pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,30 +21,30 @@ __all__ = ['BackendConfigScepArgs', 'BackendConfigScep']
22
21
  @pulumi.input_type
23
22
  class BackendConfigScepArgs:
24
23
  def __init__(__self__, *,
25
- backend: pulumi.Input[builtins.str],
26
- allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
24
+ backend: pulumi.Input[_builtins.str],
25
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
27
  authenticators: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']] = None,
29
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
30
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
28
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
29
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
31
30
  external_validations: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]] = None,
32
- namespace: Optional[pulumi.Input[builtins.str]] = None,
33
- restrict_ca_chain_to_issuer: Optional[pulumi.Input[builtins.bool]] = None):
31
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
32
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None):
34
33
  """
35
34
  The set of arguments for constructing a BackendConfigScep resource.
36
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
35
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
37
36
  read the SCEP configuration from, with no leading or trailing `/`s.
38
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
39
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
37
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
38
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
40
39
  :param pulumi.Input['BackendConfigScepAuthenticatorsArgs'] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
41
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
42
- :param pulumi.Input[builtins.bool] enabled: Specifies whether SCEP is enabled.
40
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
41
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
43
42
  :param pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
44
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
43
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
45
44
  The value should not contain leading or trailing forward slashes.
46
45
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
47
46
  *Available only for Vault Enterprise*.
48
- :param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
47
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
49
48
 
50
49
 
51
50
  <a id="nestedatt--authenticators"></a>
@@ -68,9 +67,9 @@ class BackendConfigScepArgs:
68
67
  if restrict_ca_chain_to_issuer is not None:
69
68
  pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter
73
- def backend(self) -> pulumi.Input[builtins.str]:
72
+ def backend(self) -> pulumi.Input[_builtins.str]:
74
73
  """
75
74
  The path to the PKI secret backend to
76
75
  read the SCEP configuration from, with no leading or trailing `/`s.
@@ -78,34 +77,34 @@ class BackendConfigScepArgs:
78
77
  return pulumi.get(self, "backend")
79
78
 
80
79
  @backend.setter
81
- def backend(self, value: pulumi.Input[builtins.str]):
80
+ def backend(self, value: pulumi.Input[_builtins.str]):
82
81
  pulumi.set(self, "backend", value)
83
82
 
84
- @property
83
+ @_builtins.property
85
84
  @pulumi.getter(name="allowedDigestAlgorithms")
86
- def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
85
+ def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
87
86
  """
88
87
  List of allowed digest algorithms for SCEP requests.
89
88
  """
90
89
  return pulumi.get(self, "allowed_digest_algorithms")
91
90
 
92
91
  @allowed_digest_algorithms.setter
93
- def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
92
+ def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
94
93
  pulumi.set(self, "allowed_digest_algorithms", value)
95
94
 
96
- @property
95
+ @_builtins.property
97
96
  @pulumi.getter(name="allowedEncryptionAlgorithms")
98
- def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
97
+ def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
99
98
  """
100
99
  List of allowed encryption algorithms for SCEP requests.
101
100
  """
102
101
  return pulumi.get(self, "allowed_encryption_algorithms")
103
102
 
104
103
  @allowed_encryption_algorithms.setter
105
- def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
104
+ def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
106
105
  pulumi.set(self, "allowed_encryption_algorithms", value)
107
106
 
108
- @property
107
+ @_builtins.property
109
108
  @pulumi.getter
110
109
  def authenticators(self) -> Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]:
111
110
  """
@@ -117,31 +116,31 @@ class BackendConfigScepArgs:
117
116
  def authenticators(self, value: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]):
118
117
  pulumi.set(self, "authenticators", value)
119
118
 
120
- @property
119
+ @_builtins.property
121
120
  @pulumi.getter(name="defaultPathPolicy")
122
- def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
121
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
123
122
  """
124
123
  Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
125
124
  """
126
125
  return pulumi.get(self, "default_path_policy")
127
126
 
128
127
  @default_path_policy.setter
129
- def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
128
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
130
129
  pulumi.set(self, "default_path_policy", value)
131
130
 
132
- @property
131
+ @_builtins.property
133
132
  @pulumi.getter
134
- def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
133
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
135
134
  """
136
135
  Specifies whether SCEP is enabled.
137
136
  """
138
137
  return pulumi.get(self, "enabled")
139
138
 
140
139
  @enabled.setter
141
- def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
140
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
142
141
  pulumi.set(self, "enabled", value)
143
142
 
144
- @property
143
+ @_builtins.property
145
144
  @pulumi.getter(name="externalValidations")
146
145
  def external_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]:
147
146
  """
@@ -153,9 +152,9 @@ class BackendConfigScepArgs:
153
152
  def external_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]):
154
153
  pulumi.set(self, "external_validations", value)
155
154
 
156
- @property
155
+ @_builtins.property
157
156
  @pulumi.getter
158
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
157
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
159
158
  """
160
159
  The namespace of the target resource.
161
160
  The value should not contain leading or trailing forward slashes.
@@ -165,12 +164,12 @@ class BackendConfigScepArgs:
165
164
  return pulumi.get(self, "namespace")
166
165
 
167
166
  @namespace.setter
168
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
167
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
169
168
  pulumi.set(self, "namespace", value)
170
169
 
171
- @property
170
+ @_builtins.property
172
171
  @pulumi.getter(name="restrictCaChainToIssuer")
173
- def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[builtins.bool]]:
172
+ def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[_builtins.bool]]:
174
173
  """
175
174
  If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
176
175
 
@@ -180,39 +179,39 @@ class BackendConfigScepArgs:
180
179
  return pulumi.get(self, "restrict_ca_chain_to_issuer")
181
180
 
182
181
  @restrict_ca_chain_to_issuer.setter
183
- def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[builtins.bool]]):
182
+ def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[_builtins.bool]]):
184
183
  pulumi.set(self, "restrict_ca_chain_to_issuer", value)
185
184
 
186
185
 
187
186
  @pulumi.input_type
188
187
  class _BackendConfigScepState:
189
188
  def __init__(__self__, *,
190
- allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
191
- allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
189
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
190
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
192
191
  authenticators: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']] = None,
193
- backend: Optional[pulumi.Input[builtins.str]] = None,
194
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
195
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
192
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
193
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
194
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
196
195
  external_validations: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]] = None,
197
- last_updated: Optional[pulumi.Input[builtins.str]] = None,
198
- namespace: Optional[pulumi.Input[builtins.str]] = None,
199
- restrict_ca_chain_to_issuer: Optional[pulumi.Input[builtins.bool]] = None):
196
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
197
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
198
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None):
200
199
  """
201
200
  Input properties used for looking up and filtering BackendConfigScep resources.
202
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
203
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
201
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
202
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
204
203
  :param pulumi.Input['BackendConfigScepAuthenticatorsArgs'] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
205
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
204
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
206
205
  read the SCEP configuration from, with no leading or trailing `/`s.
207
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
208
- :param pulumi.Input[builtins.bool] enabled: Specifies whether SCEP is enabled.
206
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
207
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
209
208
  :param pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
210
- :param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
211
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
209
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
210
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
212
211
  The value should not contain leading or trailing forward slashes.
213
212
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
214
213
  *Available only for Vault Enterprise*.
215
- :param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
214
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
216
215
 
217
216
 
218
217
  <a id="nestedatt--authenticators"></a>
@@ -238,31 +237,31 @@ class _BackendConfigScepState:
238
237
  if restrict_ca_chain_to_issuer is not None:
239
238
  pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
240
239
 
241
- @property
240
+ @_builtins.property
242
241
  @pulumi.getter(name="allowedDigestAlgorithms")
243
- def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
242
+ def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
244
243
  """
245
244
  List of allowed digest algorithms for SCEP requests.
246
245
  """
247
246
  return pulumi.get(self, "allowed_digest_algorithms")
248
247
 
249
248
  @allowed_digest_algorithms.setter
250
- def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
249
+ def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
251
250
  pulumi.set(self, "allowed_digest_algorithms", value)
252
251
 
253
- @property
252
+ @_builtins.property
254
253
  @pulumi.getter(name="allowedEncryptionAlgorithms")
255
- def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
254
+ def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
256
255
  """
257
256
  List of allowed encryption algorithms for SCEP requests.
258
257
  """
259
258
  return pulumi.get(self, "allowed_encryption_algorithms")
260
259
 
261
260
  @allowed_encryption_algorithms.setter
262
- def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
261
+ def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
263
262
  pulumi.set(self, "allowed_encryption_algorithms", value)
264
263
 
265
- @property
264
+ @_builtins.property
266
265
  @pulumi.getter
267
266
  def authenticators(self) -> Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]:
268
267
  """
@@ -274,9 +273,9 @@ class _BackendConfigScepState:
274
273
  def authenticators(self, value: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]):
275
274
  pulumi.set(self, "authenticators", value)
276
275
 
277
- @property
276
+ @_builtins.property
278
277
  @pulumi.getter
279
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
278
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
280
279
  """
281
280
  The path to the PKI secret backend to
282
281
  read the SCEP configuration from, with no leading or trailing `/`s.
@@ -284,34 +283,34 @@ class _BackendConfigScepState:
284
283
  return pulumi.get(self, "backend")
285
284
 
286
285
  @backend.setter
287
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
286
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
288
287
  pulumi.set(self, "backend", value)
289
288
 
290
- @property
289
+ @_builtins.property
291
290
  @pulumi.getter(name="defaultPathPolicy")
292
- def default_path_policy(self) -> Optional[pulumi.Input[builtins.str]]:
291
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
293
292
  """
294
293
  Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
295
294
  """
296
295
  return pulumi.get(self, "default_path_policy")
297
296
 
298
297
  @default_path_policy.setter
299
- def default_path_policy(self, value: Optional[pulumi.Input[builtins.str]]):
298
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
300
299
  pulumi.set(self, "default_path_policy", value)
301
300
 
302
- @property
301
+ @_builtins.property
303
302
  @pulumi.getter
304
- def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
303
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
305
304
  """
306
305
  Specifies whether SCEP is enabled.
307
306
  """
308
307
  return pulumi.get(self, "enabled")
309
308
 
310
309
  @enabled.setter
311
- def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
310
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
312
311
  pulumi.set(self, "enabled", value)
313
312
 
314
- @property
313
+ @_builtins.property
315
314
  @pulumi.getter(name="externalValidations")
316
315
  def external_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]:
317
316
  """
@@ -323,21 +322,21 @@ class _BackendConfigScepState:
323
322
  def external_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]):
324
323
  pulumi.set(self, "external_validations", value)
325
324
 
326
- @property
325
+ @_builtins.property
327
326
  @pulumi.getter(name="lastUpdated")
328
- def last_updated(self) -> Optional[pulumi.Input[builtins.str]]:
327
+ def last_updated(self) -> Optional[pulumi.Input[_builtins.str]]:
329
328
  """
330
329
  A read-only timestamp representing the last time the configuration was updated.
331
330
  """
332
331
  return pulumi.get(self, "last_updated")
333
332
 
334
333
  @last_updated.setter
335
- def last_updated(self, value: Optional[pulumi.Input[builtins.str]]):
334
+ def last_updated(self, value: Optional[pulumi.Input[_builtins.str]]):
336
335
  pulumi.set(self, "last_updated", value)
337
336
 
338
- @property
337
+ @_builtins.property
339
338
  @pulumi.getter
340
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
339
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
341
340
  """
342
341
  The namespace of the target resource.
343
342
  The value should not contain leading or trailing forward slashes.
@@ -347,12 +346,12 @@ class _BackendConfigScepState:
347
346
  return pulumi.get(self, "namespace")
348
347
 
349
348
  @namespace.setter
350
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
349
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
351
350
  pulumi.set(self, "namespace", value)
352
351
 
353
- @property
352
+ @_builtins.property
354
353
  @pulumi.getter(name="restrictCaChainToIssuer")
355
- def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[builtins.bool]]:
354
+ def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[_builtins.bool]]:
356
355
  """
357
356
  If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
358
357
 
@@ -362,7 +361,7 @@ class _BackendConfigScepState:
362
361
  return pulumi.get(self, "restrict_ca_chain_to_issuer")
363
362
 
364
363
  @restrict_ca_chain_to_issuer.setter
365
- def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[builtins.bool]]):
364
+ def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[_builtins.bool]]):
366
365
  pulumi.set(self, "restrict_ca_chain_to_issuer", value)
367
366
 
368
367
 
@@ -372,15 +371,15 @@ class BackendConfigScep(pulumi.CustomResource):
372
371
  def __init__(__self__,
373
372
  resource_name: str,
374
373
  opts: Optional[pulumi.ResourceOptions] = None,
375
- allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
376
- allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
374
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
375
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
377
376
  authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
378
- backend: Optional[pulumi.Input[builtins.str]] = None,
379
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
380
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
377
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
378
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
379
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
381
380
  external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
382
- namespace: Optional[pulumi.Input[builtins.str]] = None,
383
- restrict_ca_chain_to_issuer: Optional[pulumi.Input[builtins.bool]] = None,
381
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
382
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None,
384
383
  __props__=None):
385
384
  """
386
385
  Allows setting the SCEP configuration on a PKI Secret Backend.
@@ -404,7 +403,7 @@ class BackendConfigScep(pulumi.CustomResource):
404
403
  path="pki_scep",
405
404
  type="pki",
406
405
  description="PKI secret engine mount")
407
- test = vault.pki_secret.BackendConfigScep("test",
406
+ test = vault.pkisecret.BackendConfigScep("test",
408
407
  backend=pki.path,
409
408
  enabled=True,
410
409
  default_path_policy="sign-verbatim",
@@ -429,19 +428,19 @@ class BackendConfigScep(pulumi.CustomResource):
429
428
 
430
429
  :param str resource_name: The name of the resource.
431
430
  :param pulumi.ResourceOptions opts: Options for the resource.
432
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
433
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
431
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
432
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
434
433
  :param pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
435
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
434
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
436
435
  read the SCEP configuration from, with no leading or trailing `/`s.
437
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
438
- :param pulumi.Input[builtins.bool] enabled: Specifies whether SCEP is enabled.
436
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
437
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
439
438
  :param pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
440
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
439
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
441
440
  The value should not contain leading or trailing forward slashes.
442
441
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
443
442
  *Available only for Vault Enterprise*.
444
- :param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
443
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
445
444
 
446
445
 
447
446
  <a id="nestedatt--authenticators"></a>
@@ -474,7 +473,7 @@ class BackendConfigScep(pulumi.CustomResource):
474
473
  path="pki_scep",
475
474
  type="pki",
476
475
  description="PKI secret engine mount")
477
- test = vault.pki_secret.BackendConfigScep("test",
476
+ test = vault.pkisecret.BackendConfigScep("test",
478
477
  backend=pki.path,
479
478
  enabled=True,
480
479
  default_path_policy="sign-verbatim",
@@ -512,15 +511,15 @@ class BackendConfigScep(pulumi.CustomResource):
512
511
  def _internal_init(__self__,
513
512
  resource_name: str,
514
513
  opts: Optional[pulumi.ResourceOptions] = None,
515
- allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
516
- allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
514
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
515
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
517
516
  authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
518
- backend: Optional[pulumi.Input[builtins.str]] = None,
519
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
520
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
517
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
518
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
519
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
521
520
  external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
522
- namespace: Optional[pulumi.Input[builtins.str]] = None,
523
- restrict_ca_chain_to_issuer: Optional[pulumi.Input[builtins.bool]] = None,
521
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
522
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None,
524
523
  __props__=None):
525
524
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
526
525
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -552,16 +551,16 @@ class BackendConfigScep(pulumi.CustomResource):
552
551
  def get(resource_name: str,
553
552
  id: pulumi.Input[str],
554
553
  opts: Optional[pulumi.ResourceOptions] = None,
555
- allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
556
- allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
554
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
555
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
557
556
  authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
558
- backend: Optional[pulumi.Input[builtins.str]] = None,
559
- default_path_policy: Optional[pulumi.Input[builtins.str]] = None,
560
- enabled: Optional[pulumi.Input[builtins.bool]] = None,
557
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
558
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
559
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
561
560
  external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
562
- last_updated: Optional[pulumi.Input[builtins.str]] = None,
563
- namespace: Optional[pulumi.Input[builtins.str]] = None,
564
- restrict_ca_chain_to_issuer: Optional[pulumi.Input[builtins.bool]] = None) -> 'BackendConfigScep':
561
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
562
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
563
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None) -> 'BackendConfigScep':
565
564
  """
566
565
  Get an existing BackendConfigScep resource's state with the given name, id, and optional extra
567
566
  properties used to qualify the lookup.
@@ -569,20 +568,20 @@ class BackendConfigScep(pulumi.CustomResource):
569
568
  :param str resource_name: The unique name of the resulting resource.
570
569
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
571
570
  :param pulumi.ResourceOptions opts: Options for the resource.
572
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
573
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
571
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
572
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
574
573
  :param pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
575
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
574
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
576
575
  read the SCEP configuration from, with no leading or trailing `/`s.
577
- :param pulumi.Input[builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
578
- :param pulumi.Input[builtins.bool] enabled: Specifies whether SCEP is enabled.
576
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
577
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
579
578
  :param pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
580
- :param pulumi.Input[builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
581
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
579
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
580
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
582
581
  The value should not contain leading or trailing forward slashes.
583
582
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
584
583
  *Available only for Vault Enterprise*.
585
- :param pulumi.Input[builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
584
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
586
585
 
587
586
 
588
587
  <a id="nestedatt--authenticators"></a>
@@ -603,23 +602,23 @@ class BackendConfigScep(pulumi.CustomResource):
603
602
  __props__.__dict__["restrict_ca_chain_to_issuer"] = restrict_ca_chain_to_issuer
604
603
  return BackendConfigScep(resource_name, opts=opts, __props__=__props__)
605
604
 
606
- @property
605
+ @_builtins.property
607
606
  @pulumi.getter(name="allowedDigestAlgorithms")
608
- def allowed_digest_algorithms(self) -> pulumi.Output[Sequence[builtins.str]]:
607
+ def allowed_digest_algorithms(self) -> pulumi.Output[Sequence[_builtins.str]]:
609
608
  """
610
609
  List of allowed digest algorithms for SCEP requests.
611
610
  """
612
611
  return pulumi.get(self, "allowed_digest_algorithms")
613
612
 
614
- @property
613
+ @_builtins.property
615
614
  @pulumi.getter(name="allowedEncryptionAlgorithms")
616
- def allowed_encryption_algorithms(self) -> pulumi.Output[Sequence[builtins.str]]:
615
+ def allowed_encryption_algorithms(self) -> pulumi.Output[Sequence[_builtins.str]]:
617
616
  """
618
617
  List of allowed encryption algorithms for SCEP requests.
619
618
  """
620
619
  return pulumi.get(self, "allowed_encryption_algorithms")
621
620
 
622
- @property
621
+ @_builtins.property
623
622
  @pulumi.getter
624
623
  def authenticators(self) -> pulumi.Output['outputs.BackendConfigScepAuthenticators']:
625
624
  """
@@ -627,32 +626,32 @@ class BackendConfigScep(pulumi.CustomResource):
627
626
  """
628
627
  return pulumi.get(self, "authenticators")
629
628
 
630
- @property
629
+ @_builtins.property
631
630
  @pulumi.getter
632
- def backend(self) -> pulumi.Output[builtins.str]:
631
+ def backend(self) -> pulumi.Output[_builtins.str]:
633
632
  """
634
633
  The path to the PKI secret backend to
635
634
  read the SCEP configuration from, with no leading or trailing `/`s.
636
635
  """
637
636
  return pulumi.get(self, "backend")
638
637
 
639
- @property
638
+ @_builtins.property
640
639
  @pulumi.getter(name="defaultPathPolicy")
641
- def default_path_policy(self) -> pulumi.Output[Optional[builtins.str]]:
640
+ def default_path_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
642
641
  """
643
642
  Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
644
643
  """
645
644
  return pulumi.get(self, "default_path_policy")
646
645
 
647
- @property
646
+ @_builtins.property
648
647
  @pulumi.getter
649
- def enabled(self) -> pulumi.Output[Optional[builtins.bool]]:
648
+ def enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
650
649
  """
651
650
  Specifies whether SCEP is enabled.
652
651
  """
653
652
  return pulumi.get(self, "enabled")
654
653
 
655
- @property
654
+ @_builtins.property
656
655
  @pulumi.getter(name="externalValidations")
657
656
  def external_validations(self) -> pulumi.Output[Sequence['outputs.BackendConfigScepExternalValidation']]:
658
657
  """
@@ -660,17 +659,17 @@ class BackendConfigScep(pulumi.CustomResource):
660
659
  """
661
660
  return pulumi.get(self, "external_validations")
662
661
 
663
- @property
662
+ @_builtins.property
664
663
  @pulumi.getter(name="lastUpdated")
665
- def last_updated(self) -> pulumi.Output[builtins.str]:
664
+ def last_updated(self) -> pulumi.Output[_builtins.str]:
666
665
  """
667
666
  A read-only timestamp representing the last time the configuration was updated.
668
667
  """
669
668
  return pulumi.get(self, "last_updated")
670
669
 
671
- @property
670
+ @_builtins.property
672
671
  @pulumi.getter
673
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
672
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
674
673
  """
675
674
  The namespace of the target resource.
676
675
  The value should not contain leading or trailing forward slashes.
@@ -679,9 +678,9 @@ class BackendConfigScep(pulumi.CustomResource):
679
678
  """
680
679
  return pulumi.get(self, "namespace")
681
680
 
682
- @property
681
+ @_builtins.property
683
682
  @pulumi.getter(name="restrictCaChainToIssuer")
684
- def restrict_ca_chain_to_issuer(self) -> pulumi.Output[Optional[builtins.bool]]:
683
+ def restrict_ca_chain_to_issuer(self) -> pulumi.Output[Optional[_builtins.bool]]:
685
684
  """
686
685
  If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
687
686