pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,29 +21,29 @@ __all__ = ['BackendConfigEstArgs', 'BackendConfigEst']
22
21
  @pulumi.input_type
23
22
  class BackendConfigEstArgs:
24
23
  def __init__(__self__, *,
25
- backend: pulumi.Input[builtins.str],
26
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
24
+ backend: pulumi.Input[_builtins.str],
25
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
26
  authenticators: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']] = None,
28
- default_mount: Optional[pulumi.Input[builtins.bool]] = None,
29
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
30
- enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
31
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
32
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
33
- namespace: Optional[pulumi.Input[builtins.str]] = None):
27
+ default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
29
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
32
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
34
33
  """
35
34
  The set of arguments for constructing a BackendConfigEst resource.
36
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
35
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
37
36
  read the EST configuration from, with no leading or trailing `/`s.
38
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
37
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
39
38
 
40
39
  <a id="nestedatt--authenticators"></a>
41
40
  :param pulumi.Input['BackendConfigEstAuthenticatorsArgs'] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
42
- :param pulumi.Input[builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
43
- :param pulumi.Input[builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
44
- :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
45
- :param pulumi.Input[builtins.bool] enabled: Specifies whether EST is enabled.
46
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
47
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
41
+ :param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
42
+ :param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
43
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
44
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
45
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
46
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
48
47
  The value should not contain leading or trailing forward slashes.
49
48
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
49
  *Available only for Vault Enterprise*.
@@ -67,9 +66,9 @@ class BackendConfigEstArgs:
67
66
  if namespace is not None:
68
67
  pulumi.set(__self__, "namespace", namespace)
69
68
 
70
- @property
69
+ @_builtins.property
71
70
  @pulumi.getter
72
- def backend(self) -> pulumi.Input[builtins.str]:
71
+ def backend(self) -> pulumi.Input[_builtins.str]:
73
72
  """
74
73
  The path to the PKI secret backend to
75
74
  read the EST configuration from, with no leading or trailing `/`s.
@@ -77,12 +76,12 @@ class BackendConfigEstArgs:
77
76
  return pulumi.get(self, "backend")
78
77
 
79
78
  @backend.setter
80
- def backend(self, value: pulumi.Input[builtins.str]):
79
+ def backend(self, value: pulumi.Input[_builtins.str]):
81
80
  pulumi.set(self, "backend", value)
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter(name="auditFields")
85
- def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
84
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
86
85
  """
87
86
  Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
88
87
 
@@ -91,10 +90,10 @@ class BackendConfigEstArgs:
91
90
  return pulumi.get(self, "audit_fields")
92
91
 
93
92
  @audit_fields.setter
94
- def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
93
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
95
94
  pulumi.set(self, "audit_fields", value)
96
95
 
97
- @property
96
+ @_builtins.property
98
97
  @pulumi.getter
99
98
  def authenticators(self) -> Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]:
100
99
  """
@@ -106,69 +105,69 @@ class BackendConfigEstArgs:
106
105
  def authenticators(self, value: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]):
107
106
  pulumi.set(self, "authenticators", value)
108
107
 
109
- @property
108
+ @_builtins.property
110
109
  @pulumi.getter(name="defaultMount")
111
- def default_mount(self) -> Optional[pulumi.Input[builtins.bool]]:
110
+ def default_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
112
111
  """
113
112
  If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
114
113
  """
115
114
  return pulumi.get(self, "default_mount")
116
115
 
117
116
  @default_mount.setter
118
- def default_mount(self, value: Optional[pulumi.Input[builtins.bool]]):
117
+ def default_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
119
118
  pulumi.set(self, "default_mount", value)
120
119
 
121
- @property
120
+ @_builtins.property
122
121
  @pulumi.getter(name="defaultPathPolicy")
123
- def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
122
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
124
123
  """
125
124
  Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
126
125
  """
127
126
  return pulumi.get(self, "default_path_policy")
128
127
 
129
128
  @default_path_policy.setter
130
- def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
129
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
131
130
  pulumi.set(self, "default_path_policy", value)
132
131
 
133
- @property
132
+ @_builtins.property
134
133
  @pulumi.getter(name="enableSentinelParsing")
135
- def enable_sentinel_parsing(self) -> Optional[pulumi.Input[builtins.bool]]:
134
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
136
135
  """
137
136
  If set, parse out fields from the provided CSR making them available for Sentinel policies.
138
137
  """
139
138
  return pulumi.get(self, "enable_sentinel_parsing")
140
139
 
141
140
  @enable_sentinel_parsing.setter
142
- def enable_sentinel_parsing(self, value: Optional[pulumi.Input[builtins.bool]]):
141
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
143
142
  pulumi.set(self, "enable_sentinel_parsing", value)
144
143
 
145
- @property
144
+ @_builtins.property
146
145
  @pulumi.getter
147
- def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
146
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
148
147
  """
149
148
  Specifies whether EST is enabled.
150
149
  """
151
150
  return pulumi.get(self, "enabled")
152
151
 
153
152
  @enabled.setter
154
- def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
153
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
155
154
  pulumi.set(self, "enabled", value)
156
155
 
157
- @property
156
+ @_builtins.property
158
157
  @pulumi.getter(name="labelToPathPolicy")
159
- def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
158
+ def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
160
159
  """
161
160
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
162
161
  """
163
162
  return pulumi.get(self, "label_to_path_policy")
164
163
 
165
164
  @label_to_path_policy.setter
166
- def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
165
+ def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
167
166
  pulumi.set(self, "label_to_path_policy", value)
168
167
 
169
- @property
168
+ @_builtins.property
170
169
  @pulumi.getter
171
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
170
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
172
171
  """
173
172
  The namespace of the target resource.
174
173
  The value should not contain leading or trailing forward slashes.
@@ -178,38 +177,38 @@ class BackendConfigEstArgs:
178
177
  return pulumi.get(self, "namespace")
179
178
 
180
179
  @namespace.setter
181
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
180
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
182
181
  pulumi.set(self, "namespace", value)
183
182
 
184
183
 
185
184
  @pulumi.input_type
186
185
  class _BackendConfigEstState:
187
186
  def __init__(__self__, *,
188
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
187
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
189
188
  authenticators: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']] = None,
190
- backend: Optional[pulumi.Input[builtins.str]] = None,
191
- default_mount: Optional[pulumi.Input[builtins.bool]] = None,
192
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
193
- enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
194
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
195
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
196
- last_updated: Optional[pulumi.Input[builtins.str]] = None,
197
- namespace: Optional[pulumi.Input[builtins.str]] = None):
189
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
190
+ default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
191
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
192
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
193
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
194
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
195
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
196
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
198
197
  """
199
198
  Input properties used for looking up and filtering BackendConfigEst resources.
200
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
199
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
201
200
 
202
201
  <a id="nestedatt--authenticators"></a>
203
202
  :param pulumi.Input['BackendConfigEstAuthenticatorsArgs'] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
204
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
203
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
205
204
  read the EST configuration from, with no leading or trailing `/`s.
206
- :param pulumi.Input[builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
207
- :param pulumi.Input[builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
208
- :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
209
- :param pulumi.Input[builtins.bool] enabled: Specifies whether EST is enabled.
210
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
211
- :param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
212
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
205
+ :param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
206
+ :param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
207
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
208
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
209
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
210
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
211
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
213
212
  The value should not contain leading or trailing forward slashes.
214
213
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
215
214
  *Available only for Vault Enterprise*.
@@ -235,9 +234,9 @@ class _BackendConfigEstState:
235
234
  if namespace is not None:
236
235
  pulumi.set(__self__, "namespace", namespace)
237
236
 
238
- @property
237
+ @_builtins.property
239
238
  @pulumi.getter(name="auditFields")
240
- def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
239
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
241
240
  """
242
241
  Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
243
242
 
@@ -246,10 +245,10 @@ class _BackendConfigEstState:
246
245
  return pulumi.get(self, "audit_fields")
247
246
 
248
247
  @audit_fields.setter
249
- def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
248
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
250
249
  pulumi.set(self, "audit_fields", value)
251
250
 
252
- @property
251
+ @_builtins.property
253
252
  @pulumi.getter
254
253
  def authenticators(self) -> Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]:
255
254
  """
@@ -261,9 +260,9 @@ class _BackendConfigEstState:
261
260
  def authenticators(self, value: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]):
262
261
  pulumi.set(self, "authenticators", value)
263
262
 
264
- @property
263
+ @_builtins.property
265
264
  @pulumi.getter
266
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
265
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
267
266
  """
268
267
  The path to the PKI secret backend to
269
268
  read the EST configuration from, with no leading or trailing `/`s.
@@ -271,84 +270,84 @@ class _BackendConfigEstState:
271
270
  return pulumi.get(self, "backend")
272
271
 
273
272
  @backend.setter
274
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
273
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
275
274
  pulumi.set(self, "backend", value)
276
275
 
277
- @property
276
+ @_builtins.property
278
277
  @pulumi.getter(name="defaultMount")
279
- def default_mount(self) -> Optional[pulumi.Input[builtins.bool]]:
278
+ def default_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
280
279
  """
281
280
  If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
282
281
  """
283
282
  return pulumi.get(self, "default_mount")
284
283
 
285
284
  @default_mount.setter
286
- def default_mount(self, value: Optional[pulumi.Input[builtins.bool]]):
285
+ def default_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
287
286
  pulumi.set(self, "default_mount", value)
288
287
 
289
- @property
288
+ @_builtins.property
290
289
  @pulumi.getter(name="defaultPathPolicy")
291
- def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
290
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
292
291
  """
293
292
  Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
294
293
  """
295
294
  return pulumi.get(self, "default_path_policy")
296
295
 
297
296
  @default_path_policy.setter
298
- def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
297
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
299
298
  pulumi.set(self, "default_path_policy", value)
300
299
 
301
- @property
300
+ @_builtins.property
302
301
  @pulumi.getter(name="enableSentinelParsing")
303
- def enable_sentinel_parsing(self) -> Optional[pulumi.Input[builtins.bool]]:
302
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
304
303
  """
305
304
  If set, parse out fields from the provided CSR making them available for Sentinel policies.
306
305
  """
307
306
  return pulumi.get(self, "enable_sentinel_parsing")
308
307
 
309
308
  @enable_sentinel_parsing.setter
310
- def enable_sentinel_parsing(self, value: Optional[pulumi.Input[builtins.bool]]):
309
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
311
310
  pulumi.set(self, "enable_sentinel_parsing", value)
312
311
 
313
- @property
312
+ @_builtins.property
314
313
  @pulumi.getter
315
- def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
314
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
316
315
  """
317
316
  Specifies whether EST is enabled.
318
317
  """
319
318
  return pulumi.get(self, "enabled")
320
319
 
321
320
  @enabled.setter
322
- def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
321
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
323
322
  pulumi.set(self, "enabled", value)
324
323
 
325
- @property
324
+ @_builtins.property
326
325
  @pulumi.getter(name="labelToPathPolicy")
327
- def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
326
+ def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
328
327
  """
329
328
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
330
329
  """
331
330
  return pulumi.get(self, "label_to_path_policy")
332
331
 
333
332
  @label_to_path_policy.setter
334
- def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
333
+ def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
335
334
  pulumi.set(self, "label_to_path_policy", value)
336
335
 
337
- @property
336
+ @_builtins.property
338
337
  @pulumi.getter(name="lastUpdated")
339
- def last_updated(self) -> Optional[pulumi.Input[builtins.str]]:
338
+ def last_updated(self) -> Optional[pulumi.Input[_builtins.str]]:
340
339
  """
341
340
  A read-only timestamp representing the last time the configuration was updated.
342
341
  """
343
342
  return pulumi.get(self, "last_updated")
344
343
 
345
344
  @last_updated.setter
346
- def last_updated(self, value: Optional[pulumi.Input[builtins.str]]):
345
+ def last_updated(self, value: Optional[pulumi.Input[_builtins.str]]):
347
346
  pulumi.set(self, "last_updated", value)
348
347
 
349
- @property
348
+ @_builtins.property
350
349
  @pulumi.getter
351
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
350
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
352
351
  """
353
352
  The namespace of the target resource.
354
353
  The value should not contain leading or trailing forward slashes.
@@ -358,7 +357,7 @@ class _BackendConfigEstState:
358
357
  return pulumi.get(self, "namespace")
359
358
 
360
359
  @namespace.setter
361
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
360
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
362
361
  pulumi.set(self, "namespace", value)
363
362
 
364
363
 
@@ -368,15 +367,15 @@ class BackendConfigEst(pulumi.CustomResource):
368
367
  def __init__(__self__,
369
368
  resource_name: str,
370
369
  opts: Optional[pulumi.ResourceOptions] = None,
371
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
370
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
372
371
  authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
373
- backend: Optional[pulumi.Input[builtins.str]] = None,
374
- default_mount: Optional[pulumi.Input[builtins.bool]] = None,
375
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
376
- enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
377
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
378
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
379
- namespace: Optional[pulumi.Input[builtins.str]] = None,
372
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
373
+ default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
374
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
375
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
376
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
377
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
378
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
380
379
  __props__=None):
381
380
  """
382
381
  Allows setting the EST configuration on a PKI Secret Backend
@@ -393,18 +392,18 @@ class BackendConfigEst(pulumi.CustomResource):
393
392
 
394
393
  :param str resource_name: The name of the resource.
395
394
  :param pulumi.ResourceOptions opts: Options for the resource.
396
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
395
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
397
396
 
398
397
  <a id="nestedatt--authenticators"></a>
399
398
  :param pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
400
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
399
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
401
400
  read the EST configuration from, with no leading or trailing `/`s.
402
- :param pulumi.Input[builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
403
- :param pulumi.Input[builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
404
- :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
405
- :param pulumi.Input[builtins.bool] enabled: Specifies whether EST is enabled.
406
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
407
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
401
+ :param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
402
+ :param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
403
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
404
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
405
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
406
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
408
407
  The value should not contain leading or trailing forward slashes.
409
408
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
410
409
  *Available only for Vault Enterprise*.
@@ -443,15 +442,15 @@ class BackendConfigEst(pulumi.CustomResource):
443
442
  def _internal_init(__self__,
444
443
  resource_name: str,
445
444
  opts: Optional[pulumi.ResourceOptions] = None,
446
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
445
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
447
446
  authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
448
- backend: Optional[pulumi.Input[builtins.str]] = None,
449
- default_mount: Optional[pulumi.Input[builtins.bool]] = None,
450
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
451
- enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
452
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
453
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
454
- namespace: Optional[pulumi.Input[builtins.str]] = None,
447
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
448
+ default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
449
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
450
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
451
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
452
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
453
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
455
454
  __props__=None):
456
455
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
457
456
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -483,16 +482,16 @@ class BackendConfigEst(pulumi.CustomResource):
483
482
  def get(resource_name: str,
484
483
  id: pulumi.Input[str],
485
484
  opts: Optional[pulumi.ResourceOptions] = None,
486
- audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
485
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
487
486
  authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
488
- backend: Optional[pulumi.Input[builtins.str]] = None,
489
- default_mount: Optional[pulumi.Input[builtins.bool]] = None,
490
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
491
- enable_sentinel_parsing: Optional[pulumi.Input[builtins.bool]] = None,
492
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
493
- label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
494
- last_updated: Optional[pulumi.Input[builtins.str]] = None,
495
- namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'BackendConfigEst':
487
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
488
+ default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
489
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
490
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
491
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
492
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
493
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
494
+ namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'BackendConfigEst':
496
495
  """
497
496
  Get an existing BackendConfigEst resource's state with the given name, id, and optional extra
498
497
  properties used to qualify the lookup.
@@ -500,19 +499,19 @@ class BackendConfigEst(pulumi.CustomResource):
500
499
  :param str resource_name: The unique name of the resulting resource.
501
500
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
502
501
  :param pulumi.ResourceOptions opts: Options for the resource.
503
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
502
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
504
503
 
505
504
  <a id="nestedatt--authenticators"></a>
506
505
  :param pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
507
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
506
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
508
507
  read the EST configuration from, with no leading or trailing `/`s.
509
- :param pulumi.Input[builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
510
- :param pulumi.Input[builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
511
- :param pulumi.Input[builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
512
- :param pulumi.Input[builtins.bool] enabled: Specifies whether EST is enabled.
513
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
514
- :param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
515
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
508
+ :param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
509
+ :param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
510
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
511
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
512
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
513
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
514
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
516
515
  The value should not contain leading or trailing forward slashes.
517
516
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
518
517
  *Available only for Vault Enterprise*.
@@ -533,9 +532,9 @@ class BackendConfigEst(pulumi.CustomResource):
533
532
  __props__.__dict__["namespace"] = namespace
534
533
  return BackendConfigEst(resource_name, opts=opts, __props__=__props__)
535
534
 
536
- @property
535
+ @_builtins.property
537
536
  @pulumi.getter(name="auditFields")
538
- def audit_fields(self) -> pulumi.Output[Sequence[builtins.str]]:
537
+ def audit_fields(self) -> pulumi.Output[Sequence[_builtins.str]]:
539
538
  """
540
539
  Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
541
540
 
@@ -543,7 +542,7 @@ class BackendConfigEst(pulumi.CustomResource):
543
542
  """
544
543
  return pulumi.get(self, "audit_fields")
545
544
 
546
- @property
545
+ @_builtins.property
547
546
  @pulumi.getter
548
547
  def authenticators(self) -> pulumi.Output['outputs.BackendConfigEstAuthenticators']:
549
548
  """
@@ -551,66 +550,66 @@ class BackendConfigEst(pulumi.CustomResource):
551
550
  """
552
551
  return pulumi.get(self, "authenticators")
553
552
 
554
- @property
553
+ @_builtins.property
555
554
  @pulumi.getter
556
- def backend(self) -> pulumi.Output[builtins.str]:
555
+ def backend(self) -> pulumi.Output[_builtins.str]:
557
556
  """
558
557
  The path to the PKI secret backend to
559
558
  read the EST configuration from, with no leading or trailing `/`s.
560
559
  """
561
560
  return pulumi.get(self, "backend")
562
561
 
563
- @property
562
+ @_builtins.property
564
563
  @pulumi.getter(name="defaultMount")
565
- def default_mount(self) -> pulumi.Output[Optional[builtins.bool]]:
564
+ def default_mount(self) -> pulumi.Output[Optional[_builtins.bool]]:
566
565
  """
567
566
  If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
568
567
  """
569
568
  return pulumi.get(self, "default_mount")
570
569
 
571
- @property
570
+ @_builtins.property
572
571
  @pulumi.getter(name="defaultPathPolicy")
573
- def default_path_policy(self) -> pulumi.Output[Optional[builtins.str]]:
572
+ def default_path_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
574
573
  """
575
574
  Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
576
575
  """
577
576
  return pulumi.get(self, "default_path_policy")
578
577
 
579
- @property
578
+ @_builtins.property
580
579
  @pulumi.getter(name="enableSentinelParsing")
581
- def enable_sentinel_parsing(self) -> pulumi.Output[Optional[builtins.bool]]:
580
+ def enable_sentinel_parsing(self) -> pulumi.Output[Optional[_builtins.bool]]:
582
581
  """
583
582
  If set, parse out fields from the provided CSR making them available for Sentinel policies.
584
583
  """
585
584
  return pulumi.get(self, "enable_sentinel_parsing")
586
585
 
587
- @property
586
+ @_builtins.property
588
587
  @pulumi.getter
589
- def enabled(self) -> pulumi.Output[Optional[builtins.bool]]:
588
+ def enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
590
589
  """
591
590
  Specifies whether EST is enabled.
592
591
  """
593
592
  return pulumi.get(self, "enabled")
594
593
 
595
- @property
594
+ @_builtins.property
596
595
  @pulumi.getter(name="labelToPathPolicy")
597
- def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
596
+ def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
598
597
  """
599
598
  Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
600
599
  """
601
600
  return pulumi.get(self, "label_to_path_policy")
602
601
 
603
- @property
602
+ @_builtins.property
604
603
  @pulumi.getter(name="lastUpdated")
605
- def last_updated(self) -> pulumi.Output[builtins.str]:
604
+ def last_updated(self) -> pulumi.Output[_builtins.str]:
606
605
  """
607
606
  A read-only timestamp representing the last time the configuration was updated.
608
607
  """
609
608
  return pulumi.get(self, "last_updated")
610
609
 
611
- @property
610
+ @_builtins.property
612
611
  @pulumi.getter
613
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
612
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
614
613
  """
615
614
  The namespace of the target resource.
616
615
  The value should not contain leading or trailing forward slashes.