pulumi-vault 6.6.0a1741836364__py3-none-any.whl → 6.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +583 -562
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +188 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +68 -18
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +73 -60
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
  261. pulumi_vault-6.7.0.dist-info/RECORD +265 -0
  262. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
  263. pulumi_vault-6.6.0a1741836364.dist-info/RECORD +0 -265
  264. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -42,7 +43,7 @@ class GetSecretsListResult:
42
43
 
43
44
  @property
44
45
  @pulumi.getter
45
- def id(self) -> str:
46
+ def id(self) -> builtins.str:
46
47
  """
47
48
  The provider-assigned unique ID for this managed resource.
48
49
  """
@@ -50,7 +51,7 @@ class GetSecretsListResult:
50
51
 
51
52
  @property
52
53
  @pulumi.getter
53
- def names(self) -> Sequence[str]:
54
+ def names(self) -> Sequence[builtins.str]:
54
55
  """
55
56
  List of all secret names listed under the given path.
56
57
  """
@@ -58,12 +59,12 @@ class GetSecretsListResult:
58
59
 
59
60
  @property
60
61
  @pulumi.getter
61
- def namespace(self) -> Optional[str]:
62
+ def namespace(self) -> Optional[builtins.str]:
62
63
  return pulumi.get(self, "namespace")
63
64
 
64
65
  @property
65
66
  @pulumi.getter
66
- def path(self) -> str:
67
+ def path(self) -> builtins.str:
67
68
  return pulumi.get(self, "path")
68
69
 
69
70
 
@@ -79,8 +80,8 @@ class AwaitableGetSecretsListResult(GetSecretsListResult):
79
80
  path=self.path)
80
81
 
81
82
 
82
- def get_secrets_list(namespace: Optional[str] = None,
83
- path: Optional[str] = None,
83
+ def get_secrets_list(namespace: Optional[builtins.str] = None,
84
+ path: Optional[builtins.str] = None,
84
85
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretsListResult:
85
86
  """
86
87
  ## Example Usage
@@ -115,11 +116,11 @@ def get_secrets_list(namespace: Optional[str] = None,
115
116
  Use of this resource requires the `read` capability on the given path.
116
117
 
117
118
 
118
- :param str namespace: The namespace of the target resource.
119
+ :param builtins.str namespace: The namespace of the target resource.
119
120
  The value should not contain leading or trailing forward slashes.
120
121
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
121
122
  *Available only for Vault Enterprise*.
122
- :param str path: Full KV-V1 path where secrets will be listed.
123
+ :param builtins.str path: Full KV-V1 path where secrets will be listed.
123
124
  """
124
125
  __args__ = dict()
125
126
  __args__['namespace'] = namespace
@@ -132,8 +133,8 @@ def get_secrets_list(namespace: Optional[str] = None,
132
133
  names=pulumi.get(__ret__, 'names'),
133
134
  namespace=pulumi.get(__ret__, 'namespace'),
134
135
  path=pulumi.get(__ret__, 'path'))
135
- def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
136
- path: Optional[pulumi.Input[str]] = None,
136
+ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
137
+ path: Optional[pulumi.Input[builtins.str]] = None,
137
138
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretsListResult]:
138
139
  """
139
140
  ## Example Usage
@@ -168,11 +169,11 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
168
169
  Use of this resource requires the `read` capability on the given path.
169
170
 
170
171
 
171
- :param str namespace: The namespace of the target resource.
172
+ :param builtins.str namespace: The namespace of the target resource.
172
173
  The value should not contain leading or trailing forward slashes.
173
174
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
174
175
  *Available only for Vault Enterprise*.
175
- :param str path: Full KV-V1 path where secrets will be listed.
176
+ :param builtins.str path: Full KV-V1 path where secrets will be listed.
176
177
  """
177
178
  __args__ = dict()
178
179
  __args__['namespace'] = namespace
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -48,7 +49,7 @@ class GetSecretsListV2Result:
48
49
 
49
50
  @property
50
51
  @pulumi.getter
51
- def id(self) -> str:
52
+ def id(self) -> builtins.str:
52
53
  """
53
54
  The provider-assigned unique ID for this managed resource.
54
55
  """
@@ -56,17 +57,17 @@ class GetSecretsListV2Result:
56
57
 
57
58
  @property
58
59
  @pulumi.getter
59
- def mount(self) -> str:
60
+ def mount(self) -> builtins.str:
60
61
  return pulumi.get(self, "mount")
61
62
 
62
63
  @property
63
64
  @pulumi.getter
64
- def name(self) -> Optional[str]:
65
+ def name(self) -> Optional[builtins.str]:
65
66
  return pulumi.get(self, "name")
66
67
 
67
68
  @property
68
69
  @pulumi.getter
69
- def names(self) -> Sequence[str]:
70
+ def names(self) -> Sequence[builtins.str]:
70
71
  """
71
72
  List of all secret names listed under the given path.
72
73
  """
@@ -74,12 +75,12 @@ class GetSecretsListV2Result:
74
75
 
75
76
  @property
76
77
  @pulumi.getter
77
- def namespace(self) -> Optional[str]:
78
+ def namespace(self) -> Optional[builtins.str]:
78
79
  return pulumi.get(self, "namespace")
79
80
 
80
81
  @property
81
82
  @pulumi.getter
82
- def path(self) -> str:
83
+ def path(self) -> builtins.str:
83
84
  """
84
85
  Full path where the KV-V2 secrets are listed.
85
86
  """
@@ -100,9 +101,9 @@ class AwaitableGetSecretsListV2Result(GetSecretsListV2Result):
100
101
  path=self.path)
101
102
 
102
103
 
103
- def get_secrets_list_v2(mount: Optional[str] = None,
104
- name: Optional[str] = None,
105
- namespace: Optional[str] = None,
104
+ def get_secrets_list_v2(mount: Optional[builtins.str] = None,
105
+ name: Optional[builtins.str] = None,
106
+ namespace: Optional[builtins.str] = None,
106
107
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretsListV2Result:
107
108
  """
108
109
  ## Example Usage
@@ -147,12 +148,12 @@ def get_secrets_list_v2(mount: Optional[str] = None,
147
148
  Use of this resource requires the `read` capability on the given path.
148
149
 
149
150
 
150
- :param str mount: Path where KV-V2 engine is mounted.
151
- :param str name: Full name of the secret. For a nested secret
151
+ :param builtins.str mount: Path where KV-V2 engine is mounted.
152
+ :param builtins.str name: Full name of the secret. For a nested secret
152
153
  the name is the nested path excluding the mount and data
153
154
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
154
155
  the name is `foo/bar/baz`.
155
- :param str namespace: The namespace of the target resource.
156
+ :param builtins.str namespace: The namespace of the target resource.
156
157
  The value should not contain leading or trailing forward slashes.
157
158
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
158
159
  *Available only for Vault Enterprise*.
@@ -171,9 +172,9 @@ def get_secrets_list_v2(mount: Optional[str] = None,
171
172
  names=pulumi.get(__ret__, 'names'),
172
173
  namespace=pulumi.get(__ret__, 'namespace'),
173
174
  path=pulumi.get(__ret__, 'path'))
174
- def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
175
- name: Optional[pulumi.Input[Optional[str]]] = None,
176
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
175
+ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[builtins.str]] = None,
176
+ name: Optional[pulumi.Input[Optional[builtins.str]]] = None,
177
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
177
178
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretsListV2Result]:
178
179
  """
179
180
  ## Example Usage
@@ -218,12 +219,12 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
218
219
  Use of this resource requires the `read` capability on the given path.
219
220
 
220
221
 
221
- :param str mount: Path where KV-V2 engine is mounted.
222
- :param str name: Full name of the secret. For a nested secret
222
+ :param builtins.str mount: Path where KV-V2 engine is mounted.
223
+ :param builtins.str name: Full name of the secret. For a nested secret
223
224
  the name is the nested path excluding the mount and data
224
225
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
225
226
  the name is `foo/bar/baz`.
226
- :param str namespace: The namespace of the target resource.
227
+ :param builtins.str namespace: The namespace of the target resource.
227
228
  The value should not contain leading or trailing forward slashes.
228
229
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
229
230
  *Available only for Vault Enterprise*.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -42,18 +43,18 @@ class SecretV2CustomMetadata(dict):
42
43
  return super().get(key, default)
43
44
 
44
45
  def __init__(__self__, *,
45
- cas_required: Optional[bool] = None,
46
- data: Optional[Mapping[str, str]] = None,
47
- delete_version_after: Optional[int] = None,
48
- max_versions: Optional[int] = None):
46
+ cas_required: Optional[builtins.bool] = None,
47
+ data: Optional[Mapping[str, builtins.str]] = None,
48
+ delete_version_after: Optional[builtins.int] = None,
49
+ max_versions: Optional[builtins.int] = None):
49
50
  """
50
- :param bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
51
- :param Mapping[str, str] data: A mapping whose keys are the top-level data keys returned from
51
+ :param builtins.bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
52
+ :param Mapping[str, builtins.str] data: A mapping whose keys are the top-level data keys returned from
52
53
  Vault and whose values are the corresponding values. This map can only
53
54
  represent string data, so any non-string values returned from Vault are
54
55
  serialized as JSON.
55
- :param int delete_version_after: If set, specifies the length of time before a version is deleted.
56
- :param int max_versions: The number of versions to keep per key.
56
+ :param builtins.int delete_version_after: If set, specifies the length of time before a version is deleted.
57
+ :param builtins.int max_versions: The number of versions to keep per key.
57
58
  """
58
59
  if cas_required is not None:
59
60
  pulumi.set(__self__, "cas_required", cas_required)
@@ -66,7 +67,7 @@ class SecretV2CustomMetadata(dict):
66
67
 
67
68
  @property
68
69
  @pulumi.getter(name="casRequired")
69
- def cas_required(self) -> Optional[bool]:
70
+ def cas_required(self) -> Optional[builtins.bool]:
70
71
  """
71
72
  If true, all keys will require the cas parameter to be set on all write requests.
72
73
  """
@@ -74,7 +75,7 @@ class SecretV2CustomMetadata(dict):
74
75
 
75
76
  @property
76
77
  @pulumi.getter
77
- def data(self) -> Optional[Mapping[str, str]]:
78
+ def data(self) -> Optional[Mapping[str, builtins.str]]:
78
79
  """
79
80
  A mapping whose keys are the top-level data keys returned from
80
81
  Vault and whose values are the corresponding values. This map can only
@@ -85,7 +86,7 @@ class SecretV2CustomMetadata(dict):
85
86
 
86
87
  @property
87
88
  @pulumi.getter(name="deleteVersionAfter")
88
- def delete_version_after(self) -> Optional[int]:
89
+ def delete_version_after(self) -> Optional[builtins.int]:
89
90
  """
90
91
  If set, specifies the length of time before a version is deleted.
91
92
  """
@@ -93,7 +94,7 @@ class SecretV2CustomMetadata(dict):
93
94
 
94
95
  @property
95
96
  @pulumi.getter(name="maxVersions")
96
- def max_versions(self) -> Optional[int]:
97
+ def max_versions(self) -> Optional[builtins.int]:
97
98
  """
98
99
  The number of versions to keep per key.
99
100
  """
pulumi_vault/kv/secret.py CHANGED
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,15 +20,15 @@ __all__ = ['SecretArgs', 'Secret']
19
20
  @pulumi.input_type
20
21
  class SecretArgs:
21
22
  def __init__(__self__, *,
22
- data_json: pulumi.Input[str],
23
- path: pulumi.Input[str],
24
- namespace: Optional[pulumi.Input[str]] = None):
23
+ data_json: pulumi.Input[builtins.str],
24
+ path: pulumi.Input[builtins.str],
25
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
25
26
  """
26
27
  The set of arguments for constructing a Secret resource.
27
- :param pulumi.Input[str] data_json: JSON-encoded string that will be
28
+ :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
28
29
  written as the secret data at the given path.
29
- :param pulumi.Input[str] path: Full path of the KV-V1 secret.
30
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
30
+ :param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
31
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
31
32
  The value should not contain leading or trailing forward slashes.
32
33
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
34
  *Available only for Vault Enterprise*.
@@ -39,7 +40,7 @@ class SecretArgs:
39
40
 
40
41
  @property
41
42
  @pulumi.getter(name="dataJson")
42
- def data_json(self) -> pulumi.Input[str]:
43
+ def data_json(self) -> pulumi.Input[builtins.str]:
43
44
  """
44
45
  JSON-encoded string that will be
45
46
  written as the secret data at the given path.
@@ -47,24 +48,24 @@ class SecretArgs:
47
48
  return pulumi.get(self, "data_json")
48
49
 
49
50
  @data_json.setter
50
- def data_json(self, value: pulumi.Input[str]):
51
+ def data_json(self, value: pulumi.Input[builtins.str]):
51
52
  pulumi.set(self, "data_json", value)
52
53
 
53
54
  @property
54
55
  @pulumi.getter
55
- def path(self) -> pulumi.Input[str]:
56
+ def path(self) -> pulumi.Input[builtins.str]:
56
57
  """
57
58
  Full path of the KV-V1 secret.
58
59
  """
59
60
  return pulumi.get(self, "path")
60
61
 
61
62
  @path.setter
62
- def path(self, value: pulumi.Input[str]):
63
+ def path(self, value: pulumi.Input[builtins.str]):
63
64
  pulumi.set(self, "path", value)
64
65
 
65
66
  @property
66
67
  @pulumi.getter
67
- def namespace(self) -> Optional[pulumi.Input[str]]:
68
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
68
69
  """
69
70
  The namespace to provision the resource in.
70
71
  The value should not contain leading or trailing forward slashes.
@@ -74,30 +75,30 @@ class SecretArgs:
74
75
  return pulumi.get(self, "namespace")
75
76
 
76
77
  @namespace.setter
77
- def namespace(self, value: Optional[pulumi.Input[str]]):
78
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
78
79
  pulumi.set(self, "namespace", value)
79
80
 
80
81
 
81
82
  @pulumi.input_type
82
83
  class _SecretState:
83
84
  def __init__(__self__, *,
84
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
85
- data_json: Optional[pulumi.Input[str]] = None,
86
- namespace: Optional[pulumi.Input[str]] = None,
87
- path: Optional[pulumi.Input[str]] = None):
85
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
86
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
87
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
88
+ path: Optional[pulumi.Input[builtins.str]] = None):
88
89
  """
89
90
  Input properties used for looking up and filtering Secret resources.
90
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
91
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
91
92
  Vault and whose values are the corresponding values. This map can only
92
93
  represent string data, so any non-string values returned from Vault are
93
94
  serialized as JSON.
94
- :param pulumi.Input[str] data_json: JSON-encoded string that will be
95
+ :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
95
96
  written as the secret data at the given path.
96
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
97
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
97
98
  The value should not contain leading or trailing forward slashes.
98
99
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
99
100
  *Available only for Vault Enterprise*.
100
- :param pulumi.Input[str] path: Full path of the KV-V1 secret.
101
+ :param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
101
102
  """
102
103
  if data is not None:
103
104
  pulumi.set(__self__, "data", data)
@@ -110,7 +111,7 @@ class _SecretState:
110
111
 
111
112
  @property
112
113
  @pulumi.getter
113
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
114
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
114
115
  """
115
116
  A mapping whose keys are the top-level data keys returned from
116
117
  Vault and whose values are the corresponding values. This map can only
@@ -120,12 +121,12 @@ class _SecretState:
120
121
  return pulumi.get(self, "data")
121
122
 
122
123
  @data.setter
123
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
124
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
124
125
  pulumi.set(self, "data", value)
125
126
 
126
127
  @property
127
128
  @pulumi.getter(name="dataJson")
128
- def data_json(self) -> Optional[pulumi.Input[str]]:
129
+ def data_json(self) -> Optional[pulumi.Input[builtins.str]]:
129
130
  """
130
131
  JSON-encoded string that will be
131
132
  written as the secret data at the given path.
@@ -133,12 +134,12 @@ class _SecretState:
133
134
  return pulumi.get(self, "data_json")
134
135
 
135
136
  @data_json.setter
136
- def data_json(self, value: Optional[pulumi.Input[str]]):
137
+ def data_json(self, value: Optional[pulumi.Input[builtins.str]]):
137
138
  pulumi.set(self, "data_json", value)
138
139
 
139
140
  @property
140
141
  @pulumi.getter
141
- def namespace(self) -> Optional[pulumi.Input[str]]:
142
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
142
143
  """
143
144
  The namespace to provision the resource in.
144
145
  The value should not contain leading or trailing forward slashes.
@@ -148,19 +149,19 @@ class _SecretState:
148
149
  return pulumi.get(self, "namespace")
149
150
 
150
151
  @namespace.setter
151
- def namespace(self, value: Optional[pulumi.Input[str]]):
152
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
152
153
  pulumi.set(self, "namespace", value)
153
154
 
154
155
  @property
155
156
  @pulumi.getter
156
- def path(self) -> Optional[pulumi.Input[str]]:
157
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
157
158
  """
158
159
  Full path of the KV-V1 secret.
159
160
  """
160
161
  return pulumi.get(self, "path")
161
162
 
162
163
  @path.setter
163
- def path(self, value: Optional[pulumi.Input[str]]):
164
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
164
165
  pulumi.set(self, "path", value)
165
166
 
166
167
 
@@ -169,9 +170,9 @@ class Secret(pulumi.CustomResource):
169
170
  def __init__(__self__,
170
171
  resource_name: str,
171
172
  opts: Optional[pulumi.ResourceOptions] = None,
172
- data_json: Optional[pulumi.Input[str]] = None,
173
- namespace: Optional[pulumi.Input[str]] = None,
174
- path: Optional[pulumi.Input[str]] = None,
173
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
174
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
175
+ path: Optional[pulumi.Input[builtins.str]] = None,
175
176
  __props__=None):
176
177
  """
177
178
  Writes a KV-V1 secret to a given path in Vault.
@@ -218,13 +219,13 @@ class Secret(pulumi.CustomResource):
218
219
 
219
220
  :param str resource_name: The name of the resource.
220
221
  :param pulumi.ResourceOptions opts: Options for the resource.
221
- :param pulumi.Input[str] data_json: JSON-encoded string that will be
222
+ :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
222
223
  written as the secret data at the given path.
223
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
224
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
224
225
  The value should not contain leading or trailing forward slashes.
225
226
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
226
227
  *Available only for Vault Enterprise*.
227
- :param pulumi.Input[str] path: Full path of the KV-V1 secret.
228
+ :param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
228
229
  """
229
230
  ...
230
231
  @overload
@@ -290,9 +291,9 @@ class Secret(pulumi.CustomResource):
290
291
  def _internal_init(__self__,
291
292
  resource_name: str,
292
293
  opts: Optional[pulumi.ResourceOptions] = None,
293
- data_json: Optional[pulumi.Input[str]] = None,
294
- namespace: Optional[pulumi.Input[str]] = None,
295
- path: Optional[pulumi.Input[str]] = None,
294
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
295
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
296
+ path: Optional[pulumi.Input[builtins.str]] = None,
296
297
  __props__=None):
297
298
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
298
299
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -322,10 +323,10 @@ class Secret(pulumi.CustomResource):
322
323
  def get(resource_name: str,
323
324
  id: pulumi.Input[str],
324
325
  opts: Optional[pulumi.ResourceOptions] = None,
325
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
326
- data_json: Optional[pulumi.Input[str]] = None,
327
- namespace: Optional[pulumi.Input[str]] = None,
328
- path: Optional[pulumi.Input[str]] = None) -> 'Secret':
326
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
327
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
328
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
329
+ path: Optional[pulumi.Input[builtins.str]] = None) -> 'Secret':
329
330
  """
330
331
  Get an existing Secret resource's state with the given name, id, and optional extra
331
332
  properties used to qualify the lookup.
@@ -333,17 +334,17 @@ class Secret(pulumi.CustomResource):
333
334
  :param str resource_name: The unique name of the resulting resource.
334
335
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
335
336
  :param pulumi.ResourceOptions opts: Options for the resource.
336
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
337
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
337
338
  Vault and whose values are the corresponding values. This map can only
338
339
  represent string data, so any non-string values returned from Vault are
339
340
  serialized as JSON.
340
- :param pulumi.Input[str] data_json: JSON-encoded string that will be
341
+ :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
341
342
  written as the secret data at the given path.
342
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
343
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
343
344
  The value should not contain leading or trailing forward slashes.
344
345
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
345
346
  *Available only for Vault Enterprise*.
346
- :param pulumi.Input[str] path: Full path of the KV-V1 secret.
347
+ :param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
347
348
  """
348
349
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
349
350
 
@@ -357,7 +358,7 @@ class Secret(pulumi.CustomResource):
357
358
 
358
359
  @property
359
360
  @pulumi.getter
360
- def data(self) -> pulumi.Output[Mapping[str, str]]:
361
+ def data(self) -> pulumi.Output[Mapping[str, builtins.str]]:
361
362
  """
362
363
  A mapping whose keys are the top-level data keys returned from
363
364
  Vault and whose values are the corresponding values. This map can only
@@ -368,7 +369,7 @@ class Secret(pulumi.CustomResource):
368
369
 
369
370
  @property
370
371
  @pulumi.getter(name="dataJson")
371
- def data_json(self) -> pulumi.Output[str]:
372
+ def data_json(self) -> pulumi.Output[builtins.str]:
372
373
  """
373
374
  JSON-encoded string that will be
374
375
  written as the secret data at the given path.
@@ -377,7 +378,7 @@ class Secret(pulumi.CustomResource):
377
378
 
378
379
  @property
379
380
  @pulumi.getter
380
- def namespace(self) -> pulumi.Output[Optional[str]]:
381
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
381
382
  """
382
383
  The namespace to provision the resource in.
383
384
  The value should not contain leading or trailing forward slashes.
@@ -388,7 +389,7 @@ class Secret(pulumi.CustomResource):
388
389
 
389
390
  @property
390
391
  @pulumi.getter
391
- def path(self) -> pulumi.Output[str]:
392
+ def path(self) -> pulumi.Output[builtins.str]:
392
393
  """
393
394
  Full path of the KV-V1 secret.
394
395
  """