pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -21,27 +22,27 @@ __all__ = ['BackendConfigCmpv2Args', 'BackendConfigCmpv2']
21
22
  @pulumi.input_type
22
23
  class BackendConfigCmpv2Args:
23
24
  def __init__(__self__, *,
24
- backend: pulumi.Input[str],
25
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
+ backend: pulumi.Input[builtins.str],
26
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
27
  authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
27
- default_path_policy: Optional[pulumi.Input[str]] = None,
28
- disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
29
- enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
30
- enabled: Optional[pulumi.Input[bool]] = None,
31
- namespace: Optional[pulumi.Input[str]] = None):
28
+ default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
29
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
30
+ enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
31
+ enabled: Optional[pulumi.Input[builtins.bool]] = None,
32
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
32
33
  """
33
34
  The set of arguments for constructing a BackendConfigCmpv2 resource.
34
- :param pulumi.Input[str] backend: The path to the PKI secret backend to
35
+ :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
35
36
  read the CMPv2 configuration from, with no leading or trailing `/`s.
36
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
37
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
37
38
  :param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
38
- :param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
39
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
39
+ :param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
40
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
40
41
 
41
42
  <a id="nestedatt--authenticators"></a>
42
- :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
43
- :param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
44
- :param pulumi.Input[str] namespace: The namespace of the target resource.
43
+ :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
44
+ :param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
45
+ :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
45
46
  The value should not contain leading or trailing forward slashes.
46
47
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
47
48
  *Available only for Vault Enterprise*.
@@ -64,7 +65,7 @@ class BackendConfigCmpv2Args:
64
65
 
65
66
  @property
66
67
  @pulumi.getter
67
- def backend(self) -> pulumi.Input[str]:
68
+ def backend(self) -> pulumi.Input[builtins.str]:
68
69
  """
69
70
  The path to the PKI secret backend to
70
71
  read the CMPv2 configuration from, with no leading or trailing `/`s.
@@ -72,19 +73,19 @@ class BackendConfigCmpv2Args:
72
73
  return pulumi.get(self, "backend")
73
74
 
74
75
  @backend.setter
75
- def backend(self, value: pulumi.Input[str]):
76
+ def backend(self, value: pulumi.Input[builtins.str]):
76
77
  pulumi.set(self, "backend", value)
77
78
 
78
79
  @property
79
80
  @pulumi.getter(name="auditFields")
80
- def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
81
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
81
82
  """
82
83
  Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
83
84
  """
84
85
  return pulumi.get(self, "audit_fields")
85
86
 
86
87
  @audit_fields.setter
87
- def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
88
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
88
89
  pulumi.set(self, "audit_fields", value)
89
90
 
90
91
  @property
@@ -101,19 +102,19 @@ class BackendConfigCmpv2Args:
101
102
 
102
103
  @property
103
104
  @pulumi.getter(name="defaultPathPolicy")
104
- def default_path_policy(self) -> Optional[pulumi.Input[str]]:
105
+ def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
105
106
  """
106
107
  Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
107
108
  """
108
109
  return pulumi.get(self, "default_path_policy")
109
110
 
110
111
  @default_path_policy.setter
111
- def default_path_policy(self, value: Optional[pulumi.Input[str]]):
112
+ def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
112
113
  pulumi.set(self, "default_path_policy", value)
113
114
 
114
115
  @property
115
116
  @pulumi.getter(name="disabledValidations")
116
- def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
117
+ def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
117
118
  """
118
119
  A comma-separated list of validations not to perform on CMPv2 messages.
119
120
 
@@ -122,36 +123,36 @@ class BackendConfigCmpv2Args:
122
123
  return pulumi.get(self, "disabled_validations")
123
124
 
124
125
  @disabled_validations.setter
125
- def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
126
+ def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
126
127
  pulumi.set(self, "disabled_validations", value)
127
128
 
128
129
  @property
129
130
  @pulumi.getter(name="enableSentinelParsing")
130
- def enable_sentinel_parsing(self) -> Optional[pulumi.Input[bool]]:
131
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[builtins.bool]]:
131
132
  """
132
133
  If set, parse out fields from the provided CSR making them available for Sentinel policies.
133
134
  """
134
135
  return pulumi.get(self, "enable_sentinel_parsing")
135
136
 
136
137
  @enable_sentinel_parsing.setter
137
- def enable_sentinel_parsing(self, value: Optional[pulumi.Input[bool]]):
138
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[builtins.bool]]):
138
139
  pulumi.set(self, "enable_sentinel_parsing", value)
139
140
 
140
141
  @property
141
142
  @pulumi.getter
142
- def enabled(self) -> Optional[pulumi.Input[bool]]:
143
+ def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
143
144
  """
144
145
  Specifies whether CMPv2 is enabled.
145
146
  """
146
147
  return pulumi.get(self, "enabled")
147
148
 
148
149
  @enabled.setter
149
- def enabled(self, value: Optional[pulumi.Input[bool]]):
150
+ def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
150
151
  pulumi.set(self, "enabled", value)
151
152
 
152
153
  @property
153
154
  @pulumi.getter
154
- def namespace(self) -> Optional[pulumi.Input[str]]:
155
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
155
156
  """
156
157
  The namespace of the target resource.
157
158
  The value should not contain leading or trailing forward slashes.
@@ -161,36 +162,36 @@ class BackendConfigCmpv2Args:
161
162
  return pulumi.get(self, "namespace")
162
163
 
163
164
  @namespace.setter
164
- def namespace(self, value: Optional[pulumi.Input[str]]):
165
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
165
166
  pulumi.set(self, "namespace", value)
166
167
 
167
168
 
168
169
  @pulumi.input_type
169
170
  class _BackendConfigCmpv2State:
170
171
  def __init__(__self__, *,
171
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
172
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
172
173
  authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
173
- backend: Optional[pulumi.Input[str]] = None,
174
- default_path_policy: Optional[pulumi.Input[str]] = None,
175
- disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
176
- enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
177
- enabled: Optional[pulumi.Input[bool]] = None,
178
- last_updated: Optional[pulumi.Input[str]] = None,
179
- namespace: Optional[pulumi.Input[str]] = None):
174
+ backend: Optional[pulumi.Input[builtins.str]] = None,
175
+ default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
176
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
177
+ enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
178
+ enabled: Optional[pulumi.Input[builtins.bool]] = None,
179
+ last_updated: Optional[pulumi.Input[builtins.str]] = None,
180
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
180
181
  """
181
182
  Input properties used for looking up and filtering BackendConfigCmpv2 resources.
182
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
183
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
183
184
  :param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
184
- :param pulumi.Input[str] backend: The path to the PKI secret backend to
185
+ :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
185
186
  read the CMPv2 configuration from, with no leading or trailing `/`s.
186
- :param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
187
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
187
+ :param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
188
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
188
189
 
189
190
  <a id="nestedatt--authenticators"></a>
190
- :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
191
- :param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
192
- :param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
193
- :param pulumi.Input[str] namespace: The namespace of the target resource.
191
+ :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
192
+ :param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
193
+ :param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
194
+ :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
194
195
  The value should not contain leading or trailing forward slashes.
195
196
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
196
197
  *Available only for Vault Enterprise*.
@@ -216,14 +217,14 @@ class _BackendConfigCmpv2State:
216
217
 
217
218
  @property
218
219
  @pulumi.getter(name="auditFields")
219
- def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
220
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
220
221
  """
221
222
  Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
222
223
  """
223
224
  return pulumi.get(self, "audit_fields")
224
225
 
225
226
  @audit_fields.setter
226
- def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
227
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
227
228
  pulumi.set(self, "audit_fields", value)
228
229
 
229
230
  @property
@@ -240,7 +241,7 @@ class _BackendConfigCmpv2State:
240
241
 
241
242
  @property
242
243
  @pulumi.getter
243
- def backend(self) -> Optional[pulumi.Input[str]]:
244
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
244
245
  """
245
246
  The path to the PKI secret backend to
246
247
  read the CMPv2 configuration from, with no leading or trailing `/`s.
@@ -248,24 +249,24 @@ class _BackendConfigCmpv2State:
248
249
  return pulumi.get(self, "backend")
249
250
 
250
251
  @backend.setter
251
- def backend(self, value: Optional[pulumi.Input[str]]):
252
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
252
253
  pulumi.set(self, "backend", value)
253
254
 
254
255
  @property
255
256
  @pulumi.getter(name="defaultPathPolicy")
256
- def default_path_policy(self) -> Optional[pulumi.Input[str]]:
257
+ def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
257
258
  """
258
259
  Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
259
260
  """
260
261
  return pulumi.get(self, "default_path_policy")
261
262
 
262
263
  @default_path_policy.setter
263
- def default_path_policy(self, value: Optional[pulumi.Input[str]]):
264
+ def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
264
265
  pulumi.set(self, "default_path_policy", value)
265
266
 
266
267
  @property
267
268
  @pulumi.getter(name="disabledValidations")
268
- def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
269
+ def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
269
270
  """
270
271
  A comma-separated list of validations not to perform on CMPv2 messages.
271
272
 
@@ -274,48 +275,48 @@ class _BackendConfigCmpv2State:
274
275
  return pulumi.get(self, "disabled_validations")
275
276
 
276
277
  @disabled_validations.setter
277
- def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
278
+ def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
278
279
  pulumi.set(self, "disabled_validations", value)
279
280
 
280
281
  @property
281
282
  @pulumi.getter(name="enableSentinelParsing")
282
- def enable_sentinel_parsing(self) -> Optional[pulumi.Input[bool]]:
283
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[builtins.bool]]:
283
284
  """
284
285
  If set, parse out fields from the provided CSR making them available for Sentinel policies.
285
286
  """
286
287
  return pulumi.get(self, "enable_sentinel_parsing")
287
288
 
288
289
  @enable_sentinel_parsing.setter
289
- def enable_sentinel_parsing(self, value: Optional[pulumi.Input[bool]]):
290
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[builtins.bool]]):
290
291
  pulumi.set(self, "enable_sentinel_parsing", value)
291
292
 
292
293
  @property
293
294
  @pulumi.getter
294
- def enabled(self) -> Optional[pulumi.Input[bool]]:
295
+ def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
295
296
  """
296
297
  Specifies whether CMPv2 is enabled.
297
298
  """
298
299
  return pulumi.get(self, "enabled")
299
300
 
300
301
  @enabled.setter
301
- def enabled(self, value: Optional[pulumi.Input[bool]]):
302
+ def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
302
303
  pulumi.set(self, "enabled", value)
303
304
 
304
305
  @property
305
306
  @pulumi.getter(name="lastUpdated")
306
- def last_updated(self) -> Optional[pulumi.Input[str]]:
307
+ def last_updated(self) -> Optional[pulumi.Input[builtins.str]]:
307
308
  """
308
309
  A read-only timestamp representing the last time the configuration was updated.
309
310
  """
310
311
  return pulumi.get(self, "last_updated")
311
312
 
312
313
  @last_updated.setter
313
- def last_updated(self, value: Optional[pulumi.Input[str]]):
314
+ def last_updated(self, value: Optional[pulumi.Input[builtins.str]]):
314
315
  pulumi.set(self, "last_updated", value)
315
316
 
316
317
  @property
317
318
  @pulumi.getter
318
- def namespace(self) -> Optional[pulumi.Input[str]]:
319
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
319
320
  """
320
321
  The namespace of the target resource.
321
322
  The value should not contain leading or trailing forward slashes.
@@ -325,7 +326,7 @@ class _BackendConfigCmpv2State:
325
326
  return pulumi.get(self, "namespace")
326
327
 
327
328
  @namespace.setter
328
- def namespace(self, value: Optional[pulumi.Input[str]]):
329
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
329
330
  pulumi.set(self, "namespace", value)
330
331
 
331
332
 
@@ -334,14 +335,14 @@ class BackendConfigCmpv2(pulumi.CustomResource):
334
335
  def __init__(__self__,
335
336
  resource_name: str,
336
337
  opts: Optional[pulumi.ResourceOptions] = None,
337
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
338
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
338
339
  authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
339
- backend: Optional[pulumi.Input[str]] = None,
340
- default_path_policy: Optional[pulumi.Input[str]] = None,
341
- disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
342
- enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
343
- enabled: Optional[pulumi.Input[bool]] = None,
344
- namespace: Optional[pulumi.Input[str]] = None,
340
+ backend: Optional[pulumi.Input[builtins.str]] = None,
341
+ default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
342
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
343
+ enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
344
+ enabled: Optional[pulumi.Input[builtins.bool]] = None,
345
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
345
346
  __props__=None):
346
347
  """
347
348
  Allows setting the CMPv2 configuration on a PKI Secret Backend
@@ -358,17 +359,17 @@ class BackendConfigCmpv2(pulumi.CustomResource):
358
359
 
359
360
  :param str resource_name: The name of the resource.
360
361
  :param pulumi.ResourceOptions opts: Options for the resource.
361
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
362
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
362
363
  :param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
363
- :param pulumi.Input[str] backend: The path to the PKI secret backend to
364
+ :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
364
365
  read the CMPv2 configuration from, with no leading or trailing `/`s.
365
- :param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
366
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
366
+ :param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
367
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
367
368
 
368
369
  <a id="nestedatt--authenticators"></a>
369
- :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
370
- :param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
371
- :param pulumi.Input[str] namespace: The namespace of the target resource.
370
+ :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
371
+ :param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
372
+ :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
372
373
  The value should not contain leading or trailing forward slashes.
373
374
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
374
375
  *Available only for Vault Enterprise*.
@@ -407,14 +408,14 @@ class BackendConfigCmpv2(pulumi.CustomResource):
407
408
  def _internal_init(__self__,
408
409
  resource_name: str,
409
410
  opts: Optional[pulumi.ResourceOptions] = None,
410
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
411
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
411
412
  authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
412
- backend: Optional[pulumi.Input[str]] = None,
413
- default_path_policy: Optional[pulumi.Input[str]] = None,
414
- disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
415
- enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
416
- enabled: Optional[pulumi.Input[bool]] = None,
417
- namespace: Optional[pulumi.Input[str]] = None,
413
+ backend: Optional[pulumi.Input[builtins.str]] = None,
414
+ default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
415
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
416
+ enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
417
+ enabled: Optional[pulumi.Input[builtins.bool]] = None,
418
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
418
419
  __props__=None):
419
420
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
420
421
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -445,15 +446,15 @@ class BackendConfigCmpv2(pulumi.CustomResource):
445
446
  def get(resource_name: str,
446
447
  id: pulumi.Input[str],
447
448
  opts: Optional[pulumi.ResourceOptions] = None,
448
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
449
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
449
450
  authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
450
- backend: Optional[pulumi.Input[str]] = None,
451
- default_path_policy: Optional[pulumi.Input[str]] = None,
452
- disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
453
- enable_sentinel_parsing: Optional[pulumi.Input[bool]] = None,
454
- enabled: Optional[pulumi.Input[bool]] = None,
455
- last_updated: Optional[pulumi.Input[str]] = None,
456
- namespace: Optional[pulumi.Input[str]] = None) -> 'BackendConfigCmpv2':
451
+ backend: Optional[pulumi.Input[builtins.str]] = None,
452
+ default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
453
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
454
+ enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
455
+ enabled: Optional[pulumi.Input[builtins.bool]] = None,
456
+ last_updated: Optional[pulumi.Input[builtins.str]] = None,
457
+ namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'BackendConfigCmpv2':
457
458
  """
458
459
  Get an existing BackendConfigCmpv2 resource's state with the given name, id, and optional extra
459
460
  properties used to qualify the lookup.
@@ -461,18 +462,18 @@ class BackendConfigCmpv2(pulumi.CustomResource):
461
462
  :param str resource_name: The unique name of the resulting resource.
462
463
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
463
464
  :param pulumi.ResourceOptions opts: Options for the resource.
464
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
465
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
465
466
  :param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
466
- :param pulumi.Input[str] backend: The path to the PKI secret backend to
467
+ :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
467
468
  read the CMPv2 configuration from, with no leading or trailing `/`s.
468
- :param pulumi.Input[str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
469
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
469
+ :param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
470
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
470
471
 
471
472
  <a id="nestedatt--authenticators"></a>
472
- :param pulumi.Input[bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
473
- :param pulumi.Input[bool] enabled: Specifies whether CMPv2 is enabled.
474
- :param pulumi.Input[str] last_updated: A read-only timestamp representing the last time the configuration was updated.
475
- :param pulumi.Input[str] namespace: The namespace of the target resource.
473
+ :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
474
+ :param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
475
+ :param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
476
+ :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
476
477
  The value should not contain leading or trailing forward slashes.
477
478
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
478
479
  *Available only for Vault Enterprise*.
@@ -494,7 +495,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
494
495
 
495
496
  @property
496
497
  @pulumi.getter(name="auditFields")
497
- def audit_fields(self) -> pulumi.Output[Sequence[str]]:
498
+ def audit_fields(self) -> pulumi.Output[Sequence[builtins.str]]:
498
499
  """
499
500
  Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
500
501
  """
@@ -510,7 +511,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
510
511
 
511
512
  @property
512
513
  @pulumi.getter
513
- def backend(self) -> pulumi.Output[str]:
514
+ def backend(self) -> pulumi.Output[builtins.str]:
514
515
  """
515
516
  The path to the PKI secret backend to
516
517
  read the CMPv2 configuration from, with no leading or trailing `/`s.
@@ -519,7 +520,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
519
520
 
520
521
  @property
521
522
  @pulumi.getter(name="defaultPathPolicy")
522
- def default_path_policy(self) -> pulumi.Output[Optional[str]]:
523
+ def default_path_policy(self) -> pulumi.Output[Optional[builtins.str]]:
523
524
  """
524
525
  Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
525
526
  """
@@ -527,7 +528,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
527
528
 
528
529
  @property
529
530
  @pulumi.getter(name="disabledValidations")
530
- def disabled_validations(self) -> pulumi.Output[Optional[Sequence[str]]]:
531
+ def disabled_validations(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
531
532
  """
532
533
  A comma-separated list of validations not to perform on CMPv2 messages.
533
534
 
@@ -537,7 +538,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
537
538
 
538
539
  @property
539
540
  @pulumi.getter(name="enableSentinelParsing")
540
- def enable_sentinel_parsing(self) -> pulumi.Output[Optional[bool]]:
541
+ def enable_sentinel_parsing(self) -> pulumi.Output[Optional[builtins.bool]]:
541
542
  """
542
543
  If set, parse out fields from the provided CSR making them available for Sentinel policies.
543
544
  """
@@ -545,7 +546,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
545
546
 
546
547
  @property
547
548
  @pulumi.getter
548
- def enabled(self) -> pulumi.Output[Optional[bool]]:
549
+ def enabled(self) -> pulumi.Output[Optional[builtins.bool]]:
549
550
  """
550
551
  Specifies whether CMPv2 is enabled.
551
552
  """
@@ -553,7 +554,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
553
554
 
554
555
  @property
555
556
  @pulumi.getter(name="lastUpdated")
556
- def last_updated(self) -> pulumi.Output[str]:
557
+ def last_updated(self) -> pulumi.Output[builtins.str]:
557
558
  """
558
559
  A read-only timestamp representing the last time the configuration was updated.
559
560
  """
@@ -561,7 +562,7 @@ class BackendConfigCmpv2(pulumi.CustomResource):
561
562
 
562
563
  @property
563
564
  @pulumi.getter
564
- def namespace(self) -> pulumi.Output[Optional[str]]:
565
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
565
566
  """
566
567
  The namespace of the target resource.
567
568
  The value should not contain leading or trailing forward slashes.