pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,27 +21,27 @@ __all__ = ['BackendConfigCmpv2Args', 'BackendConfigCmpv2']
22
21
  @pulumi.input_type
23
22
  class BackendConfigCmpv2Args:
24
23
  def __init__(__self__, *,
25
- backend: pulumi.Input[builtins.str],
26
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
24
+ backend: pulumi.Input[_builtins.str],
25
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
26
  authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
28
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
29
- disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
30
- enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
31
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
32
- namespace: Optional[pulumi.Input[builtins.str]] = None):
27
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
28
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
33
32
  """
34
33
  The set of arguments for constructing a BackendConfigCmpv2 resource.
35
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
34
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
36
35
  read the CMPv2 configuration from, with no leading or trailing `/`s.
37
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
36
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
38
37
  :param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
39
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
40
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
38
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
39
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
41
40
 
42
41
  <a id="nestedatt--authenticators"></a>
43
- :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
44
- :param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
45
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
42
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
43
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
44
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
46
45
  The value should not contain leading or trailing forward slashes.
47
46
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
48
47
  *Available only for Vault Enterprise*.
@@ -63,9 +62,9 @@ class BackendConfigCmpv2Args:
63
62
  if namespace is not None:
64
63
  pulumi.set(__self__, "namespace", namespace)
65
64
 
66
- @property
65
+ @_builtins.property
67
66
  @pulumi.getter
68
- def backend(self) -> pulumi.Input[builtins.str]:
67
+ def backend(self) -> pulumi.Input[_builtins.str]:
69
68
  """
70
69
  The path to the PKI secret backend to
71
70
  read the CMPv2 configuration from, with no leading or trailing `/`s.
@@ -73,22 +72,22 @@ class BackendConfigCmpv2Args:
73
72
  return pulumi.get(self, "backend")
74
73
 
75
74
  @backend.setter
76
- def backend(self, value: pulumi.Input[builtins.str]):
75
+ def backend(self, value: pulumi.Input[_builtins.str]):
77
76
  pulumi.set(self, "backend", value)
78
77
 
79
- @property
78
+ @_builtins.property
80
79
  @pulumi.getter(name="auditFields")
81
- def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
80
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
82
81
  """
83
82
  Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
84
83
  """
85
84
  return pulumi.get(self, "audit_fields")
86
85
 
87
86
  @audit_fields.setter
88
- def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
87
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
89
88
  pulumi.set(self, "audit_fields", value)
90
89
 
91
- @property
90
+ @_builtins.property
92
91
  @pulumi.getter
93
92
  def authenticators(self) -> Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]:
94
93
  """
@@ -100,21 +99,21 @@ class BackendConfigCmpv2Args:
100
99
  def authenticators(self, value: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]):
101
100
  pulumi.set(self, "authenticators", value)
102
101
 
103
- @property
102
+ @_builtins.property
104
103
  @pulumi.getter(name="defaultPathPolicy")
105
- def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
104
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
106
105
  """
107
106
  Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
108
107
  """
109
108
  return pulumi.get(self, "default_path_policy")
110
109
 
111
110
  @default_path_policy.setter
112
- def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
111
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
113
112
  pulumi.set(self, "default_path_policy", value)
114
113
 
115
- @property
114
+ @_builtins.property
116
115
  @pulumi.getter(name="disabledValidations")
117
- def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
116
+ def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
118
117
  """
119
118
  A comma-separated list of validations not to perform on CMPv2 messages.
120
119
 
@@ -123,36 +122,36 @@ class BackendConfigCmpv2Args:
123
122
  return pulumi.get(self, "disabled_validations")
124
123
 
125
124
  @disabled_validations.setter
126
- def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
125
+ def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
127
126
  pulumi.set(self, "disabled_validations", value)
128
127
 
129
- @property
128
+ @_builtins.property
130
129
  @pulumi.getter(name="enableSentinelParsing")
131
- def enable_sentinel_parsing(self) -> Optional[pulumi.Input[builtins.bool]]:
130
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
132
131
  """
133
132
  If set, parse out fields from the provided CSR making them available for Sentinel policies.
134
133
  """
135
134
  return pulumi.get(self, "enable_sentinel_parsing")
136
135
 
137
136
  @enable_sentinel_parsing.setter
138
- def enable_sentinel_parsing(self, value: Optional[pulumi.Input[builtins.bool]]):
137
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
139
138
  pulumi.set(self, "enable_sentinel_parsing", value)
140
139
 
141
- @property
140
+ @_builtins.property
142
141
  @pulumi.getter
143
- def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
142
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
144
143
  """
145
144
  Specifies whether CMPv2 is enabled.
146
145
  """
147
146
  return pulumi.get(self, "enabled")
148
147
 
149
148
  @enabled.setter
150
- def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
149
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
151
150
  pulumi.set(self, "enabled", value)
152
151
 
153
- @property
152
+ @_builtins.property
154
153
  @pulumi.getter
155
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
154
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
156
155
  """
157
156
  The namespace of the target resource.
158
157
  The value should not contain leading or trailing forward slashes.
@@ -162,36 +161,36 @@ class BackendConfigCmpv2Args:
162
161
  return pulumi.get(self, "namespace")
163
162
 
164
163
  @namespace.setter
165
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
164
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
166
165
  pulumi.set(self, "namespace", value)
167
166
 
168
167
 
169
168
  @pulumi.input_type
170
169
  class _BackendConfigCmpv2State:
171
170
  def __init__(__self__, *,
172
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
171
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
173
172
  authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
174
- backend: Optional[pulumi.Input[builtins.str]] = None,
175
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
176
- disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
177
- enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
178
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
179
- last_updated: Optional[pulumi.Input[builtins.str]] = None,
180
- namespace: Optional[pulumi.Input[builtins.str]] = None):
173
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
174
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
175
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
176
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
177
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
178
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
179
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
181
180
  """
182
181
  Input properties used for looking up and filtering BackendConfigCmpv2 resources.
183
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
182
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
184
183
  :param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
185
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
184
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
186
185
  read the CMPv2 configuration from, with no leading or trailing `/`s.
187
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
188
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
186
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
187
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
189
188
 
190
189
  <a id="nestedatt--authenticators"></a>
191
- :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
192
- :param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
193
- :param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
194
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
190
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
191
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
192
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
193
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
195
194
  The value should not contain leading or trailing forward slashes.
196
195
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
197
196
  *Available only for Vault Enterprise*.
@@ -215,19 +214,19 @@ class _BackendConfigCmpv2State:
215
214
  if namespace is not None:
216
215
  pulumi.set(__self__, "namespace", namespace)
217
216
 
218
- @property
217
+ @_builtins.property
219
218
  @pulumi.getter(name="auditFields")
220
- def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
219
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
221
220
  """
222
221
  Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
223
222
  """
224
223
  return pulumi.get(self, "audit_fields")
225
224
 
226
225
  @audit_fields.setter
227
- def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
226
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
228
227
  pulumi.set(self, "audit_fields", value)
229
228
 
230
- @property
229
+ @_builtins.property
231
230
  @pulumi.getter
232
231
  def authenticators(self) -> Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]:
233
232
  """
@@ -239,9 +238,9 @@ class _BackendConfigCmpv2State:
239
238
  def authenticators(self, value: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]):
240
239
  pulumi.set(self, "authenticators", value)
241
240
 
242
- @property
241
+ @_builtins.property
243
242
  @pulumi.getter
244
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
243
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
245
244
  """
246
245
  The path to the PKI secret backend to
247
246
  read the CMPv2 configuration from, with no leading or trailing `/`s.
@@ -249,24 +248,24 @@ class _BackendConfigCmpv2State:
249
248
  return pulumi.get(self, "backend")
250
249
 
251
250
  @backend.setter
252
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
251
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
253
252
  pulumi.set(self, "backend", value)
254
253
 
255
- @property
254
+ @_builtins.property
256
255
  @pulumi.getter(name="defaultPathPolicy")
257
- def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
256
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
258
257
  """
259
258
  Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
260
259
  """
261
260
  return pulumi.get(self, "default_path_policy")
262
261
 
263
262
  @default_path_policy.setter
264
- def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
263
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
265
264
  pulumi.set(self, "default_path_policy", value)
266
265
 
267
- @property
266
+ @_builtins.property
268
267
  @pulumi.getter(name="disabledValidations")
269
- def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
268
+ def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
270
269
  """
271
270
  A comma-separated list of validations not to perform on CMPv2 messages.
272
271
 
@@ -275,48 +274,48 @@ class _BackendConfigCmpv2State:
275
274
  return pulumi.get(self, "disabled_validations")
276
275
 
277
276
  @disabled_validations.setter
278
- def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
277
+ def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
279
278
  pulumi.set(self, "disabled_validations", value)
280
279
 
281
- @property
280
+ @_builtins.property
282
281
  @pulumi.getter(name="enableSentinelParsing")
283
- def enable_sentinel_parsing(self) -> Optional[pulumi.Input[builtins.bool]]:
282
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
284
283
  """
285
284
  If set, parse out fields from the provided CSR making them available for Sentinel policies.
286
285
  """
287
286
  return pulumi.get(self, "enable_sentinel_parsing")
288
287
 
289
288
  @enable_sentinel_parsing.setter
290
- def enable_sentinel_parsing(self, value: Optional[pulumi.Input[builtins.bool]]):
289
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
291
290
  pulumi.set(self, "enable_sentinel_parsing", value)
292
291
 
293
- @property
292
+ @_builtins.property
294
293
  @pulumi.getter
295
- def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
294
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
296
295
  """
297
296
  Specifies whether CMPv2 is enabled.
298
297
  """
299
298
  return pulumi.get(self, "enabled")
300
299
 
301
300
  @enabled.setter
302
- def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
301
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
303
302
  pulumi.set(self, "enabled", value)
304
303
 
305
- @property
304
+ @_builtins.property
306
305
  @pulumi.getter(name="lastUpdated")
307
- def last_updated(self) -> Optional[pulumi.Input[builtins.str]]:
306
+ def last_updated(self) -> Optional[pulumi.Input[_builtins.str]]:
308
307
  """
309
308
  A read-only timestamp representing the last time the configuration was updated.
310
309
  """
311
310
  return pulumi.get(self, "last_updated")
312
311
 
313
312
  @last_updated.setter
314
- def last_updated(self, value: Optional[pulumi.Input[builtins.str]]):
313
+ def last_updated(self, value: Optional[pulumi.Input[_builtins.str]]):
315
314
  pulumi.set(self, "last_updated", value)
316
315
 
317
- @property
316
+ @_builtins.property
318
317
  @pulumi.getter
319
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
318
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
320
319
  """
321
320
  The namespace of the target resource.
322
321
  The value should not contain leading or trailing forward slashes.
@@ -326,7 +325,7 @@ class _BackendConfigCmpv2State:
326
325
  return pulumi.get(self, "namespace")
327
326
 
328
327
  @namespace.setter
329
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
328
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
330
329
  pulumi.set(self, "namespace", value)
331
330
 
332
331
 
@@ -336,14 +335,14 @@ class BackendConfigCmpv2(pulumi.CustomResource):
336
335
  def __init__(__self__,
337
336
  resource_name: str,
338
337
  opts: Optional[pulumi.ResourceOptions] = None,
339
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
338
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
340
339
  authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
341
- backend: Optional[pulumi.Input[builtins.str]] = None,
342
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
343
- disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
344
- enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
345
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
346
- namespace: Optional[pulumi.Input[builtins.str]] = None,
340
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
341
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
342
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
343
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
344
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
345
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
347
346
  __props__=None):
348
347
  """
349
348
  Allows setting the CMPv2 configuration on a PKI Secret Backend
@@ -360,17 +359,17 @@ class BackendConfigCmpv2(pulumi.CustomResource):
360
359
 
361
360
  :param str resource_name: The name of the resource.
362
361
  :param pulumi.ResourceOptions opts: Options for the resource.
363
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
362
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
364
363
  :param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
365
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
364
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
366
365
  read the CMPv2 configuration from, with no leading or trailing `/`s.
367
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
368
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
366
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
367
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
369
368
 
370
369
  <a id="nestedatt--authenticators"></a>
371
- :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
372
- :param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
373
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
370
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
371
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
372
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
374
373
  The value should not contain leading or trailing forward slashes.
375
374
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
376
375
  *Available only for Vault Enterprise*.
@@ -409,14 +408,14 @@ class BackendConfigCmpv2(pulumi.CustomResource):
409
408
  def _internal_init(__self__,
410
409
  resource_name: str,
411
410
  opts: Optional[pulumi.ResourceOptions] = None,
412
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
411
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
413
412
  authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
414
- backend: Optional[pulumi.Input[builtins.str]] = None,
415
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
416
- disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
417
- enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
418
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
419
- namespace: Optional[pulumi.Input[builtins.str]] = None,
413
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
414
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
415
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
416
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
417
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
418
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
420
419
  __props__=None):
421
420
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
422
421
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -447,15 +446,15 @@ class BackendConfigCmpv2(pulumi.CustomResource):
447
446
  def get(resource_name: str,
448
447
  id: pulumi.Input[str],
449
448
  opts: Optional[pulumi.ResourceOptions] = None,
450
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
449
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
451
450
  authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
452
- backend: Optional[pulumi.Input[builtins.str]] = None,
453
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
454
- disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
455
- enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
456
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
457
- last_updated: Optional[pulumi.Input[builtins.str]] = None,
458
- namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'BackendConfigCmpv2':
451
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
452
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
453
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
454
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
455
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
456
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
457
+ namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'BackendConfigCmpv2':
459
458
  """
460
459
  Get an existing BackendConfigCmpv2 resource's state with the given name, id, and optional extra
461
460
  properties used to qualify the lookup.
@@ -463,18 +462,18 @@ class BackendConfigCmpv2(pulumi.CustomResource):
463
462
  :param str resource_name: The unique name of the resulting resource.
464
463
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
465
464
  :param pulumi.ResourceOptions opts: Options for the resource.
466
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
465
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
467
466
  :param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
468
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
467
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
469
468
  read the CMPv2 configuration from, with no leading or trailing `/`s.
470
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
471
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
469
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
470
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
472
471
 
473
472
  <a id="nestedatt--authenticators"></a>
474
- :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
475
- :param pulumi.Input[builtins.bool] enabled: Specifies whether CMPv2 is enabled.
476
- :param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
477
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
473
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
474
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
475
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
476
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
478
477
  The value should not contain leading or trailing forward slashes.
479
478
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
480
479
  *Available only for Vault Enterprise*.
@@ -494,15 +493,15 @@ class BackendConfigCmpv2(pulumi.CustomResource):
494
493
  __props__.__dict__["namespace"] = namespace
495
494
  return BackendConfigCmpv2(resource_name, opts=opts, __props__=__props__)
496
495
 
497
- @property
496
+ @_builtins.property
498
497
  @pulumi.getter(name="auditFields")
499
- def audit_fields(self) -> pulumi.Output[Sequence[builtins.str]]:
498
+ def audit_fields(self) -> pulumi.Output[Sequence[_builtins.str]]:
500
499
  """
501
500
  Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
502
501
  """
503
502
  return pulumi.get(self, "audit_fields")
504
503
 
505
- @property
504
+ @_builtins.property
506
505
  @pulumi.getter
507
506
  def authenticators(self) -> pulumi.Output['outputs.BackendConfigCmpv2Authenticators']:
508
507
  """
@@ -510,26 +509,26 @@ class BackendConfigCmpv2(pulumi.CustomResource):
510
509
  """
511
510
  return pulumi.get(self, "authenticators")
512
511
 
513
- @property
512
+ @_builtins.property
514
513
  @pulumi.getter
515
- def backend(self) -> pulumi.Output[builtins.str]:
514
+ def backend(self) -> pulumi.Output[_builtins.str]:
516
515
  """
517
516
  The path to the PKI secret backend to
518
517
  read the CMPv2 configuration from, with no leading or trailing `/`s.
519
518
  """
520
519
  return pulumi.get(self, "backend")
521
520
 
522
- @property
521
+ @_builtins.property
523
522
  @pulumi.getter(name="defaultPathPolicy")
524
- def default_path_policy(self) -> pulumi.Output[Optional[builtins.str]]:
523
+ def default_path_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
525
524
  """
526
525
  Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
527
526
  """
528
527
  return pulumi.get(self, "default_path_policy")
529
528
 
530
- @property
529
+ @_builtins.property
531
530
  @pulumi.getter(name="disabledValidations")
532
- def disabled_validations(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
531
+ def disabled_validations(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
533
532
  """
534
533
  A comma-separated list of validations not to perform on CMPv2 messages.
535
534
 
@@ -537,33 +536,33 @@ class BackendConfigCmpv2(pulumi.CustomResource):
537
536
  """
538
537
  return pulumi.get(self, "disabled_validations")
539
538
 
540
- @property
539
+ @_builtins.property
541
540
  @pulumi.getter(name="enableSentinelParsing")
542
- def enable_sentinel_parsing(self) -> pulumi.Output[Optional[builtins.bool]]:
541
+ def enable_sentinel_parsing(self) -> pulumi.Output[Optional[_builtins.bool]]:
543
542
  """
544
543
  If set, parse out fields from the provided CSR making them available for Sentinel policies.
545
544
  """
546
545
  return pulumi.get(self, "enable_sentinel_parsing")
547
546
 
548
- @property
547
+ @_builtins.property
549
548
  @pulumi.getter
550
- def enabled(self) -> pulumi.Output[Optional[builtins.bool]]:
549
+ def enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
551
550
  """
552
551
  Specifies whether CMPv2 is enabled.
553
552
  """
554
553
  return pulumi.get(self, "enabled")
555
554
 
556
- @property
555
+ @_builtins.property
557
556
  @pulumi.getter(name="lastUpdated")
558
- def last_updated(self) -> pulumi.Output[builtins.str]:
557
+ def last_updated(self) -> pulumi.Output[_builtins.str]:
559
558
  """
560
559
  A read-only timestamp representing the last time the configuration was updated.
561
560
  """
562
561
  return pulumi.get(self, "last_updated")
563
562
 
564
- @property
563
+ @_builtins.property
565
564
  @pulumi.getter
566
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
565
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
567
566
  """
568
567
  The namespace of the target resource.
569
568
  The value should not contain leading or trailing forward slashes.