pulumi-vault 6.6.0a1741415971__py3-none-any.whl → 6.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +9 -0
  2. pulumi_vault/_inputs.py +583 -562
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +425 -200
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +523 -306
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +288 -70
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +383 -130
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +432 -186
  38. pulumi_vault/azure/backend_role.py +188 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +3857 -2200
  53. pulumi_vault/database/outputs.py +2483 -1330
  54. pulumi_vault/database/secret_backend_connection.py +333 -112
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +283 -140
  57. pulumi_vault/database/secrets_mount.py +275 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +426 -205
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +420 -179
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +68 -18
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +754 -533
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +720 -499
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +73 -60
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +3 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -36
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +174 -126
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1377 -0
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +152 -104
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +278 -0
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +35 -17
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +139 -25
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -31
  191. pulumi_vault/pkisecret/secret_backend_cert.py +439 -297
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +237 -182
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +520 -378
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +441 -175
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +894 -644
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +851 -427
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +936 -357
  203. pulumi_vault/pkisecret/secret_backend_sign.py +347 -252
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +2 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +295 -0
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +96 -95
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +3 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +325 -0
  257. pulumi_vault/transit/get_verify.py +355 -0
  258. pulumi_vault/transit/secret_backend_key.py +394 -231
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
  261. pulumi_vault-6.7.0.dist-info/RECORD +265 -0
  262. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
  263. pulumi_vault-6.6.0a1741415971.dist-info/RECORD +0 -260
  264. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
pulumi_vault/provider.py CHANGED
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -20,9 +21,9 @@ __all__ = ['ProviderArgs', 'Provider']
20
21
  @pulumi.input_type
21
22
  class ProviderArgs:
22
23
  def __init__(__self__, *,
23
- address: pulumi.Input[str],
24
- token: pulumi.Input[str],
25
- add_address_to_env: Optional[pulumi.Input[str]] = None,
24
+ address: pulumi.Input[builtins.str],
25
+ token: pulumi.Input[builtins.str],
26
+ add_address_to_env: Optional[pulumi.Input[builtins.str]] = None,
26
27
  auth_login: Optional[pulumi.Input['ProviderAuthLoginArgs']] = None,
27
28
  auth_login_aws: Optional[pulumi.Input['ProviderAuthLoginAwsArgs']] = None,
28
29
  auth_login_azure: Optional[pulumi.Input['ProviderAuthLoginAzureArgs']] = None,
@@ -35,25 +36,25 @@ class ProviderArgs:
35
36
  auth_login_radius: Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']] = None,
36
37
  auth_login_token_file: Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']] = None,
37
38
  auth_login_userpass: Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']] = None,
38
- ca_cert_dir: Optional[pulumi.Input[str]] = None,
39
- ca_cert_file: Optional[pulumi.Input[str]] = None,
39
+ ca_cert_dir: Optional[pulumi.Input[builtins.str]] = None,
40
+ ca_cert_file: Optional[pulumi.Input[builtins.str]] = None,
40
41
  client_auth: Optional[pulumi.Input['ProviderClientAuthArgs']] = None,
41
42
  headers: Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]] = None,
42
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
43
- max_retries: Optional[pulumi.Input[int]] = None,
44
- max_retries_ccc: Optional[pulumi.Input[int]] = None,
45
- namespace: Optional[pulumi.Input[str]] = None,
46
- set_namespace_from_token: Optional[pulumi.Input[bool]] = None,
47
- skip_child_token: Optional[pulumi.Input[bool]] = None,
48
- skip_get_vault_version: Optional[pulumi.Input[bool]] = None,
49
- skip_tls_verify: Optional[pulumi.Input[bool]] = None,
50
- tls_server_name: Optional[pulumi.Input[str]] = None,
51
- token_name: Optional[pulumi.Input[str]] = None,
52
- vault_version_override: Optional[pulumi.Input[str]] = None):
43
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
44
+ max_retries: Optional[pulumi.Input[builtins.int]] = None,
45
+ max_retries_ccc: Optional[pulumi.Input[builtins.int]] = None,
46
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
47
+ set_namespace_from_token: Optional[pulumi.Input[builtins.bool]] = None,
48
+ skip_child_token: Optional[pulumi.Input[builtins.bool]] = None,
49
+ skip_get_vault_version: Optional[pulumi.Input[builtins.bool]] = None,
50
+ skip_tls_verify: Optional[pulumi.Input[builtins.bool]] = None,
51
+ tls_server_name: Optional[pulumi.Input[builtins.str]] = None,
52
+ token_name: Optional[pulumi.Input[builtins.str]] = None,
53
+ vault_version_override: Optional[pulumi.Input[builtins.str]] = None):
53
54
  """
54
55
  The set of arguments for constructing a Provider resource.
55
- :param pulumi.Input[str] address: URL of the root of the target Vault server.
56
- :param pulumi.Input[str] token: Token to use to authenticate to Vault.
56
+ :param pulumi.Input[builtins.str] address: URL of the root of the target Vault server.
57
+ :param pulumi.Input[builtins.str] token: Token to use to authenticate to Vault.
57
58
  :param pulumi.Input['ProviderAuthLoginArgs'] auth_login: Login to vault with an existing auth method using auth/<mount>/login
58
59
  :param pulumi.Input['ProviderAuthLoginAwsArgs'] auth_login_aws: Login to vault using the AWS method
59
60
  :param pulumi.Input['ProviderAuthLoginAzureArgs'] auth_login_azure: Login to vault using the azure method
@@ -66,22 +67,22 @@ class ProviderArgs:
66
67
  :param pulumi.Input['ProviderAuthLoginRadiusArgs'] auth_login_radius: Login to vault using the radius method
67
68
  :param pulumi.Input['ProviderAuthLoginTokenFileArgs'] auth_login_token_file: Login to vault using
68
69
  :param pulumi.Input['ProviderAuthLoginUserpassArgs'] auth_login_userpass: Login to vault using the userpass method
69
- :param pulumi.Input[str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
70
- :param pulumi.Input[str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
70
+ :param pulumi.Input[builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
71
+ :param pulumi.Input[builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
71
72
  :param pulumi.Input['ProviderClientAuthArgs'] client_auth: Client authentication credentials.
72
73
  :param pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]] headers: The headers to send with each Vault request.
73
- :param pulumi.Input[int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
74
- :param pulumi.Input[int] max_retries: Maximum number of retries when a 5xx error code is encountered.
75
- :param pulumi.Input[int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
76
- :param pulumi.Input[str] namespace: The namespace to use. Available only for Vault Enterprise.
77
- :param pulumi.Input[bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
74
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
75
+ :param pulumi.Input[builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
76
+ :param pulumi.Input[builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
77
+ :param pulumi.Input[builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
78
+ :param pulumi.Input[builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
78
79
  token namespace as the root namespace for all resources.
79
- :param pulumi.Input[bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
80
- :param pulumi.Input[bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
81
- :param pulumi.Input[bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
82
- :param pulumi.Input[str] tls_server_name: Name to use as the SNI host when connecting via TLS.
83
- :param pulumi.Input[str] token_name: Token name to use for creating the Vault child token.
84
- :param pulumi.Input[str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
80
+ :param pulumi.Input[builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
81
+ :param pulumi.Input[builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
82
+ :param pulumi.Input[builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
83
+ :param pulumi.Input[builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
84
+ :param pulumi.Input[builtins.str] token_name: Token name to use for creating the Vault child token.
85
+ :param pulumi.Input[builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
85
86
  """
86
87
  pulumi.set(__self__, "address", address)
87
88
  pulumi.set(__self__, "token", token)
@@ -153,35 +154,35 @@ class ProviderArgs:
153
154
 
154
155
  @property
155
156
  @pulumi.getter
156
- def address(self) -> pulumi.Input[str]:
157
+ def address(self) -> pulumi.Input[builtins.str]:
157
158
  """
158
159
  URL of the root of the target Vault server.
159
160
  """
160
161
  return pulumi.get(self, "address")
161
162
 
162
163
  @address.setter
163
- def address(self, value: pulumi.Input[str]):
164
+ def address(self, value: pulumi.Input[builtins.str]):
164
165
  pulumi.set(self, "address", value)
165
166
 
166
167
  @property
167
168
  @pulumi.getter
168
- def token(self) -> pulumi.Input[str]:
169
+ def token(self) -> pulumi.Input[builtins.str]:
169
170
  """
170
171
  Token to use to authenticate to Vault.
171
172
  """
172
173
  return pulumi.get(self, "token")
173
174
 
174
175
  @token.setter
175
- def token(self, value: pulumi.Input[str]):
176
+ def token(self, value: pulumi.Input[builtins.str]):
176
177
  pulumi.set(self, "token", value)
177
178
 
178
179
  @property
179
180
  @pulumi.getter(name="addAddressToEnv")
180
- def add_address_to_env(self) -> Optional[pulumi.Input[str]]:
181
+ def add_address_to_env(self) -> Optional[pulumi.Input[builtins.str]]:
181
182
  return pulumi.get(self, "add_address_to_env")
182
183
 
183
184
  @add_address_to_env.setter
184
- def add_address_to_env(self, value: Optional[pulumi.Input[str]]):
185
+ def add_address_to_env(self, value: Optional[pulumi.Input[builtins.str]]):
185
186
  pulumi.set(self, "add_address_to_env", value)
186
187
 
187
188
  @property
@@ -330,26 +331,26 @@ class ProviderArgs:
330
331
 
331
332
  @property
332
333
  @pulumi.getter(name="caCertDir")
333
- def ca_cert_dir(self) -> Optional[pulumi.Input[str]]:
334
+ def ca_cert_dir(self) -> Optional[pulumi.Input[builtins.str]]:
334
335
  """
335
336
  Path to directory containing CA certificate files to validate the server's certificate.
336
337
  """
337
338
  return pulumi.get(self, "ca_cert_dir")
338
339
 
339
340
  @ca_cert_dir.setter
340
- def ca_cert_dir(self, value: Optional[pulumi.Input[str]]):
341
+ def ca_cert_dir(self, value: Optional[pulumi.Input[builtins.str]]):
341
342
  pulumi.set(self, "ca_cert_dir", value)
342
343
 
343
344
  @property
344
345
  @pulumi.getter(name="caCertFile")
345
- def ca_cert_file(self) -> Optional[pulumi.Input[str]]:
346
+ def ca_cert_file(self) -> Optional[pulumi.Input[builtins.str]]:
346
347
  """
347
348
  Path to a CA certificate file to validate the server's certificate.
348
349
  """
349
350
  return pulumi.get(self, "ca_cert_file")
350
351
 
351
352
  @ca_cert_file.setter
352
- def ca_cert_file(self, value: Optional[pulumi.Input[str]]):
353
+ def ca_cert_file(self, value: Optional[pulumi.Input[builtins.str]]):
353
354
  pulumi.set(self, "ca_cert_file", value)
354
355
 
355
356
  @property
@@ -379,55 +380,55 @@ class ProviderArgs:
379
380
 
380
381
  @property
381
382
  @pulumi.getter(name="maxLeaseTtlSeconds")
382
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
383
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
383
384
  """
384
385
  Maximum TTL for secret leases requested by this provider.
385
386
  """
386
387
  return pulumi.get(self, "max_lease_ttl_seconds")
387
388
 
388
389
  @max_lease_ttl_seconds.setter
389
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
390
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
390
391
  pulumi.set(self, "max_lease_ttl_seconds", value)
391
392
 
392
393
  @property
393
394
  @pulumi.getter(name="maxRetries")
394
- def max_retries(self) -> Optional[pulumi.Input[int]]:
395
+ def max_retries(self) -> Optional[pulumi.Input[builtins.int]]:
395
396
  """
396
397
  Maximum number of retries when a 5xx error code is encountered.
397
398
  """
398
399
  return pulumi.get(self, "max_retries")
399
400
 
400
401
  @max_retries.setter
401
- def max_retries(self, value: Optional[pulumi.Input[int]]):
402
+ def max_retries(self, value: Optional[pulumi.Input[builtins.int]]):
402
403
  pulumi.set(self, "max_retries", value)
403
404
 
404
405
  @property
405
406
  @pulumi.getter(name="maxRetriesCcc")
406
- def max_retries_ccc(self) -> Optional[pulumi.Input[int]]:
407
+ def max_retries_ccc(self) -> Optional[pulumi.Input[builtins.int]]:
407
408
  """
408
409
  Maximum number of retries for Client Controlled Consistency related operations
409
410
  """
410
411
  return pulumi.get(self, "max_retries_ccc")
411
412
 
412
413
  @max_retries_ccc.setter
413
- def max_retries_ccc(self, value: Optional[pulumi.Input[int]]):
414
+ def max_retries_ccc(self, value: Optional[pulumi.Input[builtins.int]]):
414
415
  pulumi.set(self, "max_retries_ccc", value)
415
416
 
416
417
  @property
417
418
  @pulumi.getter
418
- def namespace(self) -> Optional[pulumi.Input[str]]:
419
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
419
420
  """
420
421
  The namespace to use. Available only for Vault Enterprise.
421
422
  """
422
423
  return pulumi.get(self, "namespace")
423
424
 
424
425
  @namespace.setter
425
- def namespace(self, value: Optional[pulumi.Input[str]]):
426
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
426
427
  pulumi.set(self, "namespace", value)
427
428
 
428
429
  @property
429
430
  @pulumi.getter(name="setNamespaceFromToken")
430
- def set_namespace_from_token(self) -> Optional[pulumi.Input[bool]]:
431
+ def set_namespace_from_token(self) -> Optional[pulumi.Input[builtins.bool]]:
431
432
  """
432
433
  In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
433
434
  token namespace as the root namespace for all resources.
@@ -435,79 +436,79 @@ class ProviderArgs:
435
436
  return pulumi.get(self, "set_namespace_from_token")
436
437
 
437
438
  @set_namespace_from_token.setter
438
- def set_namespace_from_token(self, value: Optional[pulumi.Input[bool]]):
439
+ def set_namespace_from_token(self, value: Optional[pulumi.Input[builtins.bool]]):
439
440
  pulumi.set(self, "set_namespace_from_token", value)
440
441
 
441
442
  @property
442
443
  @pulumi.getter(name="skipChildToken")
443
- def skip_child_token(self) -> Optional[pulumi.Input[bool]]:
444
+ def skip_child_token(self) -> Optional[pulumi.Input[builtins.bool]]:
444
445
  """
445
446
  Set this to true to prevent the creation of ephemeral child token used by this provider.
446
447
  """
447
448
  return pulumi.get(self, "skip_child_token")
448
449
 
449
450
  @skip_child_token.setter
450
- def skip_child_token(self, value: Optional[pulumi.Input[bool]]):
451
+ def skip_child_token(self, value: Optional[pulumi.Input[builtins.bool]]):
451
452
  pulumi.set(self, "skip_child_token", value)
452
453
 
453
454
  @property
454
455
  @pulumi.getter(name="skipGetVaultVersion")
455
- def skip_get_vault_version(self) -> Optional[pulumi.Input[bool]]:
456
+ def skip_get_vault_version(self) -> Optional[pulumi.Input[builtins.bool]]:
456
457
  """
457
458
  Skip the dynamic fetching of the Vault server version.
458
459
  """
459
460
  return pulumi.get(self, "skip_get_vault_version")
460
461
 
461
462
  @skip_get_vault_version.setter
462
- def skip_get_vault_version(self, value: Optional[pulumi.Input[bool]]):
463
+ def skip_get_vault_version(self, value: Optional[pulumi.Input[builtins.bool]]):
463
464
  pulumi.set(self, "skip_get_vault_version", value)
464
465
 
465
466
  @property
466
467
  @pulumi.getter(name="skipTlsVerify")
467
- def skip_tls_verify(self) -> Optional[pulumi.Input[bool]]:
468
+ def skip_tls_verify(self) -> Optional[pulumi.Input[builtins.bool]]:
468
469
  """
469
470
  Set this to true only if the target Vault server is an insecure development instance.
470
471
  """
471
472
  return pulumi.get(self, "skip_tls_verify")
472
473
 
473
474
  @skip_tls_verify.setter
474
- def skip_tls_verify(self, value: Optional[pulumi.Input[bool]]):
475
+ def skip_tls_verify(self, value: Optional[pulumi.Input[builtins.bool]]):
475
476
  pulumi.set(self, "skip_tls_verify", value)
476
477
 
477
478
  @property
478
479
  @pulumi.getter(name="tlsServerName")
479
- def tls_server_name(self) -> Optional[pulumi.Input[str]]:
480
+ def tls_server_name(self) -> Optional[pulumi.Input[builtins.str]]:
480
481
  """
481
482
  Name to use as the SNI host when connecting via TLS.
482
483
  """
483
484
  return pulumi.get(self, "tls_server_name")
484
485
 
485
486
  @tls_server_name.setter
486
- def tls_server_name(self, value: Optional[pulumi.Input[str]]):
487
+ def tls_server_name(self, value: Optional[pulumi.Input[builtins.str]]):
487
488
  pulumi.set(self, "tls_server_name", value)
488
489
 
489
490
  @property
490
491
  @pulumi.getter(name="tokenName")
491
- def token_name(self) -> Optional[pulumi.Input[str]]:
492
+ def token_name(self) -> Optional[pulumi.Input[builtins.str]]:
492
493
  """
493
494
  Token name to use for creating the Vault child token.
494
495
  """
495
496
  return pulumi.get(self, "token_name")
496
497
 
497
498
  @token_name.setter
498
- def token_name(self, value: Optional[pulumi.Input[str]]):
499
+ def token_name(self, value: Optional[pulumi.Input[builtins.str]]):
499
500
  pulumi.set(self, "token_name", value)
500
501
 
501
502
  @property
502
503
  @pulumi.getter(name="vaultVersionOverride")
503
- def vault_version_override(self) -> Optional[pulumi.Input[str]]:
504
+ def vault_version_override(self) -> Optional[pulumi.Input[builtins.str]]:
504
505
  """
505
506
  Override the Vault server version, which is normally determined dynamically from the target Vault server
506
507
  """
507
508
  return pulumi.get(self, "vault_version_override")
508
509
 
509
510
  @vault_version_override.setter
510
- def vault_version_override(self, value: Optional[pulumi.Input[str]]):
511
+ def vault_version_override(self, value: Optional[pulumi.Input[builtins.str]]):
511
512
  pulumi.set(self, "vault_version_override", value)
512
513
 
513
514
 
@@ -516,8 +517,8 @@ class Provider(pulumi.ProviderResource):
516
517
  def __init__(__self__,
517
518
  resource_name: str,
518
519
  opts: Optional[pulumi.ResourceOptions] = None,
519
- add_address_to_env: Optional[pulumi.Input[str]] = None,
520
- address: Optional[pulumi.Input[str]] = None,
520
+ add_address_to_env: Optional[pulumi.Input[builtins.str]] = None,
521
+ address: Optional[pulumi.Input[builtins.str]] = None,
521
522
  auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
522
523
  auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
523
524
  auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
@@ -530,22 +531,22 @@ class Provider(pulumi.ProviderResource):
530
531
  auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
531
532
  auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
532
533
  auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
533
- ca_cert_dir: Optional[pulumi.Input[str]] = None,
534
- ca_cert_file: Optional[pulumi.Input[str]] = None,
534
+ ca_cert_dir: Optional[pulumi.Input[builtins.str]] = None,
535
+ ca_cert_file: Optional[pulumi.Input[builtins.str]] = None,
535
536
  client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
536
537
  headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
537
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
538
- max_retries: Optional[pulumi.Input[int]] = None,
539
- max_retries_ccc: Optional[pulumi.Input[int]] = None,
540
- namespace: Optional[pulumi.Input[str]] = None,
541
- set_namespace_from_token: Optional[pulumi.Input[bool]] = None,
542
- skip_child_token: Optional[pulumi.Input[bool]] = None,
543
- skip_get_vault_version: Optional[pulumi.Input[bool]] = None,
544
- skip_tls_verify: Optional[pulumi.Input[bool]] = None,
545
- tls_server_name: Optional[pulumi.Input[str]] = None,
546
- token: Optional[pulumi.Input[str]] = None,
547
- token_name: Optional[pulumi.Input[str]] = None,
548
- vault_version_override: Optional[pulumi.Input[str]] = None,
538
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
539
+ max_retries: Optional[pulumi.Input[builtins.int]] = None,
540
+ max_retries_ccc: Optional[pulumi.Input[builtins.int]] = None,
541
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
542
+ set_namespace_from_token: Optional[pulumi.Input[builtins.bool]] = None,
543
+ skip_child_token: Optional[pulumi.Input[builtins.bool]] = None,
544
+ skip_get_vault_version: Optional[pulumi.Input[builtins.bool]] = None,
545
+ skip_tls_verify: Optional[pulumi.Input[builtins.bool]] = None,
546
+ tls_server_name: Optional[pulumi.Input[builtins.str]] = None,
547
+ token: Optional[pulumi.Input[builtins.str]] = None,
548
+ token_name: Optional[pulumi.Input[builtins.str]] = None,
549
+ vault_version_override: Optional[pulumi.Input[builtins.str]] = None,
549
550
  __props__=None):
550
551
  """
551
552
  The provider type for the vault package. By default, resources use package-wide configuration
@@ -555,7 +556,7 @@ class Provider(pulumi.ProviderResource):
555
556
 
556
557
  :param str resource_name: The name of the resource.
557
558
  :param pulumi.ResourceOptions opts: Options for the resource.
558
- :param pulumi.Input[str] address: URL of the root of the target Vault server.
559
+ :param pulumi.Input[builtins.str] address: URL of the root of the target Vault server.
559
560
  :param pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
560
561
  :param pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']] auth_login_aws: Login to vault using the AWS method
561
562
  :param pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']] auth_login_azure: Login to vault using the azure method
@@ -568,23 +569,23 @@ class Provider(pulumi.ProviderResource):
568
569
  :param pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']] auth_login_radius: Login to vault using the radius method
569
570
  :param pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']] auth_login_token_file: Login to vault using
570
571
  :param pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']] auth_login_userpass: Login to vault using the userpass method
571
- :param pulumi.Input[str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
572
- :param pulumi.Input[str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
572
+ :param pulumi.Input[builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
573
+ :param pulumi.Input[builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
573
574
  :param pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']] client_auth: Client authentication credentials.
574
575
  :param pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]] headers: The headers to send with each Vault request.
575
- :param pulumi.Input[int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
576
- :param pulumi.Input[int] max_retries: Maximum number of retries when a 5xx error code is encountered.
577
- :param pulumi.Input[int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
578
- :param pulumi.Input[str] namespace: The namespace to use. Available only for Vault Enterprise.
579
- :param pulumi.Input[bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
576
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
577
+ :param pulumi.Input[builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
578
+ :param pulumi.Input[builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
579
+ :param pulumi.Input[builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
580
+ :param pulumi.Input[builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
580
581
  token namespace as the root namespace for all resources.
581
- :param pulumi.Input[bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
582
- :param pulumi.Input[bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
583
- :param pulumi.Input[bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
584
- :param pulumi.Input[str] tls_server_name: Name to use as the SNI host when connecting via TLS.
585
- :param pulumi.Input[str] token: Token to use to authenticate to Vault.
586
- :param pulumi.Input[str] token_name: Token name to use for creating the Vault child token.
587
- :param pulumi.Input[str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
582
+ :param pulumi.Input[builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
583
+ :param pulumi.Input[builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
584
+ :param pulumi.Input[builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
585
+ :param pulumi.Input[builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
586
+ :param pulumi.Input[builtins.str] token: Token to use to authenticate to Vault.
587
+ :param pulumi.Input[builtins.str] token_name: Token name to use for creating the Vault child token.
588
+ :param pulumi.Input[builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
588
589
  """
589
590
  ...
590
591
  @overload
@@ -613,8 +614,8 @@ class Provider(pulumi.ProviderResource):
613
614
  def _internal_init(__self__,
614
615
  resource_name: str,
615
616
  opts: Optional[pulumi.ResourceOptions] = None,
616
- add_address_to_env: Optional[pulumi.Input[str]] = None,
617
- address: Optional[pulumi.Input[str]] = None,
617
+ add_address_to_env: Optional[pulumi.Input[builtins.str]] = None,
618
+ address: Optional[pulumi.Input[builtins.str]] = None,
618
619
  auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
619
620
  auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
620
621
  auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
@@ -627,22 +628,22 @@ class Provider(pulumi.ProviderResource):
627
628
  auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
628
629
  auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
629
630
  auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
630
- ca_cert_dir: Optional[pulumi.Input[str]] = None,
631
- ca_cert_file: Optional[pulumi.Input[str]] = None,
631
+ ca_cert_dir: Optional[pulumi.Input[builtins.str]] = None,
632
+ ca_cert_file: Optional[pulumi.Input[builtins.str]] = None,
632
633
  client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
633
634
  headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
634
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
635
- max_retries: Optional[pulumi.Input[int]] = None,
636
- max_retries_ccc: Optional[pulumi.Input[int]] = None,
637
- namespace: Optional[pulumi.Input[str]] = None,
638
- set_namespace_from_token: Optional[pulumi.Input[bool]] = None,
639
- skip_child_token: Optional[pulumi.Input[bool]] = None,
640
- skip_get_vault_version: Optional[pulumi.Input[bool]] = None,
641
- skip_tls_verify: Optional[pulumi.Input[bool]] = None,
642
- tls_server_name: Optional[pulumi.Input[str]] = None,
643
- token: Optional[pulumi.Input[str]] = None,
644
- token_name: Optional[pulumi.Input[str]] = None,
645
- vault_version_override: Optional[pulumi.Input[str]] = None,
635
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
636
+ max_retries: Optional[pulumi.Input[builtins.int]] = None,
637
+ max_retries_ccc: Optional[pulumi.Input[builtins.int]] = None,
638
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
639
+ set_namespace_from_token: Optional[pulumi.Input[builtins.bool]] = None,
640
+ skip_child_token: Optional[pulumi.Input[builtins.bool]] = None,
641
+ skip_get_vault_version: Optional[pulumi.Input[builtins.bool]] = None,
642
+ skip_tls_verify: Optional[pulumi.Input[builtins.bool]] = None,
643
+ tls_server_name: Optional[pulumi.Input[builtins.str]] = None,
644
+ token: Optional[pulumi.Input[builtins.str]] = None,
645
+ token_name: Optional[pulumi.Input[builtins.str]] = None,
646
+ vault_version_override: Optional[pulumi.Input[builtins.str]] = None,
646
647
  __props__=None):
647
648
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
648
649
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -700,12 +701,12 @@ class Provider(pulumi.ProviderResource):
700
701
 
701
702
  @property
702
703
  @pulumi.getter(name="addAddressToEnv")
703
- def add_address_to_env(self) -> pulumi.Output[Optional[str]]:
704
+ def add_address_to_env(self) -> pulumi.Output[Optional[builtins.str]]:
704
705
  return pulumi.get(self, "add_address_to_env")
705
706
 
706
707
  @property
707
708
  @pulumi.getter
708
- def address(self) -> pulumi.Output[str]:
709
+ def address(self) -> pulumi.Output[builtins.str]:
709
710
  """
710
711
  URL of the root of the target Vault server.
711
712
  """
@@ -713,7 +714,7 @@ class Provider(pulumi.ProviderResource):
713
714
 
714
715
  @property
715
716
  @pulumi.getter(name="caCertDir")
716
- def ca_cert_dir(self) -> pulumi.Output[Optional[str]]:
717
+ def ca_cert_dir(self) -> pulumi.Output[Optional[builtins.str]]:
717
718
  """
718
719
  Path to directory containing CA certificate files to validate the server's certificate.
719
720
  """
@@ -721,7 +722,7 @@ class Provider(pulumi.ProviderResource):
721
722
 
722
723
  @property
723
724
  @pulumi.getter(name="caCertFile")
724
- def ca_cert_file(self) -> pulumi.Output[Optional[str]]:
725
+ def ca_cert_file(self) -> pulumi.Output[Optional[builtins.str]]:
725
726
  """
726
727
  Path to a CA certificate file to validate the server's certificate.
727
728
  """
@@ -729,7 +730,7 @@ class Provider(pulumi.ProviderResource):
729
730
 
730
731
  @property
731
732
  @pulumi.getter
732
- def namespace(self) -> pulumi.Output[Optional[str]]:
733
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
733
734
  """
734
735
  The namespace to use. Available only for Vault Enterprise.
735
736
  """
@@ -737,7 +738,7 @@ class Provider(pulumi.ProviderResource):
737
738
 
738
739
  @property
739
740
  @pulumi.getter(name="tlsServerName")
740
- def tls_server_name(self) -> pulumi.Output[Optional[str]]:
741
+ def tls_server_name(self) -> pulumi.Output[Optional[builtins.str]]:
741
742
  """
742
743
  Name to use as the SNI host when connecting via TLS.
743
744
  """
@@ -745,7 +746,7 @@ class Provider(pulumi.ProviderResource):
745
746
 
746
747
  @property
747
748
  @pulumi.getter
748
- def token(self) -> pulumi.Output[str]:
749
+ def token(self) -> pulumi.Output[builtins.str]:
749
750
  """
750
751
  Token to use to authenticate to Vault.
751
752
  """
@@ -753,7 +754,7 @@ class Provider(pulumi.ProviderResource):
753
754
 
754
755
  @property
755
756
  @pulumi.getter(name="tokenName")
756
- def token_name(self) -> pulumi.Output[Optional[str]]:
757
+ def token_name(self) -> pulumi.Output[Optional[builtins.str]]:
757
758
  """
758
759
  Token name to use for creating the Vault child token.
759
760
  """
@@ -761,7 +762,7 @@ class Provider(pulumi.ProviderResource):
761
762
 
762
763
  @property
763
764
  @pulumi.getter(name="vaultVersionOverride")
764
- def vault_version_override(self) -> pulumi.Output[Optional[str]]:
765
+ def vault_version_override(self) -> pulumi.Output[Optional[builtins.str]]:
765
766
  """
766
767
  Override the Vault server version, which is normally determined dynamically from the target Vault server
767
768
  """
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "vault",
4
- "version": "6.6.0-alpha.1741415971"
4
+ "version": "6.7.0"
5
5
  }