pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,33 +21,35 @@ __all__ = ['BackendConfigScepArgs', 'BackendConfigScep']
22
21
  @pulumi.input_type
23
22
  class BackendConfigScepArgs:
24
23
  def __init__(__self__, *,
25
- backend: pulumi.Input[builtins.str],
26
- allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
24
+ backend: pulumi.Input[_builtins.str],
25
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
27
  authenticators: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']] = None,
29
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
30
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
28
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
29
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
31
30
  external_validations: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]] = None,
32
- namespace: Optional[pulumi.Input[builtins.str]] = None,
33
- restrict_ca_chain_to_issuer: Optional[pulumi.Input[builtins.bool]] = None):
31
+ log_level: Optional[pulumi.Input[_builtins.str]] = None,
32
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
33
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None):
34
34
  """
35
35
  The set of arguments for constructing a BackendConfigScep resource.
36
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
36
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
37
37
  read the SCEP configuration from, with no leading or trailing `/`s.
38
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
39
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
38
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
39
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
40
40
  :param pulumi.Input['BackendConfigScepAuthenticatorsArgs'] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
41
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
42
- :param pulumi.Input[builtins.bool] enabled: Specifies whether SCEP is enabled.
41
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
42
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
43
43
  :param pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
44
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
45
- The value should not contain leading or trailing forward slashes.
46
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
47
- *Available only for Vault Enterprise*.
48
- :param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
44
+ :param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
49
45
 
50
46
 
51
47
  <a id="nestedatt--authenticators"></a>
48
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
49
+ The value should not contain leading or trailing forward slashes.
50
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
51
+ *Available only for Vault Enterprise*.
52
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
52
53
  """
53
54
  pulumi.set(__self__, "backend", backend)
54
55
  if allowed_digest_algorithms is not None:
@@ -63,14 +64,16 @@ class BackendConfigScepArgs:
63
64
  pulumi.set(__self__, "enabled", enabled)
64
65
  if external_validations is not None:
65
66
  pulumi.set(__self__, "external_validations", external_validations)
67
+ if log_level is not None:
68
+ pulumi.set(__self__, "log_level", log_level)
66
69
  if namespace is not None:
67
70
  pulumi.set(__self__, "namespace", namespace)
68
71
  if restrict_ca_chain_to_issuer is not None:
69
72
  pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
70
73
 
71
- @property
74
+ @_builtins.property
72
75
  @pulumi.getter
73
- def backend(self) -> pulumi.Input[builtins.str]:
76
+ def backend(self) -> pulumi.Input[_builtins.str]:
74
77
  """
75
78
  The path to the PKI secret backend to
76
79
  read the SCEP configuration from, with no leading or trailing `/`s.
@@ -78,34 +81,34 @@ class BackendConfigScepArgs:
78
81
  return pulumi.get(self, "backend")
79
82
 
80
83
  @backend.setter
81
- def backend(self, value: pulumi.Input[builtins.str]):
84
+ def backend(self, value: pulumi.Input[_builtins.str]):
82
85
  pulumi.set(self, "backend", value)
83
86
 
84
- @property
87
+ @_builtins.property
85
88
  @pulumi.getter(name="allowedDigestAlgorithms")
86
- def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
89
+ def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
87
90
  """
88
91
  List of allowed digest algorithms for SCEP requests.
89
92
  """
90
93
  return pulumi.get(self, "allowed_digest_algorithms")
91
94
 
92
95
  @allowed_digest_algorithms.setter
93
- def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
96
+ def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
94
97
  pulumi.set(self, "allowed_digest_algorithms", value)
95
98
 
96
- @property
99
+ @_builtins.property
97
100
  @pulumi.getter(name="allowedEncryptionAlgorithms")
98
- def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
101
+ def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
99
102
  """
100
103
  List of allowed encryption algorithms for SCEP requests.
101
104
  """
102
105
  return pulumi.get(self, "allowed_encryption_algorithms")
103
106
 
104
107
  @allowed_encryption_algorithms.setter
105
- def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
108
+ def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
106
109
  pulumi.set(self, "allowed_encryption_algorithms", value)
107
110
 
108
- @property
111
+ @_builtins.property
109
112
  @pulumi.getter
110
113
  def authenticators(self) -> Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]:
111
114
  """
@@ -117,31 +120,31 @@ class BackendConfigScepArgs:
117
120
  def authenticators(self, value: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]):
118
121
  pulumi.set(self, "authenticators", value)
119
122
 
120
- @property
123
+ @_builtins.property
121
124
  @pulumi.getter(name="defaultPathPolicy")
122
- def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
125
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
123
126
  """
124
127
  Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
125
128
  """
126
129
  return pulumi.get(self, "default_path_policy")
127
130
 
128
131
  @default_path_policy.setter
129
- def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
132
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
130
133
  pulumi.set(self, "default_path_policy", value)
131
134
 
132
- @property
135
+ @_builtins.property
133
136
  @pulumi.getter
134
- def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
137
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
135
138
  """
136
139
  Specifies whether SCEP is enabled.
137
140
  """
138
141
  return pulumi.get(self, "enabled")
139
142
 
140
143
  @enabled.setter
141
- def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
144
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
142
145
  pulumi.set(self, "enabled", value)
143
146
 
144
- @property
147
+ @_builtins.property
145
148
  @pulumi.getter(name="externalValidations")
146
149
  def external_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]:
147
150
  """
@@ -153,9 +156,24 @@ class BackendConfigScepArgs:
153
156
  def external_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]):
154
157
  pulumi.set(self, "external_validations", value)
155
158
 
156
- @property
159
+ @_builtins.property
160
+ @pulumi.getter(name="logLevel")
161
+ def log_level(self) -> Optional[pulumi.Input[_builtins.str]]:
162
+ """
163
+ The level of logging verbosity, affects only SCEP logs on this mount.
164
+
165
+
166
+ <a id="nestedatt--authenticators"></a>
167
+ """
168
+ return pulumi.get(self, "log_level")
169
+
170
+ @log_level.setter
171
+ def log_level(self, value: Optional[pulumi.Input[_builtins.str]]):
172
+ pulumi.set(self, "log_level", value)
173
+
174
+ @_builtins.property
157
175
  @pulumi.getter
158
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
176
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
159
177
  """
160
178
  The namespace of the target resource.
161
179
  The value should not contain leading or trailing forward slashes.
@@ -165,57 +183,56 @@ class BackendConfigScepArgs:
165
183
  return pulumi.get(self, "namespace")
166
184
 
167
185
  @namespace.setter
168
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
186
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
169
187
  pulumi.set(self, "namespace", value)
170
188
 
171
- @property
189
+ @_builtins.property
172
190
  @pulumi.getter(name="restrictCaChainToIssuer")
173
- def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[builtins.bool]]:
191
+ def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[_builtins.bool]]:
174
192
  """
175
193
  If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
176
-
177
-
178
- <a id="nestedatt--authenticators"></a>
179
194
  """
180
195
  return pulumi.get(self, "restrict_ca_chain_to_issuer")
181
196
 
182
197
  @restrict_ca_chain_to_issuer.setter
183
- def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[builtins.bool]]):
198
+ def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[_builtins.bool]]):
184
199
  pulumi.set(self, "restrict_ca_chain_to_issuer", value)
185
200
 
186
201
 
187
202
  @pulumi.input_type
188
203
  class _BackendConfigScepState:
189
204
  def __init__(__self__, *,
190
- allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
191
- allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
205
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
206
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
192
207
  authenticators: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']] = None,
193
- backend: Optional[pulumi.Input[builtins.str]] = None,
194
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
195
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
208
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
209
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
210
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
196
211
  external_validations: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]] = None,
197
- last_updated: Optional[pulumi.Input[builtins.str]] = None,
198
- namespace: Optional[pulumi.Input[builtins.str]] = None,
199
- restrict_ca_chain_to_issuer: Optional[pulumi.Input[builtins.bool]] = None):
212
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
213
+ log_level: Optional[pulumi.Input[_builtins.str]] = None,
214
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
215
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None):
200
216
  """
201
217
  Input properties used for looking up and filtering BackendConfigScep resources.
202
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
203
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
218
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
219
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
204
220
  :param pulumi.Input['BackendConfigScepAuthenticatorsArgs'] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
205
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
221
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
206
222
  read the SCEP configuration from, with no leading or trailing `/`s.
207
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
208
- :param pulumi.Input[builtins.bool] enabled: Specifies whether SCEP is enabled.
223
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
224
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
209
225
  :param pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
210
- :param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
211
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
212
- The value should not contain leading or trailing forward slashes.
213
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
214
- *Available only for Vault Enterprise*.
215
- :param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
226
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
227
+ :param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
216
228
 
217
229
 
218
230
  <a id="nestedatt--authenticators"></a>
231
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
232
+ The value should not contain leading or trailing forward slashes.
233
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
234
+ *Available only for Vault Enterprise*.
235
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
219
236
  """
220
237
  if allowed_digest_algorithms is not None:
221
238
  pulumi.set(__self__, "allowed_digest_algorithms", allowed_digest_algorithms)
@@ -233,36 +250,38 @@ class _BackendConfigScepState:
233
250
  pulumi.set(__self__, "external_validations", external_validations)
234
251
  if last_updated is not None:
235
252
  pulumi.set(__self__, "last_updated", last_updated)
253
+ if log_level is not None:
254
+ pulumi.set(__self__, "log_level", log_level)
236
255
  if namespace is not None:
237
256
  pulumi.set(__self__, "namespace", namespace)
238
257
  if restrict_ca_chain_to_issuer is not None:
239
258
  pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
240
259
 
241
- @property
260
+ @_builtins.property
242
261
  @pulumi.getter(name="allowedDigestAlgorithms")
243
- def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
262
+ def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
244
263
  """
245
264
  List of allowed digest algorithms for SCEP requests.
246
265
  """
247
266
  return pulumi.get(self, "allowed_digest_algorithms")
248
267
 
249
268
  @allowed_digest_algorithms.setter
250
- def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
269
+ def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
251
270
  pulumi.set(self, "allowed_digest_algorithms", value)
252
271
 
253
- @property
272
+ @_builtins.property
254
273
  @pulumi.getter(name="allowedEncryptionAlgorithms")
255
- def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
274
+ def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
256
275
  """
257
276
  List of allowed encryption algorithms for SCEP requests.
258
277
  """
259
278
  return pulumi.get(self, "allowed_encryption_algorithms")
260
279
 
261
280
  @allowed_encryption_algorithms.setter
262
- def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
281
+ def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
263
282
  pulumi.set(self, "allowed_encryption_algorithms", value)
264
283
 
265
- @property
284
+ @_builtins.property
266
285
  @pulumi.getter
267
286
  def authenticators(self) -> Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]:
268
287
  """
@@ -274,9 +293,9 @@ class _BackendConfigScepState:
274
293
  def authenticators(self, value: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]):
275
294
  pulumi.set(self, "authenticators", value)
276
295
 
277
- @property
296
+ @_builtins.property
278
297
  @pulumi.getter
279
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
298
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
280
299
  """
281
300
  The path to the PKI secret backend to
282
301
  read the SCEP configuration from, with no leading or trailing `/`s.
@@ -284,34 +303,34 @@ class _BackendConfigScepState:
284
303
  return pulumi.get(self, "backend")
285
304
 
286
305
  @backend.setter
287
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
306
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
288
307
  pulumi.set(self, "backend", value)
289
308
 
290
- @property
309
+ @_builtins.property
291
310
  @pulumi.getter(name="defaultPathPolicy")
292
- def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
311
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
293
312
  """
294
313
  Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
295
314
  """
296
315
  return pulumi.get(self, "default_path_policy")
297
316
 
298
317
  @default_path_policy.setter
299
- def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
318
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
300
319
  pulumi.set(self, "default_path_policy", value)
301
320
 
302
- @property
321
+ @_builtins.property
303
322
  @pulumi.getter
304
- def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
323
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
305
324
  """
306
325
  Specifies whether SCEP is enabled.
307
326
  """
308
327
  return pulumi.get(self, "enabled")
309
328
 
310
329
  @enabled.setter
311
- def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
330
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
312
331
  pulumi.set(self, "enabled", value)
313
332
 
314
- @property
333
+ @_builtins.property
315
334
  @pulumi.getter(name="externalValidations")
316
335
  def external_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]:
317
336
  """
@@ -323,21 +342,36 @@ class _BackendConfigScepState:
323
342
  def external_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]):
324
343
  pulumi.set(self, "external_validations", value)
325
344
 
326
- @property
345
+ @_builtins.property
327
346
  @pulumi.getter(name="lastUpdated")
328
- def last_updated(self) -> Optional[pulumi.Input[builtins.str]]:
347
+ def last_updated(self) -> Optional[pulumi.Input[_builtins.str]]:
329
348
  """
330
349
  A read-only timestamp representing the last time the configuration was updated.
331
350
  """
332
351
  return pulumi.get(self, "last_updated")
333
352
 
334
353
  @last_updated.setter
335
- def last_updated(self, value: Optional[pulumi.Input[builtins.str]]):
354
+ def last_updated(self, value: Optional[pulumi.Input[_builtins.str]]):
336
355
  pulumi.set(self, "last_updated", value)
337
356
 
338
- @property
357
+ @_builtins.property
358
+ @pulumi.getter(name="logLevel")
359
+ def log_level(self) -> Optional[pulumi.Input[_builtins.str]]:
360
+ """
361
+ The level of logging verbosity, affects only SCEP logs on this mount.
362
+
363
+
364
+ <a id="nestedatt--authenticators"></a>
365
+ """
366
+ return pulumi.get(self, "log_level")
367
+
368
+ @log_level.setter
369
+ def log_level(self, value: Optional[pulumi.Input[_builtins.str]]):
370
+ pulumi.set(self, "log_level", value)
371
+
372
+ @_builtins.property
339
373
  @pulumi.getter
340
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
374
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
341
375
  """
342
376
  The namespace of the target resource.
343
377
  The value should not contain leading or trailing forward slashes.
@@ -347,22 +381,19 @@ class _BackendConfigScepState:
347
381
  return pulumi.get(self, "namespace")
348
382
 
349
383
  @namespace.setter
350
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
384
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
351
385
  pulumi.set(self, "namespace", value)
352
386
 
353
- @property
387
+ @_builtins.property
354
388
  @pulumi.getter(name="restrictCaChainToIssuer")
355
- def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[builtins.bool]]:
389
+ def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[_builtins.bool]]:
356
390
  """
357
391
  If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
358
-
359
-
360
- <a id="nestedatt--authenticators"></a>
361
392
  """
362
393
  return pulumi.get(self, "restrict_ca_chain_to_issuer")
363
394
 
364
395
  @restrict_ca_chain_to_issuer.setter
365
- def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[builtins.bool]]):
396
+ def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[_builtins.bool]]):
366
397
  pulumi.set(self, "restrict_ca_chain_to_issuer", value)
367
398
 
368
399
 
@@ -372,15 +403,16 @@ class BackendConfigScep(pulumi.CustomResource):
372
403
  def __init__(__self__,
373
404
  resource_name: str,
374
405
  opts: Optional[pulumi.ResourceOptions] = None,
375
- allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
376
- allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
406
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
407
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
377
408
  authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
378
- backend: Optional[pulumi.Input[builtins.str]] = None,
379
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
380
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
409
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
410
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
411
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
381
412
  external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
382
- namespace: Optional[pulumi.Input[builtins.str]] = None,
383
- restrict_ca_chain_to_issuer: Optional[pulumi.Input[builtins.bool]] = None,
413
+ log_level: Optional[pulumi.Input[_builtins.str]] = None,
414
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
415
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None,
384
416
  __props__=None):
385
417
  """
386
418
  Allows setting the SCEP configuration on a PKI Secret Backend.
@@ -404,7 +436,7 @@ class BackendConfigScep(pulumi.CustomResource):
404
436
  path="pki_scep",
405
437
  type="pki",
406
438
  description="PKI secret engine mount")
407
- test = vault.pki_secret.BackendConfigScep("test",
439
+ test = vault.pkisecret.BackendConfigScep("test",
408
440
  backend=pki.path,
409
441
  enabled=True,
410
442
  default_path_policy="sign-verbatim",
@@ -429,22 +461,23 @@ class BackendConfigScep(pulumi.CustomResource):
429
461
 
430
462
  :param str resource_name: The name of the resource.
431
463
  :param pulumi.ResourceOptions opts: Options for the resource.
432
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
433
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
464
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
465
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
434
466
  :param pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
435
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
467
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
436
468
  read the SCEP configuration from, with no leading or trailing `/`s.
437
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
438
- :param pulumi.Input[builtins.bool] enabled: Specifies whether SCEP is enabled.
469
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
470
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
439
471
  :param pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
440
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
441
- The value should not contain leading or trailing forward slashes.
442
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
443
- *Available only for Vault Enterprise*.
444
- :param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
472
+ :param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
445
473
 
446
474
 
447
475
  <a id="nestedatt--authenticators"></a>
476
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
477
+ The value should not contain leading or trailing forward slashes.
478
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
479
+ *Available only for Vault Enterprise*.
480
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
448
481
  """
449
482
  ...
450
483
  @overload
@@ -474,7 +507,7 @@ class BackendConfigScep(pulumi.CustomResource):
474
507
  path="pki_scep",
475
508
  type="pki",
476
509
  description="PKI secret engine mount")
477
- test = vault.pki_secret.BackendConfigScep("test",
510
+ test = vault.pkisecret.BackendConfigScep("test",
478
511
  backend=pki.path,
479
512
  enabled=True,
480
513
  default_path_policy="sign-verbatim",
@@ -512,15 +545,16 @@ class BackendConfigScep(pulumi.CustomResource):
512
545
  def _internal_init(__self__,
513
546
  resource_name: str,
514
547
  opts: Optional[pulumi.ResourceOptions] = None,
515
- allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
516
- allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
548
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
549
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
517
550
  authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
518
- backend: Optional[pulumi.Input[builtins.str]] = None,
519
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
520
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
551
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
552
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
553
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
521
554
  external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
522
- namespace: Optional[pulumi.Input[builtins.str]] = None,
523
- restrict_ca_chain_to_issuer: Optional[pulumi.Input[builtins.bool]] = None,
555
+ log_level: Optional[pulumi.Input[_builtins.str]] = None,
556
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
557
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None,
524
558
  __props__=None):
525
559
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
526
560
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -539,6 +573,7 @@ class BackendConfigScep(pulumi.CustomResource):
539
573
  __props__.__dict__["default_path_policy"] = default_path_policy
540
574
  __props__.__dict__["enabled"] = enabled
541
575
  __props__.__dict__["external_validations"] = external_validations
576
+ __props__.__dict__["log_level"] = log_level
542
577
  __props__.__dict__["namespace"] = namespace
543
578
  __props__.__dict__["restrict_ca_chain_to_issuer"] = restrict_ca_chain_to_issuer
544
579
  __props__.__dict__["last_updated"] = None
@@ -552,16 +587,17 @@ class BackendConfigScep(pulumi.CustomResource):
552
587
  def get(resource_name: str,
553
588
  id: pulumi.Input[str],
554
589
  opts: Optional[pulumi.ResourceOptions] = None,
555
- allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
556
- allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
590
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
591
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
557
592
  authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
558
- backend: Optional[pulumi.Input[builtins.str]] = None,
559
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
560
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
593
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
594
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
595
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
561
596
  external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
562
- last_updated: Optional[pulumi.Input[builtins.str]] = None,
563
- namespace: Optional[pulumi.Input[builtins.str]] = None,
564
- restrict_ca_chain_to_issuer: Optional[pulumi.Input[builtins.bool]] = None) -> 'BackendConfigScep':
597
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
598
+ log_level: Optional[pulumi.Input[_builtins.str]] = None,
599
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
600
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None) -> 'BackendConfigScep':
565
601
  """
566
602
  Get an existing BackendConfigScep resource's state with the given name, id, and optional extra
567
603
  properties used to qualify the lookup.
@@ -569,23 +605,24 @@ class BackendConfigScep(pulumi.CustomResource):
569
605
  :param str resource_name: The unique name of the resulting resource.
570
606
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
571
607
  :param pulumi.ResourceOptions opts: Options for the resource.
572
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
573
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
608
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
609
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
574
610
  :param pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
575
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
611
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
576
612
  read the SCEP configuration from, with no leading or trailing `/`s.
577
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
578
- :param pulumi.Input[builtins.bool] enabled: Specifies whether SCEP is enabled.
613
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
614
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
579
615
  :param pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
580
- :param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
581
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
582
- The value should not contain leading or trailing forward slashes.
583
- The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
584
- *Available only for Vault Enterprise*.
585
- :param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
616
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
617
+ :param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
586
618
 
587
619
 
588
620
  <a id="nestedatt--authenticators"></a>
621
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
622
+ The value should not contain leading or trailing forward slashes.
623
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
624
+ *Available only for Vault Enterprise*.
625
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
589
626
  """
590
627
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
591
628
 
@@ -599,27 +636,28 @@ class BackendConfigScep(pulumi.CustomResource):
599
636
  __props__.__dict__["enabled"] = enabled
600
637
  __props__.__dict__["external_validations"] = external_validations
601
638
  __props__.__dict__["last_updated"] = last_updated
639
+ __props__.__dict__["log_level"] = log_level
602
640
  __props__.__dict__["namespace"] = namespace
603
641
  __props__.__dict__["restrict_ca_chain_to_issuer"] = restrict_ca_chain_to_issuer
604
642
  return BackendConfigScep(resource_name, opts=opts, __props__=__props__)
605
643
 
606
- @property
644
+ @_builtins.property
607
645
  @pulumi.getter(name="allowedDigestAlgorithms")
608
- def allowed_digest_algorithms(self) -> pulumi.Output[Sequence[builtins.str]]:
646
+ def allowed_digest_algorithms(self) -> pulumi.Output[Sequence[_builtins.str]]:
609
647
  """
610
648
  List of allowed digest algorithms for SCEP requests.
611
649
  """
612
650
  return pulumi.get(self, "allowed_digest_algorithms")
613
651
 
614
- @property
652
+ @_builtins.property
615
653
  @pulumi.getter(name="allowedEncryptionAlgorithms")
616
- def allowed_encryption_algorithms(self) -> pulumi.Output[Sequence[builtins.str]]:
654
+ def allowed_encryption_algorithms(self) -> pulumi.Output[Sequence[_builtins.str]]:
617
655
  """
618
656
  List of allowed encryption algorithms for SCEP requests.
619
657
  """
620
658
  return pulumi.get(self, "allowed_encryption_algorithms")
621
659
 
622
- @property
660
+ @_builtins.property
623
661
  @pulumi.getter
624
662
  def authenticators(self) -> pulumi.Output['outputs.BackendConfigScepAuthenticators']:
625
663
  """
@@ -627,32 +665,32 @@ class BackendConfigScep(pulumi.CustomResource):
627
665
  """
628
666
  return pulumi.get(self, "authenticators")
629
667
 
630
- @property
668
+ @_builtins.property
631
669
  @pulumi.getter
632
- def backend(self) -> pulumi.Output[builtins.str]:
670
+ def backend(self) -> pulumi.Output[_builtins.str]:
633
671
  """
634
672
  The path to the PKI secret backend to
635
673
  read the SCEP configuration from, with no leading or trailing `/`s.
636
674
  """
637
675
  return pulumi.get(self, "backend")
638
676
 
639
- @property
677
+ @_builtins.property
640
678
  @pulumi.getter(name="defaultPathPolicy")
641
- def default_path_policy(self) -> pulumi.Output[Optional[builtins.str]]:
679
+ def default_path_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
642
680
  """
643
681
  Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
644
682
  """
645
683
  return pulumi.get(self, "default_path_policy")
646
684
 
647
- @property
685
+ @_builtins.property
648
686
  @pulumi.getter
649
- def enabled(self) -> pulumi.Output[Optional[builtins.bool]]:
687
+ def enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
650
688
  """
651
689
  Specifies whether SCEP is enabled.
652
690
  """
653
691
  return pulumi.get(self, "enabled")
654
692
 
655
- @property
693
+ @_builtins.property
656
694
  @pulumi.getter(name="externalValidations")
657
695
  def external_validations(self) -> pulumi.Output[Sequence['outputs.BackendConfigScepExternalValidation']]:
658
696
  """
@@ -660,17 +698,28 @@ class BackendConfigScep(pulumi.CustomResource):
660
698
  """
661
699
  return pulumi.get(self, "external_validations")
662
700
 
663
- @property
701
+ @_builtins.property
664
702
  @pulumi.getter(name="lastUpdated")
665
- def last_updated(self) -> pulumi.Output[builtins.str]:
703
+ def last_updated(self) -> pulumi.Output[_builtins.str]:
666
704
  """
667
705
  A read-only timestamp representing the last time the configuration was updated.
668
706
  """
669
707
  return pulumi.get(self, "last_updated")
670
708
 
671
- @property
709
+ @_builtins.property
710
+ @pulumi.getter(name="logLevel")
711
+ def log_level(self) -> pulumi.Output[_builtins.str]:
712
+ """
713
+ The level of logging verbosity, affects only SCEP logs on this mount.
714
+
715
+
716
+ <a id="nestedatt--authenticators"></a>
717
+ """
718
+ return pulumi.get(self, "log_level")
719
+
720
+ @_builtins.property
672
721
  @pulumi.getter
673
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
722
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
674
723
  """
675
724
  The namespace of the target resource.
676
725
  The value should not contain leading or trailing forward slashes.
@@ -679,14 +728,11 @@ class BackendConfigScep(pulumi.CustomResource):
679
728
  """
680
729
  return pulumi.get(self, "namespace")
681
730
 
682
- @property
731
+ @_builtins.property
683
732
  @pulumi.getter(name="restrictCaChainToIssuer")
684
- def restrict_ca_chain_to_issuer(self) -> pulumi.Output[Optional[builtins.bool]]:
733
+ def restrict_ca_chain_to_issuer(self) -> pulumi.Output[Optional[_builtins.bool]]:
685
734
  """
686
735
  If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
687
-
688
-
689
- <a id="nestedatt--authenticators"></a>
690
736
  """
691
737
  return pulumi.get(self, "restrict_ca_chain_to_issuer")
692
738