pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,693 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['BackendConfigCmpv2Args', 'BackendConfigCmpv2']
20
+
21
+ @pulumi.input_type
22
+ class BackendConfigCmpv2Args:
23
+ def __init__(__self__, *,
24
+ backend: pulumi.Input[_builtins.str],
25
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
27
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
28
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
32
+ """
33
+ The set of arguments for constructing a BackendConfigCmpv2 resource.
34
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
35
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
36
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
37
+ :param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
38
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
39
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
40
+
41
+ <a id="nestedatt--authenticators"></a>
42
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
43
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
44
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
45
+ The value should not contain leading or trailing forward slashes.
46
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
47
+ *Available only for Vault Enterprise*.
48
+ """
49
+ pulumi.set(__self__, "backend", backend)
50
+ if audit_fields is not None:
51
+ pulumi.set(__self__, "audit_fields", audit_fields)
52
+ if authenticators is not None:
53
+ pulumi.set(__self__, "authenticators", authenticators)
54
+ if default_path_policy is not None:
55
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
56
+ if disabled_validations is not None:
57
+ pulumi.set(__self__, "disabled_validations", disabled_validations)
58
+ if enable_sentinel_parsing is not None:
59
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
60
+ if enabled is not None:
61
+ pulumi.set(__self__, "enabled", enabled)
62
+ if namespace is not None:
63
+ pulumi.set(__self__, "namespace", namespace)
64
+
65
+ @_builtins.property
66
+ @pulumi.getter
67
+ def backend(self) -> pulumi.Input[_builtins.str]:
68
+ """
69
+ The path to the PKI secret backend to
70
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
71
+ """
72
+ return pulumi.get(self, "backend")
73
+
74
+ @backend.setter
75
+ def backend(self, value: pulumi.Input[_builtins.str]):
76
+ pulumi.set(self, "backend", value)
77
+
78
+ @_builtins.property
79
+ @pulumi.getter(name="auditFields")
80
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
81
+ """
82
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
83
+ """
84
+ return pulumi.get(self, "audit_fields")
85
+
86
+ @audit_fields.setter
87
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
88
+ pulumi.set(self, "audit_fields", value)
89
+
90
+ @_builtins.property
91
+ @pulumi.getter
92
+ def authenticators(self) -> Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]:
93
+ """
94
+ Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
95
+ """
96
+ return pulumi.get(self, "authenticators")
97
+
98
+ @authenticators.setter
99
+ def authenticators(self, value: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]):
100
+ pulumi.set(self, "authenticators", value)
101
+
102
+ @_builtins.property
103
+ @pulumi.getter(name="defaultPathPolicy")
104
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
105
+ """
106
+ Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
107
+ """
108
+ return pulumi.get(self, "default_path_policy")
109
+
110
+ @default_path_policy.setter
111
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
112
+ pulumi.set(self, "default_path_policy", value)
113
+
114
+ @_builtins.property
115
+ @pulumi.getter(name="disabledValidations")
116
+ def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
117
+ """
118
+ A comma-separated list of validations not to perform on CMPv2 messages.
119
+
120
+ <a id="nestedatt--authenticators"></a>
121
+ """
122
+ return pulumi.get(self, "disabled_validations")
123
+
124
+ @disabled_validations.setter
125
+ def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
126
+ pulumi.set(self, "disabled_validations", value)
127
+
128
+ @_builtins.property
129
+ @pulumi.getter(name="enableSentinelParsing")
130
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
131
+ """
132
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
133
+ """
134
+ return pulumi.get(self, "enable_sentinel_parsing")
135
+
136
+ @enable_sentinel_parsing.setter
137
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
138
+ pulumi.set(self, "enable_sentinel_parsing", value)
139
+
140
+ @_builtins.property
141
+ @pulumi.getter
142
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
143
+ """
144
+ Specifies whether CMPv2 is enabled.
145
+ """
146
+ return pulumi.get(self, "enabled")
147
+
148
+ @enabled.setter
149
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
150
+ pulumi.set(self, "enabled", value)
151
+
152
+ @_builtins.property
153
+ @pulumi.getter
154
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
155
+ """
156
+ The namespace of the target resource.
157
+ The value should not contain leading or trailing forward slashes.
158
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
159
+ *Available only for Vault Enterprise*.
160
+ """
161
+ return pulumi.get(self, "namespace")
162
+
163
+ @namespace.setter
164
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
165
+ pulumi.set(self, "namespace", value)
166
+
167
+
168
+ @pulumi.input_type
169
+ class _BackendConfigCmpv2State:
170
+ def __init__(__self__, *,
171
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
172
+ authenticators: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']] = None,
173
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
174
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
175
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
176
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
177
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
178
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
179
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
180
+ """
181
+ Input properties used for looking up and filtering BackendConfigCmpv2 resources.
182
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
183
+ :param pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs'] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
184
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
185
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
186
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
187
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
188
+
189
+ <a id="nestedatt--authenticators"></a>
190
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
191
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
192
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
193
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
194
+ The value should not contain leading or trailing forward slashes.
195
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
196
+ *Available only for Vault Enterprise*.
197
+ """
198
+ if audit_fields is not None:
199
+ pulumi.set(__self__, "audit_fields", audit_fields)
200
+ if authenticators is not None:
201
+ pulumi.set(__self__, "authenticators", authenticators)
202
+ if backend is not None:
203
+ pulumi.set(__self__, "backend", backend)
204
+ if default_path_policy is not None:
205
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
206
+ if disabled_validations is not None:
207
+ pulumi.set(__self__, "disabled_validations", disabled_validations)
208
+ if enable_sentinel_parsing is not None:
209
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
210
+ if enabled is not None:
211
+ pulumi.set(__self__, "enabled", enabled)
212
+ if last_updated is not None:
213
+ pulumi.set(__self__, "last_updated", last_updated)
214
+ if namespace is not None:
215
+ pulumi.set(__self__, "namespace", namespace)
216
+
217
+ @_builtins.property
218
+ @pulumi.getter(name="auditFields")
219
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
220
+ """
221
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
222
+ """
223
+ return pulumi.get(self, "audit_fields")
224
+
225
+ @audit_fields.setter
226
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
227
+ pulumi.set(self, "audit_fields", value)
228
+
229
+ @_builtins.property
230
+ @pulumi.getter
231
+ def authenticators(self) -> Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]:
232
+ """
233
+ Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
234
+ """
235
+ return pulumi.get(self, "authenticators")
236
+
237
+ @authenticators.setter
238
+ def authenticators(self, value: Optional[pulumi.Input['BackendConfigCmpv2AuthenticatorsArgs']]):
239
+ pulumi.set(self, "authenticators", value)
240
+
241
+ @_builtins.property
242
+ @pulumi.getter
243
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
244
+ """
245
+ The path to the PKI secret backend to
246
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
247
+ """
248
+ return pulumi.get(self, "backend")
249
+
250
+ @backend.setter
251
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
252
+ pulumi.set(self, "backend", value)
253
+
254
+ @_builtins.property
255
+ @pulumi.getter(name="defaultPathPolicy")
256
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
257
+ """
258
+ Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
259
+ """
260
+ return pulumi.get(self, "default_path_policy")
261
+
262
+ @default_path_policy.setter
263
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
264
+ pulumi.set(self, "default_path_policy", value)
265
+
266
+ @_builtins.property
267
+ @pulumi.getter(name="disabledValidations")
268
+ def disabled_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
269
+ """
270
+ A comma-separated list of validations not to perform on CMPv2 messages.
271
+
272
+ <a id="nestedatt--authenticators"></a>
273
+ """
274
+ return pulumi.get(self, "disabled_validations")
275
+
276
+ @disabled_validations.setter
277
+ def disabled_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
278
+ pulumi.set(self, "disabled_validations", value)
279
+
280
+ @_builtins.property
281
+ @pulumi.getter(name="enableSentinelParsing")
282
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
283
+ """
284
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
285
+ """
286
+ return pulumi.get(self, "enable_sentinel_parsing")
287
+
288
+ @enable_sentinel_parsing.setter
289
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
290
+ pulumi.set(self, "enable_sentinel_parsing", value)
291
+
292
+ @_builtins.property
293
+ @pulumi.getter
294
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
295
+ """
296
+ Specifies whether CMPv2 is enabled.
297
+ """
298
+ return pulumi.get(self, "enabled")
299
+
300
+ @enabled.setter
301
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
302
+ pulumi.set(self, "enabled", value)
303
+
304
+ @_builtins.property
305
+ @pulumi.getter(name="lastUpdated")
306
+ def last_updated(self) -> Optional[pulumi.Input[_builtins.str]]:
307
+ """
308
+ A read-only timestamp representing the last time the configuration was updated.
309
+ """
310
+ return pulumi.get(self, "last_updated")
311
+
312
+ @last_updated.setter
313
+ def last_updated(self, value: Optional[pulumi.Input[_builtins.str]]):
314
+ pulumi.set(self, "last_updated", value)
315
+
316
+ @_builtins.property
317
+ @pulumi.getter
318
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
319
+ """
320
+ The namespace of the target resource.
321
+ The value should not contain leading or trailing forward slashes.
322
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
323
+ *Available only for Vault Enterprise*.
324
+ """
325
+ return pulumi.get(self, "namespace")
326
+
327
+ @namespace.setter
328
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
329
+ pulumi.set(self, "namespace", value)
330
+
331
+
332
+ @pulumi.type_token("vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2")
333
+ class BackendConfigCmpv2(pulumi.CustomResource):
334
+ @overload
335
+ def __init__(__self__,
336
+ resource_name: str,
337
+ opts: Optional[pulumi.ResourceOptions] = None,
338
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
339
+ authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
340
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
341
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
342
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
343
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
344
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
345
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
346
+ __props__=None):
347
+ """
348
+ Allows setting the CMPv2 configuration on a PKI Secret Backend
349
+
350
+ ## Example Usage
351
+
352
+ ```python
353
+ import pulumi
354
+ import pulumi_std as std
355
+ import pulumi_vault as vault
356
+
357
+ pki = vault.Mount("pki",
358
+ path="pki-root",
359
+ type="pki",
360
+ description="PKI secret engine mount")
361
+ cmpv2_role = vault.pkisecret.SecretBackendRole("cmpv2_role",
362
+ backend=pki.path,
363
+ name="cmpv2-role",
364
+ ttl="3600",
365
+ key_type="ec",
366
+ key_bits=256)
367
+ cmpv2_role2 = vault.pkisecret.SecretBackendRole("cmpv2_role_2",
368
+ backend=pki.path,
369
+ name="cmpv2-role-2",
370
+ ttl="3600",
371
+ key_type="ec",
372
+ key_bits=256)
373
+ example = vault.pkisecret.BackendConfigCmpv2("example",
374
+ backend=pki.path,
375
+ enabled=True,
376
+ default_path_policy=std.format(input="role:%s",
377
+ args=[cmpv2_role.name]).result,
378
+ authenticators={
379
+ "cert": {
380
+ "accessor": "test",
381
+ "cert_role": "cert-auth-role",
382
+ },
383
+ },
384
+ enable_sentinel_parsing=True,
385
+ audit_fields=[
386
+ "csr",
387
+ "common_name",
388
+ "alt_names",
389
+ "ip_sans",
390
+ "uri_sans",
391
+ "other_sans",
392
+ "signature_bits",
393
+ "exclude_cn_from_sans",
394
+ "ou",
395
+ "organization",
396
+ "country",
397
+ "locality",
398
+ "province",
399
+ "street_address",
400
+ "postal_code",
401
+ "serial_number",
402
+ "use_pss",
403
+ "key_type",
404
+ "key_bits",
405
+ "add_basic_constraints",
406
+ ],
407
+ disabled_validations=["DisableMatchingKeyIdValidation"])
408
+ ```
409
+
410
+ ## Import
411
+
412
+ The PKI config cluster can be imported using the resource's `id`.
413
+ In the case of the example above the `id` would be `pki-root/config/cmpv2`,
414
+ where the `pki-root` component is the resource's `backend`, e.g.
415
+
416
+ ```sh
417
+ $ pulumi import vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2 example pki-root/config/cmpv2
418
+ ```
419
+
420
+ :param str resource_name: The name of the resource.
421
+ :param pulumi.ResourceOptions opts: Options for the resource.
422
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
423
+ :param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
424
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
425
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
426
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
427
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
428
+
429
+ <a id="nestedatt--authenticators"></a>
430
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
431
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
432
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
433
+ The value should not contain leading or trailing forward slashes.
434
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
435
+ *Available only for Vault Enterprise*.
436
+ """
437
+ ...
438
+ @overload
439
+ def __init__(__self__,
440
+ resource_name: str,
441
+ args: BackendConfigCmpv2Args,
442
+ opts: Optional[pulumi.ResourceOptions] = None):
443
+ """
444
+ Allows setting the CMPv2 configuration on a PKI Secret Backend
445
+
446
+ ## Example Usage
447
+
448
+ ```python
449
+ import pulumi
450
+ import pulumi_std as std
451
+ import pulumi_vault as vault
452
+
453
+ pki = vault.Mount("pki",
454
+ path="pki-root",
455
+ type="pki",
456
+ description="PKI secret engine mount")
457
+ cmpv2_role = vault.pkisecret.SecretBackendRole("cmpv2_role",
458
+ backend=pki.path,
459
+ name="cmpv2-role",
460
+ ttl="3600",
461
+ key_type="ec",
462
+ key_bits=256)
463
+ cmpv2_role2 = vault.pkisecret.SecretBackendRole("cmpv2_role_2",
464
+ backend=pki.path,
465
+ name="cmpv2-role-2",
466
+ ttl="3600",
467
+ key_type="ec",
468
+ key_bits=256)
469
+ example = vault.pkisecret.BackendConfigCmpv2("example",
470
+ backend=pki.path,
471
+ enabled=True,
472
+ default_path_policy=std.format(input="role:%s",
473
+ args=[cmpv2_role.name]).result,
474
+ authenticators={
475
+ "cert": {
476
+ "accessor": "test",
477
+ "cert_role": "cert-auth-role",
478
+ },
479
+ },
480
+ enable_sentinel_parsing=True,
481
+ audit_fields=[
482
+ "csr",
483
+ "common_name",
484
+ "alt_names",
485
+ "ip_sans",
486
+ "uri_sans",
487
+ "other_sans",
488
+ "signature_bits",
489
+ "exclude_cn_from_sans",
490
+ "ou",
491
+ "organization",
492
+ "country",
493
+ "locality",
494
+ "province",
495
+ "street_address",
496
+ "postal_code",
497
+ "serial_number",
498
+ "use_pss",
499
+ "key_type",
500
+ "key_bits",
501
+ "add_basic_constraints",
502
+ ],
503
+ disabled_validations=["DisableMatchingKeyIdValidation"])
504
+ ```
505
+
506
+ ## Import
507
+
508
+ The PKI config cluster can be imported using the resource's `id`.
509
+ In the case of the example above the `id` would be `pki-root/config/cmpv2`,
510
+ where the `pki-root` component is the resource's `backend`, e.g.
511
+
512
+ ```sh
513
+ $ pulumi import vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2 example pki-root/config/cmpv2
514
+ ```
515
+
516
+ :param str resource_name: The name of the resource.
517
+ :param BackendConfigCmpv2Args args: The arguments to use to populate this resource's properties.
518
+ :param pulumi.ResourceOptions opts: Options for the resource.
519
+ """
520
+ ...
521
+ def __init__(__self__, resource_name: str, *args, **kwargs):
522
+ resource_args, opts = _utilities.get_resource_args_opts(BackendConfigCmpv2Args, pulumi.ResourceOptions, *args, **kwargs)
523
+ if resource_args is not None:
524
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
525
+ else:
526
+ __self__._internal_init(resource_name, *args, **kwargs)
527
+
528
+ def _internal_init(__self__,
529
+ resource_name: str,
530
+ opts: Optional[pulumi.ResourceOptions] = None,
531
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
532
+ authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
533
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
534
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
535
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
536
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
537
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
538
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
539
+ __props__=None):
540
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
541
+ if not isinstance(opts, pulumi.ResourceOptions):
542
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
543
+ if opts.id is None:
544
+ if __props__ is not None:
545
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
546
+ __props__ = BackendConfigCmpv2Args.__new__(BackendConfigCmpv2Args)
547
+
548
+ __props__.__dict__["audit_fields"] = audit_fields
549
+ __props__.__dict__["authenticators"] = authenticators
550
+ if backend is None and not opts.urn:
551
+ raise TypeError("Missing required property 'backend'")
552
+ __props__.__dict__["backend"] = backend
553
+ __props__.__dict__["default_path_policy"] = default_path_policy
554
+ __props__.__dict__["disabled_validations"] = disabled_validations
555
+ __props__.__dict__["enable_sentinel_parsing"] = enable_sentinel_parsing
556
+ __props__.__dict__["enabled"] = enabled
557
+ __props__.__dict__["namespace"] = namespace
558
+ __props__.__dict__["last_updated"] = None
559
+ super(BackendConfigCmpv2, __self__).__init__(
560
+ 'vault:pkiSecret/backendConfigCmpv2:BackendConfigCmpv2',
561
+ resource_name,
562
+ __props__,
563
+ opts)
564
+
565
+ @staticmethod
566
+ def get(resource_name: str,
567
+ id: pulumi.Input[str],
568
+ opts: Optional[pulumi.ResourceOptions] = None,
569
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
570
+ authenticators: Optional[pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']]] = None,
571
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
572
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
573
+ disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
574
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
575
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
576
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
577
+ namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'BackendConfigCmpv2':
578
+ """
579
+ Get an existing BackendConfigCmpv2 resource's state with the given name, id, and optional extra
580
+ properties used to qualify the lookup.
581
+
582
+ :param str resource_name: The unique name of the resulting resource.
583
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
584
+ :param pulumi.ResourceOptions opts: Options for the resource.
585
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
586
+ :param pulumi.Input[Union['BackendConfigCmpv2AuthenticatorsArgs', 'BackendConfigCmpv2AuthenticatorsArgsDict']] authenticators: Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
587
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
588
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
589
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
590
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
591
+
592
+ <a id="nestedatt--authenticators"></a>
593
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
594
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether CMPv2 is enabled.
595
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
596
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
597
+ The value should not contain leading or trailing forward slashes.
598
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
599
+ *Available only for Vault Enterprise*.
600
+ """
601
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
602
+
603
+ __props__ = _BackendConfigCmpv2State.__new__(_BackendConfigCmpv2State)
604
+
605
+ __props__.__dict__["audit_fields"] = audit_fields
606
+ __props__.__dict__["authenticators"] = authenticators
607
+ __props__.__dict__["backend"] = backend
608
+ __props__.__dict__["default_path_policy"] = default_path_policy
609
+ __props__.__dict__["disabled_validations"] = disabled_validations
610
+ __props__.__dict__["enable_sentinel_parsing"] = enable_sentinel_parsing
611
+ __props__.__dict__["enabled"] = enabled
612
+ __props__.__dict__["last_updated"] = last_updated
613
+ __props__.__dict__["namespace"] = namespace
614
+ return BackendConfigCmpv2(resource_name, opts=opts, __props__=__props__)
615
+
616
+ @_builtins.property
617
+ @pulumi.getter(name="auditFields")
618
+ def audit_fields(self) -> pulumi.Output[Sequence[_builtins.str]]:
619
+ """
620
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
621
+ """
622
+ return pulumi.get(self, "audit_fields")
623
+
624
+ @_builtins.property
625
+ @pulumi.getter
626
+ def authenticators(self) -> pulumi.Output['outputs.BackendConfigCmpv2Authenticators']:
627
+ """
628
+ Lists the mount accessors CMPv2 should delegate authentication requests towards (see below for nested schema).
629
+ """
630
+ return pulumi.get(self, "authenticators")
631
+
632
+ @_builtins.property
633
+ @pulumi.getter
634
+ def backend(self) -> pulumi.Output[_builtins.str]:
635
+ """
636
+ The path to the PKI secret backend to
637
+ read the CMPv2 configuration from, with no leading or trailing `/`s.
638
+ """
639
+ return pulumi.get(self, "backend")
640
+
641
+ @_builtins.property
642
+ @pulumi.getter(name="defaultPathPolicy")
643
+ def default_path_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
644
+ """
645
+ Specifies the behavior for requests using the non-role-qualified CMPv2 requests. Can be sign-verbatim or a role given by role:<role_name>.
646
+ """
647
+ return pulumi.get(self, "default_path_policy")
648
+
649
+ @_builtins.property
650
+ @pulumi.getter(name="disabledValidations")
651
+ def disabled_validations(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
652
+ """
653
+ A comma-separated list of validations not to perform on CMPv2 messages.
654
+
655
+ <a id="nestedatt--authenticators"></a>
656
+ """
657
+ return pulumi.get(self, "disabled_validations")
658
+
659
+ @_builtins.property
660
+ @pulumi.getter(name="enableSentinelParsing")
661
+ def enable_sentinel_parsing(self) -> pulumi.Output[Optional[_builtins.bool]]:
662
+ """
663
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
664
+ """
665
+ return pulumi.get(self, "enable_sentinel_parsing")
666
+
667
+ @_builtins.property
668
+ @pulumi.getter
669
+ def enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
670
+ """
671
+ Specifies whether CMPv2 is enabled.
672
+ """
673
+ return pulumi.get(self, "enabled")
674
+
675
+ @_builtins.property
676
+ @pulumi.getter(name="lastUpdated")
677
+ def last_updated(self) -> pulumi.Output[_builtins.str]:
678
+ """
679
+ A read-only timestamp representing the last time the configuration was updated.
680
+ """
681
+ return pulumi.get(self, "last_updated")
682
+
683
+ @_builtins.property
684
+ @pulumi.getter
685
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
686
+ """
687
+ The namespace of the target resource.
688
+ The value should not contain leading or trailing forward slashes.
689
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
690
+ *Available only for Vault Enterprise*.
691
+ """
692
+ return pulumi.get(self, "namespace")
693
+