pulumi-vault 6.6.0a1741415971__py3-none-any.whl → 6.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +9 -0
  2. pulumi_vault/_inputs.py +583 -562
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +425 -200
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +523 -306
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +288 -70
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +383 -130
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +432 -186
  38. pulumi_vault/azure/backend_role.py +188 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +3857 -2200
  53. pulumi_vault/database/outputs.py +2483 -1330
  54. pulumi_vault/database/secret_backend_connection.py +333 -112
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +283 -140
  57. pulumi_vault/database/secrets_mount.py +275 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +426 -205
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +420 -179
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +68 -18
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +754 -533
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +720 -499
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +73 -60
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +3 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -36
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +174 -126
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1377 -0
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +152 -104
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +278 -0
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +35 -17
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +139 -25
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -31
  191. pulumi_vault/pkisecret/secret_backend_cert.py +439 -297
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +237 -182
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +520 -378
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +441 -175
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +894 -644
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +851 -427
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +936 -357
  203. pulumi_vault/pkisecret/secret_backend_sign.py +347 -252
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +2 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +295 -0
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +96 -95
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +3 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +325 -0
  257. pulumi_vault/transit/get_verify.py +355 -0
  258. pulumi_vault/transit/secret_backend_key.py +394 -231
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
  261. pulumi_vault-6.7.0.dist-info/RECORD +265 -0
  262. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
  263. pulumi_vault-6.6.0a1741415971.dist-info/RECORD +0 -260
  264. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -52,32 +53,32 @@ class AuthBackendTune(dict):
52
53
  return super().get(key, default)
53
54
 
54
55
  def __init__(__self__, *,
55
- allowed_response_headers: Optional[Sequence[str]] = None,
56
- audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
57
- audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
58
- default_lease_ttl: Optional[str] = None,
59
- listing_visibility: Optional[str] = None,
60
- max_lease_ttl: Optional[str] = None,
61
- passthrough_request_headers: Optional[Sequence[str]] = None,
62
- token_type: Optional[str] = None):
63
- """
64
- :param Sequence[str] allowed_response_headers: List of headers to whitelist and allowing
56
+ allowed_response_headers: Optional[Sequence[builtins.str]] = None,
57
+ audit_non_hmac_request_keys: Optional[Sequence[builtins.str]] = None,
58
+ audit_non_hmac_response_keys: Optional[Sequence[builtins.str]] = None,
59
+ default_lease_ttl: Optional[builtins.str] = None,
60
+ listing_visibility: Optional[builtins.str] = None,
61
+ max_lease_ttl: Optional[builtins.str] = None,
62
+ passthrough_request_headers: Optional[Sequence[builtins.str]] = None,
63
+ token_type: Optional[builtins.str] = None):
64
+ """
65
+ :param Sequence[builtins.str] allowed_response_headers: List of headers to whitelist and allowing
65
66
  a plugin to include them in the response.
66
- :param Sequence[str] audit_non_hmac_request_keys: Specifies the list of keys that will
67
+ :param Sequence[builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
67
68
  not be HMAC'd by audit devices in the request data object.
68
- :param Sequence[str] audit_non_hmac_response_keys: Specifies the list of keys that will
69
+ :param Sequence[builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
69
70
  not be HMAC'd by audit devices in the response data object.
70
- :param str default_lease_ttl: Specifies the default time-to-live.
71
+ :param builtins.str default_lease_ttl: Specifies the default time-to-live.
71
72
  If set, this overrides the global default.
72
73
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
73
- :param str listing_visibility: Specifies whether to show this mount in
74
+ :param builtins.str listing_visibility: Specifies whether to show this mount in
74
75
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
75
- :param str max_lease_ttl: Specifies the maximum time-to-live.
76
+ :param builtins.str max_lease_ttl: Specifies the maximum time-to-live.
76
77
  If set, this overrides the global default.
77
78
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
78
- :param Sequence[str] passthrough_request_headers: List of headers to whitelist and
79
+ :param Sequence[builtins.str] passthrough_request_headers: List of headers to whitelist and
79
80
  pass from the request to the backend.
80
- :param str token_type: Specifies the type of tokens that should be returned by
81
+ :param builtins.str token_type: Specifies the type of tokens that should be returned by
81
82
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
82
83
  """
83
84
  if allowed_response_headers is not None:
@@ -99,7 +100,7 @@ class AuthBackendTune(dict):
99
100
 
100
101
  @property
101
102
  @pulumi.getter(name="allowedResponseHeaders")
102
- def allowed_response_headers(self) -> Optional[Sequence[str]]:
103
+ def allowed_response_headers(self) -> Optional[Sequence[builtins.str]]:
103
104
  """
104
105
  List of headers to whitelist and allowing
105
106
  a plugin to include them in the response.
@@ -108,7 +109,7 @@ class AuthBackendTune(dict):
108
109
 
109
110
  @property
110
111
  @pulumi.getter(name="auditNonHmacRequestKeys")
111
- def audit_non_hmac_request_keys(self) -> Optional[Sequence[str]]:
112
+ def audit_non_hmac_request_keys(self) -> Optional[Sequence[builtins.str]]:
112
113
  """
113
114
  Specifies the list of keys that will
114
115
  not be HMAC'd by audit devices in the request data object.
@@ -117,7 +118,7 @@ class AuthBackendTune(dict):
117
118
 
118
119
  @property
119
120
  @pulumi.getter(name="auditNonHmacResponseKeys")
120
- def audit_non_hmac_response_keys(self) -> Optional[Sequence[str]]:
121
+ def audit_non_hmac_response_keys(self) -> Optional[Sequence[builtins.str]]:
121
122
  """
122
123
  Specifies the list of keys that will
123
124
  not be HMAC'd by audit devices in the response data object.
@@ -126,7 +127,7 @@ class AuthBackendTune(dict):
126
127
 
127
128
  @property
128
129
  @pulumi.getter(name="defaultLeaseTtl")
129
- def default_lease_ttl(self) -> Optional[str]:
130
+ def default_lease_ttl(self) -> Optional[builtins.str]:
130
131
  """
131
132
  Specifies the default time-to-live.
132
133
  If set, this overrides the global default.
@@ -136,7 +137,7 @@ class AuthBackendTune(dict):
136
137
 
137
138
  @property
138
139
  @pulumi.getter(name="listingVisibility")
139
- def listing_visibility(self) -> Optional[str]:
140
+ def listing_visibility(self) -> Optional[builtins.str]:
140
141
  """
141
142
  Specifies whether to show this mount in
142
143
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
@@ -145,7 +146,7 @@ class AuthBackendTune(dict):
145
146
 
146
147
  @property
147
148
  @pulumi.getter(name="maxLeaseTtl")
148
- def max_lease_ttl(self) -> Optional[str]:
149
+ def max_lease_ttl(self) -> Optional[builtins.str]:
149
150
  """
150
151
  Specifies the maximum time-to-live.
151
152
  If set, this overrides the global default.
@@ -155,7 +156,7 @@ class AuthBackendTune(dict):
155
156
 
156
157
  @property
157
158
  @pulumi.getter(name="passthroughRequestHeaders")
158
- def passthrough_request_headers(self) -> Optional[Sequence[str]]:
159
+ def passthrough_request_headers(self) -> Optional[Sequence[builtins.str]]:
159
160
  """
160
161
  List of headers to whitelist and
161
162
  pass from the request to the backend.
@@ -164,7 +165,7 @@ class AuthBackendTune(dict):
164
165
 
165
166
  @property
166
167
  @pulumi.getter(name="tokenType")
167
- def token_type(self) -> Optional[str]:
168
+ def token_type(self) -> Optional[builtins.str]:
168
169
  """
169
170
  Specifies the type of tokens that should be returned by
170
171
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,20 +20,20 @@ __all__ = ['TeamArgs', 'Team']
19
20
  @pulumi.input_type
20
21
  class TeamArgs:
21
22
  def __init__(__self__, *,
22
- team: pulumi.Input[str],
23
- backend: Optional[pulumi.Input[str]] = None,
24
- namespace: Optional[pulumi.Input[str]] = None,
25
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
23
+ team: pulumi.Input[builtins.str],
24
+ backend: Optional[pulumi.Input[builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
26
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
26
27
  """
27
28
  The set of arguments for constructing a Team resource.
28
- :param pulumi.Input[str] team: GitHub team name in "slugified" format.
29
- :param pulumi.Input[str] backend: Path where the github auth backend is mounted. Defaults to `github`
29
+ :param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
30
+ :param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
30
31
  if not specified.
31
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
32
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
32
33
  The value should not contain leading or trailing forward slashes.
33
34
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
35
  *Available only for Vault Enterprise*.
35
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
36
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
36
37
  issued using this role.
37
38
  """
38
39
  pulumi.set(__self__, "team", team)
@@ -45,19 +46,19 @@ class TeamArgs:
45
46
 
46
47
  @property
47
48
  @pulumi.getter
48
- def team(self) -> pulumi.Input[str]:
49
+ def team(self) -> pulumi.Input[builtins.str]:
49
50
  """
50
51
  GitHub team name in "slugified" format.
51
52
  """
52
53
  return pulumi.get(self, "team")
53
54
 
54
55
  @team.setter
55
- def team(self, value: pulumi.Input[str]):
56
+ def team(self, value: pulumi.Input[builtins.str]):
56
57
  pulumi.set(self, "team", value)
57
58
 
58
59
  @property
59
60
  @pulumi.getter
60
- def backend(self) -> Optional[pulumi.Input[str]]:
61
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
61
62
  """
62
63
  Path where the github auth backend is mounted. Defaults to `github`
63
64
  if not specified.
@@ -65,12 +66,12 @@ class TeamArgs:
65
66
  return pulumi.get(self, "backend")
66
67
 
67
68
  @backend.setter
68
- def backend(self, value: Optional[pulumi.Input[str]]):
69
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
69
70
  pulumi.set(self, "backend", value)
70
71
 
71
72
  @property
72
73
  @pulumi.getter
73
- def namespace(self) -> Optional[pulumi.Input[str]]:
74
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
74
75
  """
75
76
  The namespace to provision the resource in.
76
77
  The value should not contain leading or trailing forward slashes.
@@ -80,12 +81,12 @@ class TeamArgs:
80
81
  return pulumi.get(self, "namespace")
81
82
 
82
83
  @namespace.setter
83
- def namespace(self, value: Optional[pulumi.Input[str]]):
84
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
84
85
  pulumi.set(self, "namespace", value)
85
86
 
86
87
  @property
87
88
  @pulumi.getter
88
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
89
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
89
90
  """
90
91
  An array of strings specifying the policies to be set on tokens
91
92
  issued using this role.
@@ -93,28 +94,28 @@ class TeamArgs:
93
94
  return pulumi.get(self, "policies")
94
95
 
95
96
  @policies.setter
96
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
97
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
97
98
  pulumi.set(self, "policies", value)
98
99
 
99
100
 
100
101
  @pulumi.input_type
101
102
  class _TeamState:
102
103
  def __init__(__self__, *,
103
- backend: Optional[pulumi.Input[str]] = None,
104
- namespace: Optional[pulumi.Input[str]] = None,
105
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
106
- team: Optional[pulumi.Input[str]] = None):
104
+ backend: Optional[pulumi.Input[builtins.str]] = None,
105
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
106
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
107
+ team: Optional[pulumi.Input[builtins.str]] = None):
107
108
  """
108
109
  Input properties used for looking up and filtering Team resources.
109
- :param pulumi.Input[str] backend: Path where the github auth backend is mounted. Defaults to `github`
110
+ :param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
110
111
  if not specified.
111
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
112
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
112
113
  The value should not contain leading or trailing forward slashes.
113
114
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
114
115
  *Available only for Vault Enterprise*.
115
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
116
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
116
117
  issued using this role.
117
- :param pulumi.Input[str] team: GitHub team name in "slugified" format.
118
+ :param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
118
119
  """
119
120
  if backend is not None:
120
121
  pulumi.set(__self__, "backend", backend)
@@ -127,7 +128,7 @@ class _TeamState:
127
128
 
128
129
  @property
129
130
  @pulumi.getter
130
- def backend(self) -> Optional[pulumi.Input[str]]:
131
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
131
132
  """
132
133
  Path where the github auth backend is mounted. Defaults to `github`
133
134
  if not specified.
@@ -135,12 +136,12 @@ class _TeamState:
135
136
  return pulumi.get(self, "backend")
136
137
 
137
138
  @backend.setter
138
- def backend(self, value: Optional[pulumi.Input[str]]):
139
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
139
140
  pulumi.set(self, "backend", value)
140
141
 
141
142
  @property
142
143
  @pulumi.getter
143
- def namespace(self) -> Optional[pulumi.Input[str]]:
144
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
144
145
  """
145
146
  The namespace to provision the resource in.
146
147
  The value should not contain leading or trailing forward slashes.
@@ -150,12 +151,12 @@ class _TeamState:
150
151
  return pulumi.get(self, "namespace")
151
152
 
152
153
  @namespace.setter
153
- def namespace(self, value: Optional[pulumi.Input[str]]):
154
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
154
155
  pulumi.set(self, "namespace", value)
155
156
 
156
157
  @property
157
158
  @pulumi.getter
158
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
159
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
159
160
  """
160
161
  An array of strings specifying the policies to be set on tokens
161
162
  issued using this role.
@@ -163,19 +164,19 @@ class _TeamState:
163
164
  return pulumi.get(self, "policies")
164
165
 
165
166
  @policies.setter
166
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
167
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
167
168
  pulumi.set(self, "policies", value)
168
169
 
169
170
  @property
170
171
  @pulumi.getter
171
- def team(self) -> Optional[pulumi.Input[str]]:
172
+ def team(self) -> Optional[pulumi.Input[builtins.str]]:
172
173
  """
173
174
  GitHub team name in "slugified" format.
174
175
  """
175
176
  return pulumi.get(self, "team")
176
177
 
177
178
  @team.setter
178
- def team(self, value: Optional[pulumi.Input[str]]):
179
+ def team(self, value: Optional[pulumi.Input[builtins.str]]):
179
180
  pulumi.set(self, "team", value)
180
181
 
181
182
 
@@ -184,10 +185,10 @@ class Team(pulumi.CustomResource):
184
185
  def __init__(__self__,
185
186
  resource_name: str,
186
187
  opts: Optional[pulumi.ResourceOptions] = None,
187
- backend: Optional[pulumi.Input[str]] = None,
188
- namespace: Optional[pulumi.Input[str]] = None,
189
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
190
- team: Optional[pulumi.Input[str]] = None,
188
+ backend: Optional[pulumi.Input[builtins.str]] = None,
189
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
190
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
191
+ team: Optional[pulumi.Input[builtins.str]] = None,
191
192
  __props__=None):
192
193
  """
193
194
  Manages policy mappings for Github Teams authenticated via Github. See the [Vault
@@ -220,15 +221,15 @@ class Team(pulumi.CustomResource):
220
221
 
221
222
  :param str resource_name: The name of the resource.
222
223
  :param pulumi.ResourceOptions opts: Options for the resource.
223
- :param pulumi.Input[str] backend: Path where the github auth backend is mounted. Defaults to `github`
224
+ :param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
224
225
  if not specified.
225
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
226
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
226
227
  The value should not contain leading or trailing forward slashes.
227
228
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
228
229
  *Available only for Vault Enterprise*.
229
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
230
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
230
231
  issued using this role.
231
- :param pulumi.Input[str] team: GitHub team name in "slugified" format.
232
+ :param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
232
233
  """
233
234
  ...
234
235
  @overload
@@ -280,10 +281,10 @@ class Team(pulumi.CustomResource):
280
281
  def _internal_init(__self__,
281
282
  resource_name: str,
282
283
  opts: Optional[pulumi.ResourceOptions] = None,
283
- backend: Optional[pulumi.Input[str]] = None,
284
- namespace: Optional[pulumi.Input[str]] = None,
285
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
286
- team: Optional[pulumi.Input[str]] = None,
284
+ backend: Optional[pulumi.Input[builtins.str]] = None,
285
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
286
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
287
+ team: Optional[pulumi.Input[builtins.str]] = None,
287
288
  __props__=None):
288
289
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
289
290
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -309,10 +310,10 @@ class Team(pulumi.CustomResource):
309
310
  def get(resource_name: str,
310
311
  id: pulumi.Input[str],
311
312
  opts: Optional[pulumi.ResourceOptions] = None,
312
- backend: Optional[pulumi.Input[str]] = None,
313
- namespace: Optional[pulumi.Input[str]] = None,
314
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
315
- team: Optional[pulumi.Input[str]] = None) -> 'Team':
313
+ backend: Optional[pulumi.Input[builtins.str]] = None,
314
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
315
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
316
+ team: Optional[pulumi.Input[builtins.str]] = None) -> 'Team':
316
317
  """
317
318
  Get an existing Team resource's state with the given name, id, and optional extra
318
319
  properties used to qualify the lookup.
@@ -320,15 +321,15 @@ class Team(pulumi.CustomResource):
320
321
  :param str resource_name: The unique name of the resulting resource.
321
322
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
322
323
  :param pulumi.ResourceOptions opts: Options for the resource.
323
- :param pulumi.Input[str] backend: Path where the github auth backend is mounted. Defaults to `github`
324
+ :param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
324
325
  if not specified.
325
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
326
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
326
327
  The value should not contain leading or trailing forward slashes.
327
328
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
328
329
  *Available only for Vault Enterprise*.
329
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: An array of strings specifying the policies to be set on tokens
330
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
330
331
  issued using this role.
331
- :param pulumi.Input[str] team: GitHub team name in "slugified" format.
332
+ :param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
332
333
  """
333
334
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
334
335
 
@@ -342,7 +343,7 @@ class Team(pulumi.CustomResource):
342
343
 
343
344
  @property
344
345
  @pulumi.getter
345
- def backend(self) -> pulumi.Output[Optional[str]]:
346
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
346
347
  """
347
348
  Path where the github auth backend is mounted. Defaults to `github`
348
349
  if not specified.
@@ -351,7 +352,7 @@ class Team(pulumi.CustomResource):
351
352
 
352
353
  @property
353
354
  @pulumi.getter
354
- def namespace(self) -> pulumi.Output[Optional[str]]:
355
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
355
356
  """
356
357
  The namespace to provision the resource in.
357
358
  The value should not contain leading or trailing forward slashes.
@@ -362,7 +363,7 @@ class Team(pulumi.CustomResource):
362
363
 
363
364
  @property
364
365
  @pulumi.getter
365
- def policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
366
+ def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
366
367
  """
367
368
  An array of strings specifying the policies to be set on tokens
368
369
  issued using this role.
@@ -371,7 +372,7 @@ class Team(pulumi.CustomResource):
371
372
 
372
373
  @property
373
374
  @pulumi.getter
374
- def team(self) -> pulumi.Output[str]:
375
+ def team(self) -> pulumi.Output[builtins.str]:
375
376
  """
376
377
  GitHub team name in "slugified" format.
377
378
  """