resource_name,
405
+ __props__,
406
+ opts)
407
+
408
+ @staticmethod
409
+ def get(resource_name: str,
410
+ id: pulumi.Input[str],
411
+ opts: Optional[pulumi.ResourceOptions] = None,
412
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
413
+ authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
414
+ backend: Optional[pulumi.Input[str]] = None,
415
+ default_path_policy: Optional[pulumi.Input[str]] = None,
416
+ enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
417
+ enabled: Optional[pulumi.Input[bool]] = None,
418
+ last_updated: Optional[pulumi.Input[str]] = None,
419
+ namespace: Optional[pulumi.Input[str]] = None) -> 'BackendConfigCmpv2':
420
+ """
421
+ Get an existing BackendConfigCmpv2 resource's state with the given name, id, and optional extra
422
+ properties used to qualify the lookup.
423
+
424
+ :param str resource_name: The unique name of the resulting resource.
425
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
426
+ :param pulumi.ResourceOptions opts: Options for the resource.
427
+ :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
428
+
429
+ <a id="nestedatt--authenticators"></a>
430
+ :param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
431
+ :param pulumi.Input[str] backend: The path to the PKI secret backend to
432
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
433
+ :param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
434
+ :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
435
+ :param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
436
+ :param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
437
+ :param pulumi.Input[str] namespace: The namespace of the target resource.
438
+ The value should not contain leading or trailing forward slashes.
439
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
440
+ *Available only for Vault Enterprise*.
441
+ """
442
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
443
+
444
+ __props__ = _BackendConfigCmpv2State.__new__(_BackendConfigCmpv2State)
445
+
446
+ __props__.__dict__["audit_fields"] = audit_fields
447
+ __props__.__dict__["authenticators"] = authenticators
448
+ __props__.__dict__["backend"] = backend
449
+ __props__.__dict__["default_path_policy"] = default_path_policy
450
+ __props__.__dict__["enable_sentinel_parsing"] = enable_sentinel_parsing
451
+ __props__.__dict__["enabled"] = enabled
452
+ __props__.__dict__["last_updated"] = last_updated
453
+ __props__.__dict__["namespace"] = namespace
454
+ return BackendConfigCmpv2(resource_name, opts=opts, __props__=__props__)
455
+
456
+ @property
457
+ @pulumi.getter(name="auditFields")
458
+ def audit_fields(self) -> pulumi.Output[Sequence[str]]:
459
+ """
460
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
461
+
462
+ <a id="nestedatt--authenticators"></a>
463
+ """
464
+ return pulumi.get(self, "audit_fields")
465
+
466
+ @property
467
+ @pulumi.getter
468
+ def authenticators(self) -> pulumi.Output['outputs.BackendConfigCmpv2Authenticators']:
469
+ """
470
+ Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
471
+ """
472
+ return pulumi.get(self, "authenticators")
473
+
474
+ @property
475
+ @pulumi.getter
476
+ def backend(self) -> pulumi.Output[str]:
477
+ """
478
+ The path to the PKI secret backend to
479
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
480
+ """
481
+ return pulumi.get(self, "backend")
482
+
483
+ @property
484
+ @pulumi.getter(name="defaultPathPolicy")
485
+ def default_path_policy(self) -> pulumi.Output[Optional[str]]:
486
+ """
487
+ Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
488
+ """
489
+ return pulumi.get(self, "default_path_policy")
490
+
491
+ @property
492
+ @pulumi.getter(name="enableSentinelParsing")
493
+ def enable_sentinel_parsing(self) -> pulumi.Output[Optional[bool]]:
494
+ """
495
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
496
+ """
497
+ return pulumi.get(self, "enable_sentinel_parsing")
498
+
499
+ @property
500
+ @pulumi.getter
501
+ def enabled(self) -> pulumi.Output[Optional[bool]]:
502
+ """
503
+ Specifies whether CMPv2 is enabled.
504
+ """
505
+ return pulumi.get(self, "enabled")
506
+
507
+ @property
508
+ @pulumi.getter(name="lastUpdated")
509
+ def last_updated(self) -> pulumi.Output[str]:
510
+ """
511
+ A read-only timestamp representing the last time the configuration was updated.
512
+ """
513
+ return pulumi.get(self, "last_updated")
514
+
515
+ @property
516
+ @pulumi.getter
517
+ def namespace(self) -> pulumi.Output[Optional[str]]:
518
+ """
519
+ The namespace of the target resource.
520
+ The value should not contain leading or trailing forward slashes.
521
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
522
+ *Available only for Vault Enterprise*.
523
+ """
524
+ return pulumi.get(self, "namespace")
525
+