pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,738 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+ from . import outputs
17
+ from ._inputs import *
18
+
19
+ __all__ = ['BackendConfigScepArgs', 'BackendConfigScep']
20
+
21
+ @pulumi.input_type
22
+ class BackendConfigScepArgs:
23
+ def __init__(__self__, *,
24
+ backend: pulumi.Input[_builtins.str],
25
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ authenticators: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']] = None,
28
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
29
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ external_validations: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]] = None,
31
+ log_level: Optional[pulumi.Input[_builtins.str]] = None,
32
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
33
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None):
34
+ """
35
+ The set of arguments for constructing a BackendConfigScep resource.
36
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
37
+ read the SCEP configuration from, with no leading or trailing `/`s.
38
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
39
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
40
+ :param pulumi.Input['BackendConfigScepAuthenticatorsArgs'] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
41
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
42
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
43
+ :param pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
44
+ :param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
45
+
46
+
47
+ <a id="nestedatt--authenticators"></a>
48
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
49
+ The value should not contain leading or trailing forward slashes.
50
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
51
+ *Available only for Vault Enterprise*.
52
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
53
+ """
54
+ pulumi.set(__self__, "backend", backend)
55
+ if allowed_digest_algorithms is not None:
56
+ pulumi.set(__self__, "allowed_digest_algorithms", allowed_digest_algorithms)
57
+ if allowed_encryption_algorithms is not None:
58
+ pulumi.set(__self__, "allowed_encryption_algorithms", allowed_encryption_algorithms)
59
+ if authenticators is not None:
60
+ pulumi.set(__self__, "authenticators", authenticators)
61
+ if default_path_policy is not None:
62
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
63
+ if enabled is not None:
64
+ pulumi.set(__self__, "enabled", enabled)
65
+ if external_validations is not None:
66
+ pulumi.set(__self__, "external_validations", external_validations)
67
+ if log_level is not None:
68
+ pulumi.set(__self__, "log_level", log_level)
69
+ if namespace is not None:
70
+ pulumi.set(__self__, "namespace", namespace)
71
+ if restrict_ca_chain_to_issuer is not None:
72
+ pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
73
+
74
+ @_builtins.property
75
+ @pulumi.getter
76
+ def backend(self) -> pulumi.Input[_builtins.str]:
77
+ """
78
+ The path to the PKI secret backend to
79
+ read the SCEP configuration from, with no leading or trailing `/`s.
80
+ """
81
+ return pulumi.get(self, "backend")
82
+
83
+ @backend.setter
84
+ def backend(self, value: pulumi.Input[_builtins.str]):
85
+ pulumi.set(self, "backend", value)
86
+
87
+ @_builtins.property
88
+ @pulumi.getter(name="allowedDigestAlgorithms")
89
+ def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
90
+ """
91
+ List of allowed digest algorithms for SCEP requests.
92
+ """
93
+ return pulumi.get(self, "allowed_digest_algorithms")
94
+
95
+ @allowed_digest_algorithms.setter
96
+ def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
97
+ pulumi.set(self, "allowed_digest_algorithms", value)
98
+
99
+ @_builtins.property
100
+ @pulumi.getter(name="allowedEncryptionAlgorithms")
101
+ def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
102
+ """
103
+ List of allowed encryption algorithms for SCEP requests.
104
+ """
105
+ return pulumi.get(self, "allowed_encryption_algorithms")
106
+
107
+ @allowed_encryption_algorithms.setter
108
+ def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
109
+ pulumi.set(self, "allowed_encryption_algorithms", value)
110
+
111
+ @_builtins.property
112
+ @pulumi.getter
113
+ def authenticators(self) -> Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]:
114
+ """
115
+ Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
116
+ """
117
+ return pulumi.get(self, "authenticators")
118
+
119
+ @authenticators.setter
120
+ def authenticators(self, value: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]):
121
+ pulumi.set(self, "authenticators", value)
122
+
123
+ @_builtins.property
124
+ @pulumi.getter(name="defaultPathPolicy")
125
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
126
+ """
127
+ Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
128
+ """
129
+ return pulumi.get(self, "default_path_policy")
130
+
131
+ @default_path_policy.setter
132
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
133
+ pulumi.set(self, "default_path_policy", value)
134
+
135
+ @_builtins.property
136
+ @pulumi.getter
137
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
138
+ """
139
+ Specifies whether SCEP is enabled.
140
+ """
141
+ return pulumi.get(self, "enabled")
142
+
143
+ @enabled.setter
144
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
145
+ pulumi.set(self, "enabled", value)
146
+
147
+ @_builtins.property
148
+ @pulumi.getter(name="externalValidations")
149
+ def external_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]:
150
+ """
151
+ Lists the 3rd party validation of SCEP requests (see below for nested schema).
152
+ """
153
+ return pulumi.get(self, "external_validations")
154
+
155
+ @external_validations.setter
156
+ def external_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]):
157
+ pulumi.set(self, "external_validations", value)
158
+
159
+ @_builtins.property
160
+ @pulumi.getter(name="logLevel")
161
+ def log_level(self) -> Optional[pulumi.Input[_builtins.str]]:
162
+ """
163
+ The level of logging verbosity, affects only SCEP logs on this mount.
164
+
165
+
166
+ <a id="nestedatt--authenticators"></a>
167
+ """
168
+ return pulumi.get(self, "log_level")
169
+
170
+ @log_level.setter
171
+ def log_level(self, value: Optional[pulumi.Input[_builtins.str]]):
172
+ pulumi.set(self, "log_level", value)
173
+
174
+ @_builtins.property
175
+ @pulumi.getter
176
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
177
+ """
178
+ The namespace of the target resource.
179
+ The value should not contain leading or trailing forward slashes.
180
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
181
+ *Available only for Vault Enterprise*.
182
+ """
183
+ return pulumi.get(self, "namespace")
184
+
185
+ @namespace.setter
186
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
187
+ pulumi.set(self, "namespace", value)
188
+
189
+ @_builtins.property
190
+ @pulumi.getter(name="restrictCaChainToIssuer")
191
+ def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[_builtins.bool]]:
192
+ """
193
+ If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
194
+ """
195
+ return pulumi.get(self, "restrict_ca_chain_to_issuer")
196
+
197
+ @restrict_ca_chain_to_issuer.setter
198
+ def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[_builtins.bool]]):
199
+ pulumi.set(self, "restrict_ca_chain_to_issuer", value)
200
+
201
+
202
+ @pulumi.input_type
203
+ class _BackendConfigScepState:
204
+ def __init__(__self__, *,
205
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
206
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
207
+ authenticators: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']] = None,
208
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
209
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
210
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
211
+ external_validations: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]] = None,
212
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
213
+ log_level: Optional[pulumi.Input[_builtins.str]] = None,
214
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
215
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None):
216
+ """
217
+ Input properties used for looking up and filtering BackendConfigScep resources.
218
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
219
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
220
+ :param pulumi.Input['BackendConfigScepAuthenticatorsArgs'] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
221
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
222
+ read the SCEP configuration from, with no leading or trailing `/`s.
223
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
224
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
225
+ :param pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
226
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
227
+ :param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
228
+
229
+
230
+ <a id="nestedatt--authenticators"></a>
231
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
232
+ The value should not contain leading or trailing forward slashes.
233
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
234
+ *Available only for Vault Enterprise*.
235
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
236
+ """
237
+ if allowed_digest_algorithms is not None:
238
+ pulumi.set(__self__, "allowed_digest_algorithms", allowed_digest_algorithms)
239
+ if allowed_encryption_algorithms is not None:
240
+ pulumi.set(__self__, "allowed_encryption_algorithms", allowed_encryption_algorithms)
241
+ if authenticators is not None:
242
+ pulumi.set(__self__, "authenticators", authenticators)
243
+ if backend is not None:
244
+ pulumi.set(__self__, "backend", backend)
245
+ if default_path_policy is not None:
246
+ pulumi.set(__self__, "default_path_policy", default_path_policy)
247
+ if enabled is not None:
248
+ pulumi.set(__self__, "enabled", enabled)
249
+ if external_validations is not None:
250
+ pulumi.set(__self__, "external_validations", external_validations)
251
+ if last_updated is not None:
252
+ pulumi.set(__self__, "last_updated", last_updated)
253
+ if log_level is not None:
254
+ pulumi.set(__self__, "log_level", log_level)
255
+ if namespace is not None:
256
+ pulumi.set(__self__, "namespace", namespace)
257
+ if restrict_ca_chain_to_issuer is not None:
258
+ pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
259
+
260
+ @_builtins.property
261
+ @pulumi.getter(name="allowedDigestAlgorithms")
262
+ def allowed_digest_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
263
+ """
264
+ List of allowed digest algorithms for SCEP requests.
265
+ """
266
+ return pulumi.get(self, "allowed_digest_algorithms")
267
+
268
+ @allowed_digest_algorithms.setter
269
+ def allowed_digest_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
270
+ pulumi.set(self, "allowed_digest_algorithms", value)
271
+
272
+ @_builtins.property
273
+ @pulumi.getter(name="allowedEncryptionAlgorithms")
274
+ def allowed_encryption_algorithms(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
275
+ """
276
+ List of allowed encryption algorithms for SCEP requests.
277
+ """
278
+ return pulumi.get(self, "allowed_encryption_algorithms")
279
+
280
+ @allowed_encryption_algorithms.setter
281
+ def allowed_encryption_algorithms(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
282
+ pulumi.set(self, "allowed_encryption_algorithms", value)
283
+
284
+ @_builtins.property
285
+ @pulumi.getter
286
+ def authenticators(self) -> Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]:
287
+ """
288
+ Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
289
+ """
290
+ return pulumi.get(self, "authenticators")
291
+
292
+ @authenticators.setter
293
+ def authenticators(self, value: Optional[pulumi.Input['BackendConfigScepAuthenticatorsArgs']]):
294
+ pulumi.set(self, "authenticators", value)
295
+
296
+ @_builtins.property
297
+ @pulumi.getter
298
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
299
+ """
300
+ The path to the PKI secret backend to
301
+ read the SCEP configuration from, with no leading or trailing `/`s.
302
+ """
303
+ return pulumi.get(self, "backend")
304
+
305
+ @backend.setter
306
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
307
+ pulumi.set(self, "backend", value)
308
+
309
+ @_builtins.property
310
+ @pulumi.getter(name="defaultPathPolicy")
311
+ def default_path_policy(self) -> Optional[pulumi.Input[_builtins.str]]:
312
+ """
313
+ Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
314
+ """
315
+ return pulumi.get(self, "default_path_policy")
316
+
317
+ @default_path_policy.setter
318
+ def default_path_policy(self, value: Optional[pulumi.Input[_builtins.str]]):
319
+ pulumi.set(self, "default_path_policy", value)
320
+
321
+ @_builtins.property
322
+ @pulumi.getter
323
+ def enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
324
+ """
325
+ Specifies whether SCEP is enabled.
326
+ """
327
+ return pulumi.get(self, "enabled")
328
+
329
+ @enabled.setter
330
+ def enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
331
+ pulumi.set(self, "enabled", value)
332
+
333
+ @_builtins.property
334
+ @pulumi.getter(name="externalValidations")
335
+ def external_validations(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]:
336
+ """
337
+ Lists the 3rd party validation of SCEP requests (see below for nested schema).
338
+ """
339
+ return pulumi.get(self, "external_validations")
340
+
341
+ @external_validations.setter
342
+ def external_validations(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['BackendConfigScepExternalValidationArgs']]]]):
343
+ pulumi.set(self, "external_validations", value)
344
+
345
+ @_builtins.property
346
+ @pulumi.getter(name="lastUpdated")
347
+ def last_updated(self) -> Optional[pulumi.Input[_builtins.str]]:
348
+ """
349
+ A read-only timestamp representing the last time the configuration was updated.
350
+ """
351
+ return pulumi.get(self, "last_updated")
352
+
353
+ @last_updated.setter
354
+ def last_updated(self, value: Optional[pulumi.Input[_builtins.str]]):
355
+ pulumi.set(self, "last_updated", value)
356
+
357
+ @_builtins.property
358
+ @pulumi.getter(name="logLevel")
359
+ def log_level(self) -> Optional[pulumi.Input[_builtins.str]]:
360
+ """
361
+ The level of logging verbosity, affects only SCEP logs on this mount.
362
+
363
+
364
+ <a id="nestedatt--authenticators"></a>
365
+ """
366
+ return pulumi.get(self, "log_level")
367
+
368
+ @log_level.setter
369
+ def log_level(self, value: Optional[pulumi.Input[_builtins.str]]):
370
+ pulumi.set(self, "log_level", value)
371
+
372
+ @_builtins.property
373
+ @pulumi.getter
374
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
375
+ """
376
+ The namespace of the target resource.
377
+ The value should not contain leading or trailing forward slashes.
378
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
379
+ *Available only for Vault Enterprise*.
380
+ """
381
+ return pulumi.get(self, "namespace")
382
+
383
+ @namespace.setter
384
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
385
+ pulumi.set(self, "namespace", value)
386
+
387
+ @_builtins.property
388
+ @pulumi.getter(name="restrictCaChainToIssuer")
389
+ def restrict_ca_chain_to_issuer(self) -> Optional[pulumi.Input[_builtins.bool]]:
390
+ """
391
+ If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
392
+ """
393
+ return pulumi.get(self, "restrict_ca_chain_to_issuer")
394
+
395
+ @restrict_ca_chain_to_issuer.setter
396
+ def restrict_ca_chain_to_issuer(self, value: Optional[pulumi.Input[_builtins.bool]]):
397
+ pulumi.set(self, "restrict_ca_chain_to_issuer", value)
398
+
399
+
400
+ @pulumi.type_token("vault:pkiSecret/backendConfigScep:BackendConfigScep")
401
+ class BackendConfigScep(pulumi.CustomResource):
402
+ @overload
403
+ def __init__(__self__,
404
+ resource_name: str,
405
+ opts: Optional[pulumi.ResourceOptions] = None,
406
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
407
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
408
+ authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
409
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
410
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
411
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
412
+ external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
413
+ log_level: Optional[pulumi.Input[_builtins.str]] = None,
414
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
415
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None,
416
+ __props__=None):
417
+ """
418
+ Allows setting the SCEP configuration on a PKI Secret Backend.
419
+
420
+ ## Example Usage
421
+
422
+ ```python
423
+ import pulumi
424
+ import pulumi_vault as vault
425
+
426
+ scep = vault.AuthBackend("scep",
427
+ path="scep-auth",
428
+ type="scep")
429
+ scep_challenge = vault.ScepAuthBackendRole("scep_challenge",
430
+ backend=scep.id,
431
+ name="scep-auth",
432
+ display_name="Static challenge for SCEP clients",
433
+ auth_type="static-challenge",
434
+ challenge="ac7e4ada-c8ef-4393-9098-d69d08736833")
435
+ pki = vault.Mount("pki",
436
+ path="pki_scep",
437
+ type="pki",
438
+ description="PKI secret engine mount")
439
+ test = vault.pkisecret.BackendConfigScep("test",
440
+ backend=pki.path,
441
+ enabled=True,
442
+ default_path_policy="sign-verbatim",
443
+ restrict_ca_chain_to_issuer=True,
444
+ authenticators={
445
+ "scep": {
446
+ "accessor": scep.accessor,
447
+ "scep_role": scep_challenge.name,
448
+ },
449
+ })
450
+ ```
451
+
452
+ ## Import
453
+
454
+ The PKI config cluster can be imported using the resource's `id`.
455
+ In the case of the example above the `id` would be `pki-root/config/scep`,
456
+ where the `pki-root` component is the resource's `backend`, e.g.
457
+
458
+ ```sh
459
+ $ pulumi import vault:pkiSecret/backendConfigScep:BackendConfigScep example pki-root/config/scep
460
+ ```
461
+
462
+ :param str resource_name: The name of the resource.
463
+ :param pulumi.ResourceOptions opts: Options for the resource.
464
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
465
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
466
+ :param pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
467
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
468
+ read the SCEP configuration from, with no leading or trailing `/`s.
469
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
470
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
471
+ :param pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
472
+ :param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
473
+
474
+
475
+ <a id="nestedatt--authenticators"></a>
476
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
477
+ The value should not contain leading or trailing forward slashes.
478
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
479
+ *Available only for Vault Enterprise*.
480
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
481
+ """
482
+ ...
483
+ @overload
484
+ def __init__(__self__,
485
+ resource_name: str,
486
+ args: BackendConfigScepArgs,
487
+ opts: Optional[pulumi.ResourceOptions] = None):
488
+ """
489
+ Allows setting the SCEP configuration on a PKI Secret Backend.
490
+
491
+ ## Example Usage
492
+
493
+ ```python
494
+ import pulumi
495
+ import pulumi_vault as vault
496
+
497
+ scep = vault.AuthBackend("scep",
498
+ path="scep-auth",
499
+ type="scep")
500
+ scep_challenge = vault.ScepAuthBackendRole("scep_challenge",
501
+ backend=scep.id,
502
+ name="scep-auth",
503
+ display_name="Static challenge for SCEP clients",
504
+ auth_type="static-challenge",
505
+ challenge="ac7e4ada-c8ef-4393-9098-d69d08736833")
506
+ pki = vault.Mount("pki",
507
+ path="pki_scep",
508
+ type="pki",
509
+ description="PKI secret engine mount")
510
+ test = vault.pkisecret.BackendConfigScep("test",
511
+ backend=pki.path,
512
+ enabled=True,
513
+ default_path_policy="sign-verbatim",
514
+ restrict_ca_chain_to_issuer=True,
515
+ authenticators={
516
+ "scep": {
517
+ "accessor": scep.accessor,
518
+ "scep_role": scep_challenge.name,
519
+ },
520
+ })
521
+ ```
522
+
523
+ ## Import
524
+
525
+ The PKI config cluster can be imported using the resource's `id`.
526
+ In the case of the example above the `id` would be `pki-root/config/scep`,
527
+ where the `pki-root` component is the resource's `backend`, e.g.
528
+
529
+ ```sh
530
+ $ pulumi import vault:pkiSecret/backendConfigScep:BackendConfigScep example pki-root/config/scep
531
+ ```
532
+
533
+ :param str resource_name: The name of the resource.
534
+ :param BackendConfigScepArgs args: The arguments to use to populate this resource's properties.
535
+ :param pulumi.ResourceOptions opts: Options for the resource.
536
+ """
537
+ ...
538
+ def __init__(__self__, resource_name: str, *args, **kwargs):
539
+ resource_args, opts = _utilities.get_resource_args_opts(BackendConfigScepArgs, pulumi.ResourceOptions, *args, **kwargs)
540
+ if resource_args is not None:
541
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
542
+ else:
543
+ __self__._internal_init(resource_name, *args, **kwargs)
544
+
545
+ def _internal_init(__self__,
546
+ resource_name: str,
547
+ opts: Optional[pulumi.ResourceOptions] = None,
548
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
549
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
550
+ authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
551
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
552
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
553
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
554
+ external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
555
+ log_level: Optional[pulumi.Input[_builtins.str]] = None,
556
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
557
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None,
558
+ __props__=None):
559
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
560
+ if not isinstance(opts, pulumi.ResourceOptions):
561
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
562
+ if opts.id is None:
563
+ if __props__ is not None:
564
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
565
+ __props__ = BackendConfigScepArgs.__new__(BackendConfigScepArgs)
566
+
567
+ __props__.__dict__["allowed_digest_algorithms"] = allowed_digest_algorithms
568
+ __props__.__dict__["allowed_encryption_algorithms"] = allowed_encryption_algorithms
569
+ __props__.__dict__["authenticators"] = authenticators
570
+ if backend is None and not opts.urn:
571
+ raise TypeError("Missing required property 'backend'")
572
+ __props__.__dict__["backend"] = backend
573
+ __props__.__dict__["default_path_policy"] = default_path_policy
574
+ __props__.__dict__["enabled"] = enabled
575
+ __props__.__dict__["external_validations"] = external_validations
576
+ __props__.__dict__["log_level"] = log_level
577
+ __props__.__dict__["namespace"] = namespace
578
+ __props__.__dict__["restrict_ca_chain_to_issuer"] = restrict_ca_chain_to_issuer
579
+ __props__.__dict__["last_updated"] = None
580
+ super(BackendConfigScep, __self__).__init__(
581
+ 'vault:pkiSecret/backendConfigScep:BackendConfigScep',
582
+ resource_name,
583
+ __props__,
584
+ opts)
585
+
586
+ @staticmethod
587
+ def get(resource_name: str,
588
+ id: pulumi.Input[str],
589
+ opts: Optional[pulumi.ResourceOptions] = None,
590
+ allowed_digest_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
591
+ allowed_encryption_algorithms: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
592
+ authenticators: Optional[pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']]] = None,
593
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
594
+ default_path_policy: Optional[pulumi.Input[_builtins.str]] = None,
595
+ enabled: Optional[pulumi.Input[_builtins.bool]] = None,
596
+ external_validations: Optional[pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]]] = None,
597
+ last_updated: Optional[pulumi.Input[_builtins.str]] = None,
598
+ log_level: Optional[pulumi.Input[_builtins.str]] = None,
599
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
600
+ restrict_ca_chain_to_issuer: Optional[pulumi.Input[_builtins.bool]] = None) -> 'BackendConfigScep':
601
+ """
602
+ Get an existing BackendConfigScep resource's state with the given name, id, and optional extra
603
+ properties used to qualify the lookup.
604
+
605
+ :param str resource_name: The unique name of the resulting resource.
606
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
607
+ :param pulumi.ResourceOptions opts: Options for the resource.
608
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_digest_algorithms: List of allowed digest algorithms for SCEP requests.
609
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_encryption_algorithms: List of allowed encryption algorithms for SCEP requests.
610
+ :param pulumi.Input[Union['BackendConfigScepAuthenticatorsArgs', 'BackendConfigScepAuthenticatorsArgsDict']] authenticators: Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
611
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
612
+ read the SCEP configuration from, with no leading or trailing `/`s.
613
+ :param pulumi.Input[_builtins.str] default_path_policy: Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
614
+ :param pulumi.Input[_builtins.bool] enabled: Specifies whether SCEP is enabled.
615
+ :param pulumi.Input[Sequence[pulumi.Input[Union['BackendConfigScepExternalValidationArgs', 'BackendConfigScepExternalValidationArgsDict']]]] external_validations: Lists the 3rd party validation of SCEP requests (see below for nested schema).
616
+ :param pulumi.Input[_builtins.str] last_updated: A read-only timestamp representing the last time the configuration was updated.
617
+ :param pulumi.Input[_builtins.str] log_level: The level of logging verbosity, affects only SCEP logs on this mount.
618
+
619
+
620
+ <a id="nestedatt--authenticators"></a>
621
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
622
+ The value should not contain leading or trailing forward slashes.
623
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
624
+ *Available only for Vault Enterprise*.
625
+ :param pulumi.Input[_builtins.bool] restrict_ca_chain_to_issuer: If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
626
+ """
627
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
628
+
629
+ __props__ = _BackendConfigScepState.__new__(_BackendConfigScepState)
630
+
631
+ __props__.__dict__["allowed_digest_algorithms"] = allowed_digest_algorithms
632
+ __props__.__dict__["allowed_encryption_algorithms"] = allowed_encryption_algorithms
633
+ __props__.__dict__["authenticators"] = authenticators
634
+ __props__.__dict__["backend"] = backend
635
+ __props__.__dict__["default_path_policy"] = default_path_policy
636
+ __props__.__dict__["enabled"] = enabled
637
+ __props__.__dict__["external_validations"] = external_validations
638
+ __props__.__dict__["last_updated"] = last_updated
639
+ __props__.__dict__["log_level"] = log_level
640
+ __props__.__dict__["namespace"] = namespace
641
+ __props__.__dict__["restrict_ca_chain_to_issuer"] = restrict_ca_chain_to_issuer
642
+ return BackendConfigScep(resource_name, opts=opts, __props__=__props__)
643
+
644
+ @_builtins.property
645
+ @pulumi.getter(name="allowedDigestAlgorithms")
646
+ def allowed_digest_algorithms(self) -> pulumi.Output[Sequence[_builtins.str]]:
647
+ """
648
+ List of allowed digest algorithms for SCEP requests.
649
+ """
650
+ return pulumi.get(self, "allowed_digest_algorithms")
651
+
652
+ @_builtins.property
653
+ @pulumi.getter(name="allowedEncryptionAlgorithms")
654
+ def allowed_encryption_algorithms(self) -> pulumi.Output[Sequence[_builtins.str]]:
655
+ """
656
+ List of allowed encryption algorithms for SCEP requests.
657
+ """
658
+ return pulumi.get(self, "allowed_encryption_algorithms")
659
+
660
+ @_builtins.property
661
+ @pulumi.getter
662
+ def authenticators(self) -> pulumi.Output['outputs.BackendConfigScepAuthenticators']:
663
+ """
664
+ Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
665
+ """
666
+ return pulumi.get(self, "authenticators")
667
+
668
+ @_builtins.property
669
+ @pulumi.getter
670
+ def backend(self) -> pulumi.Output[_builtins.str]:
671
+ """
672
+ The path to the PKI secret backend to
673
+ read the SCEP configuration from, with no leading or trailing `/`s.
674
+ """
675
+ return pulumi.get(self, "backend")
676
+
677
+ @_builtins.property
678
+ @pulumi.getter(name="defaultPathPolicy")
679
+ def default_path_policy(self) -> pulumi.Output[Optional[_builtins.str]]:
680
+ """
681
+ Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
682
+ """
683
+ return pulumi.get(self, "default_path_policy")
684
+
685
+ @_builtins.property
686
+ @pulumi.getter
687
+ def enabled(self) -> pulumi.Output[Optional[_builtins.bool]]:
688
+ """
689
+ Specifies whether SCEP is enabled.
690
+ """
691
+ return pulumi.get(self, "enabled")
692
+
693
+ @_builtins.property
694
+ @pulumi.getter(name="externalValidations")
695
+ def external_validations(self) -> pulumi.Output[Sequence['outputs.BackendConfigScepExternalValidation']]:
696
+ """
697
+ Lists the 3rd party validation of SCEP requests (see below for nested schema).
698
+ """
699
+ return pulumi.get(self, "external_validations")
700
+
701
+ @_builtins.property
702
+ @pulumi.getter(name="lastUpdated")
703
+ def last_updated(self) -> pulumi.Output[_builtins.str]:
704
+ """
705
+ A read-only timestamp representing the last time the configuration was updated.
706
+ """
707
+ return pulumi.get(self, "last_updated")
708
+
709
+ @_builtins.property
710
+ @pulumi.getter(name="logLevel")
711
+ def log_level(self) -> pulumi.Output[_builtins.str]:
712
+ """
713
+ The level of logging verbosity, affects only SCEP logs on this mount.
714
+
715
+
716
+ <a id="nestedatt--authenticators"></a>
717
+ """
718
+ return pulumi.get(self, "log_level")
719
+
720
+ @_builtins.property
721
+ @pulumi.getter
722
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
723
+ """
724
+ The namespace of the target resource.
725
+ The value should not contain leading or trailing forward slashes.
726
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
727
+ *Available only for Vault Enterprise*.
728
+ """
729
+ return pulumi.get(self, "namespace")
730
+
731
+ @_builtins.property
732
+ @pulumi.getter(name="restrictCaChainToIssuer")
733
+ def restrict_ca_chain_to_issuer(self) -> pulumi.Output[Optional[_builtins.bool]]:
734
+ """
735
+ If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
736
+ """
737
+ return pulumi.get(self, "restrict_ca_chain_to_issuer")
738
+