HashiCorp Vault v6.7.1 published on Friday, May 2, 2025 by Pulumi
vault.pkiSecret.getBackendConfigCmpv2
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const pki = new vault.Mount("pki", {
    path: "pki",
    type: "pki",
    description: "PKI secret engine mount",
});
const cmpv2Config = vault.pkiSecret.getBackendConfigCmpv2Output({
    backend: pki.path,
});
import pulumi
import pulumi_vault as vault
pki = vault.Mount("pki",
    path="pki",
    type="pki",
    description="PKI secret engine mount")
cmpv2_config = vault.pkiSecret.get_backend_config_cmpv2_output(backend=pki.path)
package main
import (
	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkisecret"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		pki, err := vault.NewMount(ctx, "pki", &vault.MountArgs{
			Path:        pulumi.String("pki"),
			Type:        pulumi.String("pki"),
			Description: pulumi.String("PKI secret engine mount"),
		})
		if err != nil {
			return err
		}
		_ = pkisecret.GetBackendConfigCmpv2Output(ctx, pkisecret.GetBackendConfigCmpv2OutputArgs{
			Backend: pki.Path,
		}, nil)
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() => 
{
    var pki = new Vault.Mount("pki", new()
    {
        Path = "pki",
        Type = "pki",
        Description = "PKI secret engine mount",
    });
    var cmpv2Config = Vault.PkiSecret.GetBackendConfigCmpv2.Invoke(new()
    {
        Backend = pki.Path,
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.Mount;
import com.pulumi.vault.MountArgs;
import com.pulumi.vault.pkiSecret.PkiSecretFunctions;
import com.pulumi.vault.pkiSecret.inputs.GetBackendConfigCmpv2Args;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var pki = new Mount("pki", MountArgs.builder()
            .path("pki")
            .type("pki")
            .description("PKI secret engine mount")
            .build());
        final var cmpv2Config = PkiSecretFunctions.getBackendConfigCmpv2(GetBackendConfigCmpv2Args.builder()
            .backend(pki.path())
            .build());
    }
}
resources:
  pki:
    type: vault:Mount
    properties:
      path: pki
      type: pki
      description: PKI secret engine mount
variables:
  cmpv2Config:
    fn::invoke:
      function: vault:pkiSecret:getBackendConfigCmpv2
      arguments:
        backend: ${pki.path}
Using getBackendConfigCmpv2
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getBackendConfigCmpv2(args: GetBackendConfigCmpv2Args, opts?: InvokeOptions): Promise<GetBackendConfigCmpv2Result>
function getBackendConfigCmpv2Output(args: GetBackendConfigCmpv2OutputArgs, opts?: InvokeOptions): Output<GetBackendConfigCmpv2Result>def get_backend_config_cmpv2(backend: Optional[str] = None,
                             disabled_validations: Optional[Sequence[str]] = None,
                             namespace: Optional[str] = None,
                             opts: Optional[InvokeOptions] = None) -> GetBackendConfigCmpv2Result
def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[str]] = None,
                             disabled_validations: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
                             namespace: Optional[pulumi.Input[str]] = None,
                             opts: Optional[InvokeOptions] = None) -> Output[GetBackendConfigCmpv2Result]func LookupBackendConfigCmpv2(ctx *Context, args *LookupBackendConfigCmpv2Args, opts ...InvokeOption) (*LookupBackendConfigCmpv2Result, error)
func LookupBackendConfigCmpv2Output(ctx *Context, args *LookupBackendConfigCmpv2OutputArgs, opts ...InvokeOption) LookupBackendConfigCmpv2ResultOutput> Note: This function is named LookupBackendConfigCmpv2 in the Go SDK.
public static class GetBackendConfigCmpv2 
{
    public static Task<GetBackendConfigCmpv2Result> InvokeAsync(GetBackendConfigCmpv2Args args, InvokeOptions? opts = null)
    public static Output<GetBackendConfigCmpv2Result> Invoke(GetBackendConfigCmpv2InvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetBackendConfigCmpv2Result> getBackendConfigCmpv2(GetBackendConfigCmpv2Args args, InvokeOptions options)
public static Output<GetBackendConfigCmpv2Result> getBackendConfigCmpv2(GetBackendConfigCmpv2Args args, InvokeOptions options)
fn::invoke:
  function: vault:pkiSecret/getBackendConfigCmpv2:getBackendConfigCmpv2
  arguments:
    # arguments dictionaryThe following arguments are supported:
- Backend string
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing /s.Attributes Reference
- DisabledValidations List<string>
- A comma-separated list of validations not to perform on CMPv2 messages.
- Namespace string
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Backend string
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing /s.Attributes Reference
- DisabledValidations []string
- A comma-separated list of validations not to perform on CMPv2 messages.
- Namespace string
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend String
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing /s.Attributes Reference
- disabledValidations List<String>
- A comma-separated list of validations not to perform on CMPv2 messages.
- namespace String
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend string
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing /s.Attributes Reference
- disabledValidations string[]
- A comma-separated list of validations not to perform on CMPv2 messages.
- namespace string
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend str
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing /s.Attributes Reference
- disabled_validations Sequence[str]
- A comma-separated list of validations not to perform on CMPv2 messages.
- namespace str
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend String
- The path to the PKI secret backend to
read the CMPv2 configuration from, with no leading or trailing /s.Attributes Reference
- disabledValidations List<String>
- A comma-separated list of validations not to perform on CMPv2 messages.
- namespace String
- The namespace of the target resource.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
getBackendConfigCmpv2 Result
The following output properties are available:
- AuditFields List<string>
- Authenticators
List<GetBackend Config Cmpv2Authenticator> 
- Backend string
- DefaultPath stringPolicy 
- EnableSentinel boolParsing 
- Enabled bool
- Id string
- The provider-assigned unique ID for this managed resource.
- LastUpdated string
- DisabledValidations List<string>
- Namespace string
- AuditFields []string
- Authenticators
[]GetBackend Config Cmpv2Authenticator 
- Backend string
- DefaultPath stringPolicy 
- EnableSentinel boolParsing 
- Enabled bool
- Id string
- The provider-assigned unique ID for this managed resource.
- LastUpdated string
- DisabledValidations []string
- Namespace string
- auditFields List<String>
- authenticators
List<GetBackend Config Cmpv2Authenticator> 
- backend String
- defaultPath StringPolicy 
- enableSentinel BooleanParsing 
- enabled Boolean
- id String
- The provider-assigned unique ID for this managed resource.
- lastUpdated String
- disabledValidations List<String>
- namespace String
- auditFields string[]
- authenticators
GetBackend Config Cmpv2Authenticator[] 
- backend string
- defaultPath stringPolicy 
- enableSentinel booleanParsing 
- enabled boolean
- id string
- The provider-assigned unique ID for this managed resource.
- lastUpdated string
- disabledValidations string[]
- namespace string
- audit_fields Sequence[str]
- authenticators
Sequence[GetBackend Config Cmpv2Authenticator] 
- backend str
- default_path_ strpolicy 
- enable_sentinel_ boolparsing 
- enabled bool
- id str
- The provider-assigned unique ID for this managed resource.
- last_updated str
- disabled_validations Sequence[str]
- namespace str
- auditFields List<String>
- authenticators List<Property Map>
- backend String
- defaultPath StringPolicy 
- enableSentinel BooleanParsing 
- enabled Boolean
- id String
- The provider-assigned unique ID for this managed resource.
- lastUpdated String
- disabledValidations List<String>
- namespace String
Supporting Types
GetBackendConfigCmpv2Authenticator   
- Cert Dictionary<string, string>
- The accessor and cert_role properties for cert auth backends
- Cert map[string]string
- The accessor and cert_role properties for cert auth backends
- cert Map<String,String>
- The accessor and cert_role properties for cert auth backends
- cert {[key: string]: string}
- The accessor and cert_role properties for cert auth backends
- cert Mapping[str, str]
- The accessor and cert_role properties for cert auth backends
- cert Map<String>
- The accessor and cert_role properties for cert auth backends
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the vaultTerraform Provider.