pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,756 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['BackendConfigEstArgs', 'BackendConfigEst']
20
+
21
+ @pulumi.input_type
22
+ class BackendConfigEstArgs:
23
+ def __init__(__self__, *,
24
+ backend: pulumi.Input[_builtins.str],
25
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ authenticators: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']] = None,
27
+ default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
29
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
32
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
33
+ """
34
+ The set of arguments for constructing a BackendConfigEst resource.
35
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
36
+ read the EST configuration from, with no leading or trailing `/`s.
37
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
38
+
39
+ <a id="nestedatt--authenticators"></a>
40
+ :param pulumi.Input['BackendConfigEstAuthenticatorsArgs'] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
41
+ :param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
42
+ :param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
43
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
44
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
45
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
46
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
47
+ The value should not contain leading or trailing forward slashes.
48
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
+ *Available only for Vault Enterprise*.
50
+ """
51
+ pulumi.set(__self__, "backend", backend)
52
+ if audit_fields is not None:
53
+ pulumi.set(__self__, "audit_fields", audit_fields)
54
+ if authenticators is not None:
55
+ pulumi.set(__self__, "authenticators", authenticators)
56
+ if default_mount is not None:
57
+ pulumi.set(__self__, "default_mount", default_mount)
58
+ if default_path_policy is not None:
59
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
60
+ if enable_sentinel_parsing is not None:
61
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
62
+ if enabled is not None:
63
+ pulumi.set(__self__, "enabled", enabled)
64
+ if label_to_path_policy is not None:
65
+ pulumi.set(__self__, "label_to_path_policy", label_to_path_policy)
66
+ if namespace is not None:
67
+ pulumi.set(__self__, "namespace", namespace)
68
+
69
+ @_builtins.property
70
+ @pulumi.getter
71
+ def backend(self) -> pulumi.Input[_builtins.str]:
72
+ """
73
+ The path to the PKI secret backend to
74
+ read the EST configuration from, with no leading or trailing `/`s.
75
+ """
76
+ return pulumi.get(self, "backend")
77
+
78
+ @backend.setter
79
+ def backend(self, value: pulumi.Input[_builtins.str]):
80
+ pulumi.set(self, "backend", value)
81
+
82
+ @_builtins.property
83
+ @pulumi.getter(name="auditFields")
84
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
85
+ """
86
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
87
+
88
+ <a id="nestedatt--authenticators"></a>
89
+ """
90
+ return pulumi.get(self, "audit_fields")
91
+
92
+ @audit_fields.setter
93
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
94
+ pulumi.set(self, "audit_fields", value)
95
+
96
+ @_builtins.property
97
+ @pulumi.getter
98
+ def authenticators(self) -> Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]:
99
+ """
100
+ Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
101
+ """
102
+ return pulumi.get(self, "authenticators")
103
+
104
+ @authenticators.setter
105
+ def authenticators(self, value: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]):
106
+ pulumi.set(self, "authenticators", value)
107
+
108
+ @_builtins.property
109
+ @pulumi.getter(name="defaultMount")
110
+ def default_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
111
+ """
112
+ If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
113
+ """
114
+ return pulumi.get(self, "default_mount")
115
+
116
+ @default_mount.setter
117
+ def default_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
118
+ pulumi.set(self, "default_mount", value)
119
+
120
+ @_builtins.property
121
+ @pulumi.getter(name="defaultPathPolicy")
122
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
123
+ """
124
+ Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
125
+ """
126
+ return pulumi.get(self, "default_path_policy")
127
+
128
+ @default_path_policy.setter
129
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
130
+ pulumi.set(self, "default_path_policy", value)
131
+
132
+ @_builtins.property
133
+ @pulumi.getter(name="enableSentinelParsing")
134
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
135
+ """
136
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
137
+ """
138
+ return pulumi.get(self, "enable_sentinel_parsing")
139
+
140
+ @enable_sentinel_parsing.setter
141
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
142
+ pulumi.set(self, "enable_sentinel_parsing", value)
143
+
144
+ @_builtins.property
145
+ @pulumi.getter
146
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
147
+ """
148
+ Specifies whether EST is enabled.
149
+ """
150
+ return pulumi.get(self, "enabled")
151
+
152
+ @enabled.setter
153
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
154
+ pulumi.set(self, "enabled", value)
155
+
156
+ @_builtins.property
157
+ @pulumi.getter(name="labelToPathPolicy")
158
+ def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
159
+ """
160
+ Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
161
+ """
162
+ return pulumi.get(self, "label_to_path_policy")
163
+
164
+ @label_to_path_policy.setter
165
+ def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
166
+ pulumi.set(self, "label_to_path_policy", value)
167
+
168
+ @_builtins.property
169
+ @pulumi.getter
170
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
171
+ """
172
+ The namespace of the target resource.
173
+ The value should not contain leading or trailing forward slashes.
174
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
175
+ *Available only for Vault Enterprise*.
176
+ """
177
+ return pulumi.get(self, "namespace")
178
+
179
+ @namespace.setter
180
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
181
+ pulumi.set(self, "namespace", value)
182
+
183
+
184
+ @pulumi.input_type
185
+ class _BackendConfigEstState:
186
+ def __init__(__self__, *,
187
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
188
+ authenticators: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']] = None,
189
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
190
+ default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
191
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
192
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
193
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
194
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
195
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
196
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
197
+ """
198
+ Input properties used for looking up and filtering BackendConfigEst resources.
199
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
200
+
201
+ <a id="nestedatt--authenticators"></a>
202
+ :param pulumi.Input['BackendConfigEstAuthenticatorsArgs'] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
203
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
204
+ read the EST configuration from, with no leading or trailing `/`s.
205
+ :param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
206
+ :param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
207
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
208
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
209
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
210
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
211
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
212
+ The value should not contain leading or trailing forward slashes.
213
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
214
+ *Available only for Vault Enterprise*.
215
+ """
216
+ if audit_fields is not None:
217
+ pulumi.set(__self__, "audit_fields", audit_fields)
218
+ if authenticators is not None:
219
+ pulumi.set(__self__, "authenticators", authenticators)
220
+ if backend is not None:
221
+ pulumi.set(__self__, "backend", backend)
222
+ if default_mount is not None:
223
+ pulumi.set(__self__, "default_mount", default_mount)
224
+ if default_path_policy is not None:
225
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
226
+ if enable_sentinel_parsing is not None:
227
+ pulumi.set(__self__, "enable_sentinel_parsing", enable_sentinel_parsing)
228
+ if enabled is not None:
229
+ pulumi.set(__self__, "enabled", enabled)
230
+ if label_to_path_policy is not None:
231
+ pulumi.set(__self__, "label_to_path_policy", label_to_path_policy)
232
+ if last_updated is not None:
233
+ pulumi.set(__self__, "last_updated", last_updated)
234
+ if namespace is not None:
235
+ pulumi.set(__self__, "namespace", namespace)
236
+
237
+ @_builtins.property
238
+ @pulumi.getter(name="auditFields")
239
+ def audit_fields(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
240
+ """
241
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
242
+
243
+ <a id="nestedatt--authenticators"></a>
244
+ """
245
+ return pulumi.get(self, "audit_fields")
246
+
247
+ @audit_fields.setter
248
+ def audit_fields(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
249
+ pulumi.set(self, "audit_fields", value)
250
+
251
+ @_builtins.property
252
+ @pulumi.getter
253
+ def authenticators(self) -> Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]:
254
+ """
255
+ Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
256
+ """
257
+ return pulumi.get(self, "authenticators")
258
+
259
+ @authenticators.setter
260
+ def authenticators(self, value: Optional[pulumi.Input['BackendConfigEstAuthenticatorsArgs']]):
261
+ pulumi.set(self, "authenticators", value)
262
+
263
+ @_builtins.property
264
+ @pulumi.getter
265
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
266
+ """
267
+ The path to the PKI secret backend to
268
+ read the EST configuration from, with no leading or trailing `/`s.
269
+ """
270
+ return pulumi.get(self, "backend")
271
+
272
+ @backend.setter
273
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
274
+ pulumi.set(self, "backend", value)
275
+
276
+ @_builtins.property
277
+ @pulumi.getter(name="defaultMount")
278
+ def default_mount(self) -> Optional[pulumi.Input[_builtins.bool]]:
279
+ """
280
+ If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
281
+ """
282
+ return pulumi.get(self, "default_mount")
283
+
284
+ @default_mount.setter
285
+ def default_mount(self, value: Optional[pulumi.Input[_builtins.bool]]):
286
+ pulumi.set(self, "default_mount", value)
287
+
288
+ @_builtins.property
289
+ @pulumi.getter(name="defaultPathPolicy")
290
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
291
+ """
292
+ Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
293
+ """
294
+ return pulumi.get(self, "default_path_policy")
295
+
296
+ @default_path_policy.setter
297
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
298
+ pulumi.set(self, "default_path_policy", value)
299
+
300
+ @_builtins.property
301
+ @pulumi.getter(name="enableSentinelParsing")
302
+ def enable_sentinel_parsing(self) -> Optional[pulumi.Input[_builtins.bool]]:
303
+ """
304
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
305
+ """
306
+ return pulumi.get(self, "enable_sentinel_parsing")
307
+
308
+ @enable_sentinel_parsing.setter
309
+ def enable_sentinel_parsing(self, value: Optional[pulumi.Input[_builtins.bool]]):
310
+ pulumi.set(self, "enable_sentinel_parsing", value)
311
+
312
+ @_builtins.property
313
+ @pulumi.getter
314
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
315
+ """
316
+ Specifies whether EST is enabled.
317
+ """
318
+ return pulumi.get(self, "enabled")
319
+
320
+ @enabled.setter
321
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
322
+ pulumi.set(self, "enabled", value)
323
+
324
+ @_builtins.property
325
+ @pulumi.getter(name="labelToPathPolicy")
326
+ def label_to_path_policy(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
327
+ """
328
+ Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
329
+ """
330
+ return pulumi.get(self, "label_to_path_policy")
331
+
332
+ @label_to_path_policy.setter
333
+ def label_to_path_policy(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
334
+ pulumi.set(self, "label_to_path_policy", value)
335
+
336
+ @_builtins.property
337
+ @pulumi.getter(name="lastUpdated")
338
+ def last_updated(self) -> Optional[pulumi.Input[_builtins.str]]:
339
+ """
340
+ A read-only timestamp representing the last time the configuration was updated.
341
+ """
342
+ return pulumi.get(self, "last_updated")
343
+
344
+ @last_updated.setter
345
+ def last_updated(self, value: Optional[pulumi.Input[_builtins.str]]):
346
+ pulumi.set(self, "last_updated", value)
347
+
348
+ @_builtins.property
349
+ @pulumi.getter
350
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
351
+ """
352
+ The namespace of the target resource.
353
+ The value should not contain leading or trailing forward slashes.
354
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
355
+ *Available only for Vault Enterprise*.
356
+ """
357
+ return pulumi.get(self, "namespace")
358
+
359
+ @namespace.setter
360
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
361
+ pulumi.set(self, "namespace", value)
362
+
363
+
364
+ @pulumi.type_token("vault:pkiSecret/backendConfigEst:BackendConfigEst")
365
+ class BackendConfigEst(pulumi.CustomResource):
366
+ @overload
367
+ def __init__(__self__,
368
+ resource_name: str,
369
+ opts: Optional[pulumi.ResourceOptions] = None,
370
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
371
+ authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
372
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
373
+ default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
374
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
375
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
376
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
377
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
378
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
379
+ __props__=None):
380
+ """
381
+ Allows setting the EST configuration on a PKI Secret Backend
382
+
383
+ ## Example Usage
384
+
385
+ ```python
386
+ import pulumi
387
+ import pulumi_std as std
388
+ import pulumi_vault as vault
389
+
390
+ pki = vault.Mount("pki",
391
+ path="pki-root",
392
+ type="pki",
393
+ description="PKI secret engine mount")
394
+ est_role = vault.pkisecret.SecretBackendRole("est_role",
395
+ backend=pki.path,
396
+ name="est-role",
397
+ ttl="3600",
398
+ key_type="ec",
399
+ key_bits=256)
400
+ est_role2 = vault.pkisecret.SecretBackendRole("est_role_2",
401
+ backend=pki.path,
402
+ name="est-role-2",
403
+ ttl="3600",
404
+ key_type="ec",
405
+ key_bits=256)
406
+ example = vault.pkisecret.BackendConfigEst("example",
407
+ backend=pki.path,
408
+ enabled=True,
409
+ default_mount=True,
410
+ default_path_policy=std.format(input="role:%s",
411
+ args=[est_role.name]).result,
412
+ label_to_path_policy={
413
+ "test-label": "sign-verbatim",
414
+ "test-label-2": std.format(input="role:%s",
415
+ args=[est_role2.name]).result,
416
+ },
417
+ authenticators={
418
+ "cert": {
419
+ "accessor": "test",
420
+ "cert_role": "cert-auth-role",
421
+ },
422
+ "userpass": {
423
+ "accessor": "test2",
424
+ },
425
+ },
426
+ enable_sentinel_parsing=True,
427
+ audit_fields=[
428
+ "csr",
429
+ "common_name",
430
+ "alt_names",
431
+ "ip_sans",
432
+ "uri_sans",
433
+ "other_sans",
434
+ "signature_bits",
435
+ "exclude_cn_from_sans",
436
+ "ou",
437
+ "organization",
438
+ "country",
439
+ "locality",
440
+ "province",
441
+ "street_address",
442
+ "postal_code",
443
+ "serial_number",
444
+ "use_pss",
445
+ "key_type",
446
+ "key_bits",
447
+ "add_basic_constraints",
448
+ ])
449
+ ```
450
+
451
+ ## Import
452
+
453
+ The PKI config cluster can be imported using the resource's `id`.
454
+ In the case of the example above the `id` would be `pki-root/config/est`,
455
+ where the `pki-root` component is the resource's `backend`, e.g.
456
+
457
+ ```sh
458
+ $ pulumi import vault:pkiSecret/backendConfigEst:BackendConfigEst example pki-root/config/est
459
+ ```
460
+
461
+ :param str resource_name: The name of the resource.
462
+ :param pulumi.ResourceOptions opts: Options for the resource.
463
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
464
+
465
+ <a id="nestedatt--authenticators"></a>
466
+ :param pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
467
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
468
+ read the EST configuration from, with no leading or trailing `/`s.
469
+ :param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
470
+ :param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
471
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
472
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
473
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
474
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
475
+ The value should not contain leading or trailing forward slashes.
476
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
477
+ *Available only for Vault Enterprise*.
478
+ """
479
+ ...
480
+ @overload
481
+ def __init__(__self__,
482
+ resource_name: str,
483
+ args: BackendConfigEstArgs,
484
+ opts: Optional[pulumi.ResourceOptions] = None):
485
+ """
486
+ Allows setting the EST configuration on a PKI Secret Backend
487
+
488
+ ## Example Usage
489
+
490
+ ```python
491
+ import pulumi
492
+ import pulumi_std as std
493
+ import pulumi_vault as vault
494
+
495
+ pki = vault.Mount("pki",
496
+ path="pki-root",
497
+ type="pki",
498
+ description="PKI secret engine mount")
499
+ est_role = vault.pkisecret.SecretBackendRole("est_role",
500
+ backend=pki.path,
501
+ name="est-role",
502
+ ttl="3600",
503
+ key_type="ec",
504
+ key_bits=256)
505
+ est_role2 = vault.pkisecret.SecretBackendRole("est_role_2",
506
+ backend=pki.path,
507
+ name="est-role-2",
508
+ ttl="3600",
509
+ key_type="ec",
510
+ key_bits=256)
511
+ example = vault.pkisecret.BackendConfigEst("example",
512
+ backend=pki.path,
513
+ enabled=True,
514
+ default_mount=True,
515
+ default_path_policy=std.format(input="role:%s",
516
+ args=[est_role.name]).result,
517
+ label_to_path_policy={
518
+ "test-label": "sign-verbatim",
519
+ "test-label-2": std.format(input="role:%s",
520
+ args=[est_role2.name]).result,
521
+ },
522
+ authenticators={
523
+ "cert": {
524
+ "accessor": "test",
525
+ "cert_role": "cert-auth-role",
526
+ },
527
+ "userpass": {
528
+ "accessor": "test2",
529
+ },
530
+ },
531
+ enable_sentinel_parsing=True,
532
+ audit_fields=[
533
+ "csr",
534
+ "common_name",
535
+ "alt_names",
536
+ "ip_sans",
537
+ "uri_sans",
538
+ "other_sans",
539
+ "signature_bits",
540
+ "exclude_cn_from_sans",
541
+ "ou",
542
+ "organization",
543
+ "country",
544
+ "locality",
545
+ "province",
546
+ "street_address",
547
+ "postal_code",
548
+ "serial_number",
549
+ "use_pss",
550
+ "key_type",
551
+ "key_bits",
552
+ "add_basic_constraints",
553
+ ])
554
+ ```
555
+
556
+ ## Import
557
+
558
+ The PKI config cluster can be imported using the resource's `id`.
559
+ In the case of the example above the `id` would be `pki-root/config/est`,
560
+ where the `pki-root` component is the resource's `backend`, e.g.
561
+
562
+ ```sh
563
+ $ pulumi import vault:pkiSecret/backendConfigEst:BackendConfigEst example pki-root/config/est
564
+ ```
565
+
566
+ :param str resource_name: The name of the resource.
567
+ :param BackendConfigEstArgs args: The arguments to use to populate this resource's properties.
568
+ :param pulumi.ResourceOptions opts: Options for the resource.
569
+ """
570
+ ...
571
+ def __init__(__self__, resource_name: str, *args, **kwargs):
572
+ resource_args, opts = _utilities.get_resource_args_opts(BackendConfigEstArgs, pulumi.ResourceOptions, *args, **kwargs)
573
+ if resource_args is not None:
574
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
575
+ else:
576
+ __self__._internal_init(resource_name, *args, **kwargs)
577
+
578
+ def _internal_init(__self__,
579
+ resource_name: str,
580
+ opts: Optional[pulumi.ResourceOptions] = None,
581
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
582
+ authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
583
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
584
+ default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
585
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
586
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
587
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
588
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
589
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
590
+ __props__=None):
591
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
592
+ if not isinstance(opts, pulumi.ResourceOptions):
593
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
594
+ if opts.id is None:
595
+ if __props__ is not None:
596
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
597
+ __props__ = BackendConfigEstArgs.__new__(BackendConfigEstArgs)
598
+
599
+ __props__.__dict__["audit_fields"] = audit_fields
600
+ __props__.__dict__["authenticators"] = authenticators
601
+ if backend is None and not opts.urn:
602
+ raise TypeError("Missing required property 'backend'")
603
+ __props__.__dict__["backend"] = backend
604
+ __props__.__dict__["default_mount"] = default_mount
605
+ __props__.__dict__["default_path_policy"] = default_path_policy
606
+ __props__.__dict__["enable_sentinel_parsing"] = enable_sentinel_parsing
607
+ __props__.__dict__["enabled"] = enabled
608
+ __props__.__dict__["label_to_path_policy"] = label_to_path_policy
609
+ __props__.__dict__["namespace"] = namespace
610
+ __props__.__dict__["last_updated"] = None
611
+ super(BackendConfigEst, __self__).__init__(
612
+ 'vault:pkiSecret/backendConfigEst:BackendConfigEst',
613
+ resource_name,
614
+ __props__,
615
+ opts)
616
+
617
+ @staticmethod
618
+ def get(resource_name: str,
619
+ id: pulumi.Input[str],
620
+ opts: Optional[pulumi.ResourceOptions] = None,
621
+ audit_fields: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
622
+ authenticators: Optional[pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']]] = None,
623
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
624
+ default_mount: Optional[pulumi.Input[_builtins.bool]] = None,
625
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
626
+ enable_sentinel_parsing: Optional[pulumi.Input[_builtins.bool]] = None,
627
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
628
+ label_to_path_policy: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
629
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
630
+ namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'BackendConfigEst':
631
+ """
632
+ Get an existing BackendConfigEst resource's state with the given name, id, and optional extra
633
+ properties used to qualify the lookup.
634
+
635
+ :param str resource_name: The unique name of the resulting resource.
636
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
637
+ :param pulumi.ResourceOptions opts: Options for the resource.
638
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_fields: Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
639
+
640
+ <a id="nestedatt--authenticators"></a>
641
+ :param pulumi.Input[Union['BackendConfigEstAuthenticatorsArgs', 'BackendConfigEstAuthenticatorsArgsDict']] authenticators: Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
642
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
643
+ read the EST configuration from, with no leading or trailing `/`s.
644
+ :param pulumi.Input[_builtins.bool] default_mount: If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
645
+ :param pulumi.Input[_builtins.str] default_path_policy: Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
646
+ :param pulumi.Input[_builtins.bool] enable_sentinel_parsing: If set, parse out fields from the provided CSR making them available for Sentinel policies.
647
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether EST is enabled.
648
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] label_to_path_policy: Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
649
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
650
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
651
+ The value should not contain leading or trailing forward slashes.
652
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
653
+ *Available only for Vault Enterprise*.
654
+ """
655
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
656
+
657
+ __props__ = _BackendConfigEstState.__new__(_BackendConfigEstState)
658
+
659
+ __props__.__dict__["audit_fields"] = audit_fields
660
+ __props__.__dict__["authenticators"] = authenticators
661
+ __props__.__dict__["backend"] = backend
662
+ __props__.__dict__["default_mount"] = default_mount
663
+ __props__.__dict__["default_path_policy"] = default_path_policy
664
+ __props__.__dict__["enable_sentinel_parsing"] = enable_sentinel_parsing
665
+ __props__.__dict__["enabled"] = enabled
666
+ __props__.__dict__["label_to_path_policy"] = label_to_path_policy
667
+ __props__.__dict__["last_updated"] = last_updated
668
+ __props__.__dict__["namespace"] = namespace
669
+ return BackendConfigEst(resource_name, opts=opts, __props__=__props__)
670
+
671
+ @_builtins.property
672
+ @pulumi.getter(name="auditFields")
673
+ def audit_fields(self) -> pulumi.Output[Sequence[_builtins.str]]:
674
+ """
675
+ Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
676
+
677
+ <a id="nestedatt--authenticators"></a>
678
+ """
679
+ return pulumi.get(self, "audit_fields")
680
+
681
+ @_builtins.property
682
+ @pulumi.getter
683
+ def authenticators(self) -> pulumi.Output['outputs.BackendConfigEstAuthenticators']:
684
+ """
685
+ Lists the mount accessors EST should delegate authentication requests towards (see below for nested schema).
686
+ """
687
+ return pulumi.get(self, "authenticators")
688
+
689
+ @_builtins.property
690
+ @pulumi.getter
691
+ def backend(self) -> pulumi.Output[_builtins.str]:
692
+ """
693
+ The path to the PKI secret backend to
694
+ read the EST configuration from, with no leading or trailing `/`s.
695
+ """
696
+ return pulumi.get(self, "backend")
697
+
698
+ @_builtins.property
699
+ @pulumi.getter(name="defaultMount")
700
+ def default_mount(self) -> pulumi.Output[Optional[_builtins.bool]]:
701
+ """
702
+ If set, this mount will register the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
703
+ """
704
+ return pulumi.get(self, "default_mount")
705
+
706
+ @_builtins.property
707
+ @pulumi.getter(name="defaultPathPolicy")
708
+ def default_path_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
709
+ """
710
+ Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
711
+ """
712
+ return pulumi.get(self, "default_path_policy")
713
+
714
+ @_builtins.property
715
+ @pulumi.getter(name="enableSentinelParsing")
716
+ def enable_sentinel_parsing(self) -> pulumi.Output[Optional[_builtins.bool]]:
717
+ """
718
+ If set, parse out fields from the provided CSR making them available for Sentinel policies.
719
+ """
720
+ return pulumi.get(self, "enable_sentinel_parsing")
721
+
722
+ @_builtins.property
723
+ @pulumi.getter
724
+ def enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
725
+ """
726
+ Specifies whether EST is enabled.
727
+ """
728
+ return pulumi.get(self, "enabled")
729
+
730
+ @_builtins.property
731
+ @pulumi.getter(name="labelToPathPolicy")
732
+ def label_to_path_policy(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
733
+ """
734
+ Configures a pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
735
+ """
736
+ return pulumi.get(self, "label_to_path_policy")
737
+
738
+ @_builtins.property
739
+ @pulumi.getter(name="lastUpdated")
740
+ def last_updated(self) -> pulumi.Output[_builtins.str]:
741
+ """
742
+ A read-only timestamp representing the last time the configuration was updated.
743
+ """
744
+ return pulumi.get(self, "last_updated")
745
+
746
+ @_builtins.property
747
+ @pulumi.getter
748
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
749
+ """
750
+ The namespace of the target resource.
751
+ The value should not contain leading or trailing forward slashes.
752
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
753
+ *Available only for Vault Enterprise*.
754
+ """
755
+ return pulumi.get(self, "namespace")
756
+