pulumi-vault 6.6.0a1741836364__py3-none-any.whl → 6.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +583 -562
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +188 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +68 -18
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +73 -60
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
  261. pulumi_vault-6.7.0.dist-info/RECORD +265 -0
  262. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
  263. pulumi_vault-6.6.0a1741836364.dist-info/RECORD +0 -265
  264. {pulumi_vault-6.6.0a1741836364.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -21,40 +22,40 @@ __all__ = ['SecretV2Args', 'SecretV2']
21
22
  @pulumi.input_type
22
23
  class SecretV2Args:
23
24
  def __init__(__self__, *,
24
- data_json: pulumi.Input[str],
25
- mount: pulumi.Input[str],
26
- cas: Optional[pulumi.Input[int]] = None,
25
+ data_json: pulumi.Input[builtins.str],
26
+ mount: pulumi.Input[builtins.str],
27
+ cas: Optional[pulumi.Input[builtins.int]] = None,
27
28
  custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
28
- delete_all_versions: Optional[pulumi.Input[bool]] = None,
29
- disable_read: Optional[pulumi.Input[bool]] = None,
30
- name: Optional[pulumi.Input[str]] = None,
31
- namespace: Optional[pulumi.Input[str]] = None,
32
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
29
+ delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
30
+ disable_read: Optional[pulumi.Input[builtins.bool]] = None,
31
+ name: Optional[pulumi.Input[builtins.str]] = None,
32
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
33
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
33
34
  """
34
35
  The set of arguments for constructing a SecretV2 resource.
35
- :param pulumi.Input[str] data_json: JSON-encoded string that will be
36
+ :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
36
37
  written as the secret data at the given path.
37
- :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
38
- :param pulumi.Input[int] cas: This flag is required if `cas_required` is set to true
38
+ :param pulumi.Input[builtins.str] mount: Path where KV-V2 engine is mounted.
39
+ :param pulumi.Input[builtins.int] cas: This flag is required if `cas_required` is set to true
39
40
  on either the secret or the engine's config. In order for a
40
41
  write operation to be successful, cas must be set to the current version
41
42
  of the secret.
42
43
  :param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
43
44
  KV secret. Refer to the
44
45
  Configuration Options for more info.
45
- :param pulumi.Input[bool] delete_all_versions: If set to true, permanently deletes all
46
+ :param pulumi.Input[builtins.bool] delete_all_versions: If set to true, permanently deletes all
46
47
  versions for the specified key.
47
- :param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
48
+ :param pulumi.Input[builtins.bool] disable_read: If set to true, disables reading secret from Vault;
48
49
  note: drift won't be detected.
49
- :param pulumi.Input[str] name: Full name of the secret. For a nested secret
50
+ :param pulumi.Input[builtins.str] name: Full name of the secret. For a nested secret
50
51
  the name is the nested path excluding the mount and data
51
52
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
52
53
  the name is `foo/bar/baz`.
53
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
54
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
54
55
  The value should not contain leading or trailing forward slashes.
55
56
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
56
57
  *Available only for Vault Enterprise*.
57
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
58
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: An object that holds option settings.
58
59
  """
59
60
  pulumi.set(__self__, "data_json", data_json)
60
61
  pulumi.set(__self__, "mount", mount)
@@ -75,7 +76,7 @@ class SecretV2Args:
75
76
 
76
77
  @property
77
78
  @pulumi.getter(name="dataJson")
78
- def data_json(self) -> pulumi.Input[str]:
79
+ def data_json(self) -> pulumi.Input[builtins.str]:
79
80
  """
80
81
  JSON-encoded string that will be
81
82
  written as the secret data at the given path.
@@ -83,24 +84,24 @@ class SecretV2Args:
83
84
  return pulumi.get(self, "data_json")
84
85
 
85
86
  @data_json.setter
86
- def data_json(self, value: pulumi.Input[str]):
87
+ def data_json(self, value: pulumi.Input[builtins.str]):
87
88
  pulumi.set(self, "data_json", value)
88
89
 
89
90
  @property
90
91
  @pulumi.getter
91
- def mount(self) -> pulumi.Input[str]:
92
+ def mount(self) -> pulumi.Input[builtins.str]:
92
93
  """
93
94
  Path where KV-V2 engine is mounted.
94
95
  """
95
96
  return pulumi.get(self, "mount")
96
97
 
97
98
  @mount.setter
98
- def mount(self, value: pulumi.Input[str]):
99
+ def mount(self, value: pulumi.Input[builtins.str]):
99
100
  pulumi.set(self, "mount", value)
100
101
 
101
102
  @property
102
103
  @pulumi.getter
103
- def cas(self) -> Optional[pulumi.Input[int]]:
104
+ def cas(self) -> Optional[pulumi.Input[builtins.int]]:
104
105
  """
105
106
  This flag is required if `cas_required` is set to true
106
107
  on either the secret or the engine's config. In order for a
@@ -110,7 +111,7 @@ class SecretV2Args:
110
111
  return pulumi.get(self, "cas")
111
112
 
112
113
  @cas.setter
113
- def cas(self, value: Optional[pulumi.Input[int]]):
114
+ def cas(self, value: Optional[pulumi.Input[builtins.int]]):
114
115
  pulumi.set(self, "cas", value)
115
116
 
116
117
  @property
@@ -129,7 +130,7 @@ class SecretV2Args:
129
130
 
130
131
  @property
131
132
  @pulumi.getter(name="deleteAllVersions")
132
- def delete_all_versions(self) -> Optional[pulumi.Input[bool]]:
133
+ def delete_all_versions(self) -> Optional[pulumi.Input[builtins.bool]]:
133
134
  """
134
135
  If set to true, permanently deletes all
135
136
  versions for the specified key.
@@ -137,12 +138,12 @@ class SecretV2Args:
137
138
  return pulumi.get(self, "delete_all_versions")
138
139
 
139
140
  @delete_all_versions.setter
140
- def delete_all_versions(self, value: Optional[pulumi.Input[bool]]):
141
+ def delete_all_versions(self, value: Optional[pulumi.Input[builtins.bool]]):
141
142
  pulumi.set(self, "delete_all_versions", value)
142
143
 
143
144
  @property
144
145
  @pulumi.getter(name="disableRead")
145
- def disable_read(self) -> Optional[pulumi.Input[bool]]:
146
+ def disable_read(self) -> Optional[pulumi.Input[builtins.bool]]:
146
147
  """
147
148
  If set to true, disables reading secret from Vault;
148
149
  note: drift won't be detected.
@@ -150,12 +151,12 @@ class SecretV2Args:
150
151
  return pulumi.get(self, "disable_read")
151
152
 
152
153
  @disable_read.setter
153
- def disable_read(self, value: Optional[pulumi.Input[bool]]):
154
+ def disable_read(self, value: Optional[pulumi.Input[builtins.bool]]):
154
155
  pulumi.set(self, "disable_read", value)
155
156
 
156
157
  @property
157
158
  @pulumi.getter
158
- def name(self) -> Optional[pulumi.Input[str]]:
159
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
159
160
  """
160
161
  Full name of the secret. For a nested secret
161
162
  the name is the nested path excluding the mount and data
@@ -165,12 +166,12 @@ class SecretV2Args:
165
166
  return pulumi.get(self, "name")
166
167
 
167
168
  @name.setter
168
- def name(self, value: Optional[pulumi.Input[str]]):
169
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
169
170
  pulumi.set(self, "name", value)
170
171
 
171
172
  @property
172
173
  @pulumi.getter
173
- def namespace(self) -> Optional[pulumi.Input[str]]:
174
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
174
175
  """
175
176
  The namespace to provision the resource in.
176
177
  The value should not contain leading or trailing forward slashes.
@@ -180,68 +181,68 @@ class SecretV2Args:
180
181
  return pulumi.get(self, "namespace")
181
182
 
182
183
  @namespace.setter
183
- def namespace(self, value: Optional[pulumi.Input[str]]):
184
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
184
185
  pulumi.set(self, "namespace", value)
185
186
 
186
187
  @property
187
188
  @pulumi.getter
188
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
189
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
189
190
  """
190
191
  An object that holds option settings.
191
192
  """
192
193
  return pulumi.get(self, "options")
193
194
 
194
195
  @options.setter
195
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
196
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
196
197
  pulumi.set(self, "options", value)
197
198
 
198
199
 
199
200
  @pulumi.input_type
200
201
  class _SecretV2State:
201
202
  def __init__(__self__, *,
202
- cas: Optional[pulumi.Input[int]] = None,
203
+ cas: Optional[pulumi.Input[builtins.int]] = None,
203
204
  custom_metadata: Optional[pulumi.Input['SecretV2CustomMetadataArgs']] = None,
204
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
205
- data_json: Optional[pulumi.Input[str]] = None,
206
- delete_all_versions: Optional[pulumi.Input[bool]] = None,
207
- disable_read: Optional[pulumi.Input[bool]] = None,
208
- metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
209
- mount: Optional[pulumi.Input[str]] = None,
210
- name: Optional[pulumi.Input[str]] = None,
211
- namespace: Optional[pulumi.Input[str]] = None,
212
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
213
- path: Optional[pulumi.Input[str]] = None):
205
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
206
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
207
+ delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
208
+ disable_read: Optional[pulumi.Input[builtins.bool]] = None,
209
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
210
+ mount: Optional[pulumi.Input[builtins.str]] = None,
211
+ name: Optional[pulumi.Input[builtins.str]] = None,
212
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
213
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
214
+ path: Optional[pulumi.Input[builtins.str]] = None):
214
215
  """
215
216
  Input properties used for looking up and filtering SecretV2 resources.
216
- :param pulumi.Input[int] cas: This flag is required if `cas_required` is set to true
217
+ :param pulumi.Input[builtins.int] cas: This flag is required if `cas_required` is set to true
217
218
  on either the secret or the engine's config. In order for a
218
219
  write operation to be successful, cas must be set to the current version
219
220
  of the secret.
220
221
  :param pulumi.Input['SecretV2CustomMetadataArgs'] custom_metadata: A nested block that allows configuring metadata for the
221
222
  KV secret. Refer to the
222
223
  Configuration Options for more info.
223
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
224
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
224
225
  Vault and whose values are the corresponding values. This map can only
225
226
  represent string data, so any non-string values returned from Vault are
226
227
  serialized as JSON.
227
- :param pulumi.Input[str] data_json: JSON-encoded string that will be
228
+ :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
228
229
  written as the secret data at the given path.
229
- :param pulumi.Input[bool] delete_all_versions: If set to true, permanently deletes all
230
+ :param pulumi.Input[builtins.bool] delete_all_versions: If set to true, permanently deletes all
230
231
  versions for the specified key.
231
- :param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
232
+ :param pulumi.Input[builtins.bool] disable_read: If set to true, disables reading secret from Vault;
232
233
  note: drift won't be detected.
233
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
234
- :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
235
- :param pulumi.Input[str] name: Full name of the secret. For a nested secret
234
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] metadata: Metadata associated with this secret read from Vault.
235
+ :param pulumi.Input[builtins.str] mount: Path where KV-V2 engine is mounted.
236
+ :param pulumi.Input[builtins.str] name: Full name of the secret. For a nested secret
236
237
  the name is the nested path excluding the mount and data
237
238
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
238
239
  the name is `foo/bar/baz`.
239
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
240
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
240
241
  The value should not contain leading or trailing forward slashes.
241
242
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
242
243
  *Available only for Vault Enterprise*.
243
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
244
- :param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
244
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: An object that holds option settings.
245
+ :param pulumi.Input[builtins.str] path: Full path where the KV-V2 secret will be written.
245
246
  """
246
247
  if cas is not None:
247
248
  pulumi.set(__self__, "cas", cas)
@@ -270,7 +271,7 @@ class _SecretV2State:
270
271
 
271
272
  @property
272
273
  @pulumi.getter
273
- def cas(self) -> Optional[pulumi.Input[int]]:
274
+ def cas(self) -> Optional[pulumi.Input[builtins.int]]:
274
275
  """
275
276
  This flag is required if `cas_required` is set to true
276
277
  on either the secret or the engine's config. In order for a
@@ -280,7 +281,7 @@ class _SecretV2State:
280
281
  return pulumi.get(self, "cas")
281
282
 
282
283
  @cas.setter
283
- def cas(self, value: Optional[pulumi.Input[int]]):
284
+ def cas(self, value: Optional[pulumi.Input[builtins.int]]):
284
285
  pulumi.set(self, "cas", value)
285
286
 
286
287
  @property
@@ -299,7 +300,7 @@ class _SecretV2State:
299
300
 
300
301
  @property
301
302
  @pulumi.getter
302
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
303
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
303
304
  """
304
305
  A mapping whose keys are the top-level data keys returned from
305
306
  Vault and whose values are the corresponding values. This map can only
@@ -309,12 +310,12 @@ class _SecretV2State:
309
310
  return pulumi.get(self, "data")
310
311
 
311
312
  @data.setter
312
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
313
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
313
314
  pulumi.set(self, "data", value)
314
315
 
315
316
  @property
316
317
  @pulumi.getter(name="dataJson")
317
- def data_json(self) -> Optional[pulumi.Input[str]]:
318
+ def data_json(self) -> Optional[pulumi.Input[builtins.str]]:
318
319
  """
319
320
  JSON-encoded string that will be
320
321
  written as the secret data at the given path.
@@ -322,12 +323,12 @@ class _SecretV2State:
322
323
  return pulumi.get(self, "data_json")
323
324
 
324
325
  @data_json.setter
325
- def data_json(self, value: Optional[pulumi.Input[str]]):
326
+ def data_json(self, value: Optional[pulumi.Input[builtins.str]]):
326
327
  pulumi.set(self, "data_json", value)
327
328
 
328
329
  @property
329
330
  @pulumi.getter(name="deleteAllVersions")
330
- def delete_all_versions(self) -> Optional[pulumi.Input[bool]]:
331
+ def delete_all_versions(self) -> Optional[pulumi.Input[builtins.bool]]:
331
332
  """
332
333
  If set to true, permanently deletes all
333
334
  versions for the specified key.
@@ -335,12 +336,12 @@ class _SecretV2State:
335
336
  return pulumi.get(self, "delete_all_versions")
336
337
 
337
338
  @delete_all_versions.setter
338
- def delete_all_versions(self, value: Optional[pulumi.Input[bool]]):
339
+ def delete_all_versions(self, value: Optional[pulumi.Input[builtins.bool]]):
339
340
  pulumi.set(self, "delete_all_versions", value)
340
341
 
341
342
  @property
342
343
  @pulumi.getter(name="disableRead")
343
- def disable_read(self) -> Optional[pulumi.Input[bool]]:
344
+ def disable_read(self) -> Optional[pulumi.Input[builtins.bool]]:
344
345
  """
345
346
  If set to true, disables reading secret from Vault;
346
347
  note: drift won't be detected.
@@ -348,36 +349,36 @@ class _SecretV2State:
348
349
  return pulumi.get(self, "disable_read")
349
350
 
350
351
  @disable_read.setter
351
- def disable_read(self, value: Optional[pulumi.Input[bool]]):
352
+ def disable_read(self, value: Optional[pulumi.Input[builtins.bool]]):
352
353
  pulumi.set(self, "disable_read", value)
353
354
 
354
355
  @property
355
356
  @pulumi.getter
356
- def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
357
+ def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
357
358
  """
358
359
  Metadata associated with this secret read from Vault.
359
360
  """
360
361
  return pulumi.get(self, "metadata")
361
362
 
362
363
  @metadata.setter
363
- def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
364
+ def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
364
365
  pulumi.set(self, "metadata", value)
365
366
 
366
367
  @property
367
368
  @pulumi.getter
368
- def mount(self) -> Optional[pulumi.Input[str]]:
369
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
369
370
  """
370
371
  Path where KV-V2 engine is mounted.
371
372
  """
372
373
  return pulumi.get(self, "mount")
373
374
 
374
375
  @mount.setter
375
- def mount(self, value: Optional[pulumi.Input[str]]):
376
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
376
377
  pulumi.set(self, "mount", value)
377
378
 
378
379
  @property
379
380
  @pulumi.getter
380
- def name(self) -> Optional[pulumi.Input[str]]:
381
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
381
382
  """
382
383
  Full name of the secret. For a nested secret
383
384
  the name is the nested path excluding the mount and data
@@ -387,12 +388,12 @@ class _SecretV2State:
387
388
  return pulumi.get(self, "name")
388
389
 
389
390
  @name.setter
390
- def name(self, value: Optional[pulumi.Input[str]]):
391
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
391
392
  pulumi.set(self, "name", value)
392
393
 
393
394
  @property
394
395
  @pulumi.getter
395
- def namespace(self) -> Optional[pulumi.Input[str]]:
396
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
396
397
  """
397
398
  The namespace to provision the resource in.
398
399
  The value should not contain leading or trailing forward slashes.
@@ -402,31 +403,31 @@ class _SecretV2State:
402
403
  return pulumi.get(self, "namespace")
403
404
 
404
405
  @namespace.setter
405
- def namespace(self, value: Optional[pulumi.Input[str]]):
406
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
406
407
  pulumi.set(self, "namespace", value)
407
408
 
408
409
  @property
409
410
  @pulumi.getter
410
- def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
411
+ def options(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
411
412
  """
412
413
  An object that holds option settings.
413
414
  """
414
415
  return pulumi.get(self, "options")
415
416
 
416
417
  @options.setter
417
- def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
418
+ def options(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
418
419
  pulumi.set(self, "options", value)
419
420
 
420
421
  @property
421
422
  @pulumi.getter
422
- def path(self) -> Optional[pulumi.Input[str]]:
423
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
423
424
  """
424
425
  Full path where the KV-V2 secret will be written.
425
426
  """
426
427
  return pulumi.get(self, "path")
427
428
 
428
429
  @path.setter
429
- def path(self, value: Optional[pulumi.Input[str]]):
430
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
430
431
  pulumi.set(self, "path", value)
431
432
 
432
433
 
@@ -435,15 +436,15 @@ class SecretV2(pulumi.CustomResource):
435
436
  def __init__(__self__,
436
437
  resource_name: str,
437
438
  opts: Optional[pulumi.ResourceOptions] = None,
438
- cas: Optional[pulumi.Input[int]] = None,
439
+ cas: Optional[pulumi.Input[builtins.int]] = None,
439
440
  custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
440
- data_json: Optional[pulumi.Input[str]] = None,
441
- delete_all_versions: Optional[pulumi.Input[bool]] = None,
442
- disable_read: Optional[pulumi.Input[bool]] = None,
443
- mount: Optional[pulumi.Input[str]] = None,
444
- name: Optional[pulumi.Input[str]] = None,
445
- namespace: Optional[pulumi.Input[str]] = None,
446
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
441
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
442
+ delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
443
+ disable_read: Optional[pulumi.Input[builtins.bool]] = None,
444
+ mount: Optional[pulumi.Input[builtins.str]] = None,
445
+ name: Optional[pulumi.Input[builtins.str]] = None,
446
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
447
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
447
448
  __props__=None):
448
449
  """
449
450
  Writes a KV-V2 secret to a given path in Vault.
@@ -512,29 +513,29 @@ class SecretV2(pulumi.CustomResource):
512
513
 
513
514
  :param str resource_name: The name of the resource.
514
515
  :param pulumi.ResourceOptions opts: Options for the resource.
515
- :param pulumi.Input[int] cas: This flag is required if `cas_required` is set to true
516
+ :param pulumi.Input[builtins.int] cas: This flag is required if `cas_required` is set to true
516
517
  on either the secret or the engine's config. In order for a
517
518
  write operation to be successful, cas must be set to the current version
518
519
  of the secret.
519
520
  :param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
520
521
  KV secret. Refer to the
521
522
  Configuration Options for more info.
522
- :param pulumi.Input[str] data_json: JSON-encoded string that will be
523
+ :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
523
524
  written as the secret data at the given path.
524
- :param pulumi.Input[bool] delete_all_versions: If set to true, permanently deletes all
525
+ :param pulumi.Input[builtins.bool] delete_all_versions: If set to true, permanently deletes all
525
526
  versions for the specified key.
526
- :param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
527
+ :param pulumi.Input[builtins.bool] disable_read: If set to true, disables reading secret from Vault;
527
528
  note: drift won't be detected.
528
- :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
529
- :param pulumi.Input[str] name: Full name of the secret. For a nested secret
529
+ :param pulumi.Input[builtins.str] mount: Path where KV-V2 engine is mounted.
530
+ :param pulumi.Input[builtins.str] name: Full name of the secret. For a nested secret
530
531
  the name is the nested path excluding the mount and data
531
532
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
532
533
  the name is `foo/bar/baz`.
533
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
534
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
534
535
  The value should not contain leading or trailing forward slashes.
535
536
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
536
537
  *Available only for Vault Enterprise*.
537
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
538
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: An object that holds option settings.
538
539
  """
539
540
  ...
540
541
  @overload
@@ -622,15 +623,15 @@ class SecretV2(pulumi.CustomResource):
622
623
  def _internal_init(__self__,
623
624
  resource_name: str,
624
625
  opts: Optional[pulumi.ResourceOptions] = None,
625
- cas: Optional[pulumi.Input[int]] = None,
626
+ cas: Optional[pulumi.Input[builtins.int]] = None,
626
627
  custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
627
- data_json: Optional[pulumi.Input[str]] = None,
628
- delete_all_versions: Optional[pulumi.Input[bool]] = None,
629
- disable_read: Optional[pulumi.Input[bool]] = None,
630
- mount: Optional[pulumi.Input[str]] = None,
631
- name: Optional[pulumi.Input[str]] = None,
632
- namespace: Optional[pulumi.Input[str]] = None,
633
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
628
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
629
+ delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
630
+ disable_read: Optional[pulumi.Input[builtins.bool]] = None,
631
+ mount: Optional[pulumi.Input[builtins.str]] = None,
632
+ name: Optional[pulumi.Input[builtins.str]] = None,
633
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
634
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
634
635
  __props__=None):
635
636
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
636
637
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -668,18 +669,18 @@ class SecretV2(pulumi.CustomResource):
668
669
  def get(resource_name: str,
669
670
  id: pulumi.Input[str],
670
671
  opts: Optional[pulumi.ResourceOptions] = None,
671
- cas: Optional[pulumi.Input[int]] = None,
672
+ cas: Optional[pulumi.Input[builtins.int]] = None,
672
673
  custom_metadata: Optional[pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']]] = None,
673
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
674
- data_json: Optional[pulumi.Input[str]] = None,
675
- delete_all_versions: Optional[pulumi.Input[bool]] = None,
676
- disable_read: Optional[pulumi.Input[bool]] = None,
677
- metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
678
- mount: Optional[pulumi.Input[str]] = None,
679
- name: Optional[pulumi.Input[str]] = None,
680
- namespace: Optional[pulumi.Input[str]] = None,
681
- options: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
682
- path: Optional[pulumi.Input[str]] = None) -> 'SecretV2':
674
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
675
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
676
+ delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
677
+ disable_read: Optional[pulumi.Input[builtins.bool]] = None,
678
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
679
+ mount: Optional[pulumi.Input[builtins.str]] = None,
680
+ name: Optional[pulumi.Input[builtins.str]] = None,
681
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
682
+ options: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
683
+ path: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretV2':
683
684
  """
684
685
  Get an existing SecretV2 resource's state with the given name, id, and optional extra
685
686
  properties used to qualify the lookup.
@@ -687,35 +688,35 @@ class SecretV2(pulumi.CustomResource):
687
688
  :param str resource_name: The unique name of the resulting resource.
688
689
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
689
690
  :param pulumi.ResourceOptions opts: Options for the resource.
690
- :param pulumi.Input[int] cas: This flag is required if `cas_required` is set to true
691
+ :param pulumi.Input[builtins.int] cas: This flag is required if `cas_required` is set to true
691
692
  on either the secret or the engine's config. In order for a
692
693
  write operation to be successful, cas must be set to the current version
693
694
  of the secret.
694
695
  :param pulumi.Input[Union['SecretV2CustomMetadataArgs', 'SecretV2CustomMetadataArgsDict']] custom_metadata: A nested block that allows configuring metadata for the
695
696
  KV secret. Refer to the
696
697
  Configuration Options for more info.
697
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
698
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
698
699
  Vault and whose values are the corresponding values. This map can only
699
700
  represent string data, so any non-string values returned from Vault are
700
701
  serialized as JSON.
701
- :param pulumi.Input[str] data_json: JSON-encoded string that will be
702
+ :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
702
703
  written as the secret data at the given path.
703
- :param pulumi.Input[bool] delete_all_versions: If set to true, permanently deletes all
704
+ :param pulumi.Input[builtins.bool] delete_all_versions: If set to true, permanently deletes all
704
705
  versions for the specified key.
705
- :param pulumi.Input[bool] disable_read: If set to true, disables reading secret from Vault;
706
+ :param pulumi.Input[builtins.bool] disable_read: If set to true, disables reading secret from Vault;
706
707
  note: drift won't be detected.
707
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: Metadata associated with this secret read from Vault.
708
- :param pulumi.Input[str] mount: Path where KV-V2 engine is mounted.
709
- :param pulumi.Input[str] name: Full name of the secret. For a nested secret
708
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] metadata: Metadata associated with this secret read from Vault.
709
+ :param pulumi.Input[builtins.str] mount: Path where KV-V2 engine is mounted.
710
+ :param pulumi.Input[builtins.str] name: Full name of the secret. For a nested secret
710
711
  the name is the nested path excluding the mount and data
711
712
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
712
713
  the name is `foo/bar/baz`.
713
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
714
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
714
715
  The value should not contain leading or trailing forward slashes.
715
716
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
716
717
  *Available only for Vault Enterprise*.
717
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] options: An object that holds option settings.
718
- :param pulumi.Input[str] path: Full path where the KV-V2 secret will be written.
718
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] options: An object that holds option settings.
719
+ :param pulumi.Input[builtins.str] path: Full path where the KV-V2 secret will be written.
719
720
  """
720
721
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
721
722
 
@@ -737,7 +738,7 @@ class SecretV2(pulumi.CustomResource):
737
738
 
738
739
  @property
739
740
  @pulumi.getter
740
- def cas(self) -> pulumi.Output[Optional[int]]:
741
+ def cas(self) -> pulumi.Output[Optional[builtins.int]]:
741
742
  """
742
743
  This flag is required if `cas_required` is set to true
743
744
  on either the secret or the engine's config. In order for a
@@ -758,7 +759,7 @@ class SecretV2(pulumi.CustomResource):
758
759
 
759
760
  @property
760
761
  @pulumi.getter
761
- def data(self) -> pulumi.Output[Mapping[str, str]]:
762
+ def data(self) -> pulumi.Output[Mapping[str, builtins.str]]:
762
763
  """
763
764
  A mapping whose keys are the top-level data keys returned from
764
765
  Vault and whose values are the corresponding values. This map can only
@@ -769,7 +770,7 @@ class SecretV2(pulumi.CustomResource):
769
770
 
770
771
  @property
771
772
  @pulumi.getter(name="dataJson")
772
- def data_json(self) -> pulumi.Output[str]:
773
+ def data_json(self) -> pulumi.Output[builtins.str]:
773
774
  """
774
775
  JSON-encoded string that will be
775
776
  written as the secret data at the given path.
@@ -778,7 +779,7 @@ class SecretV2(pulumi.CustomResource):
778
779
 
779
780
  @property
780
781
  @pulumi.getter(name="deleteAllVersions")
781
- def delete_all_versions(self) -> pulumi.Output[Optional[bool]]:
782
+ def delete_all_versions(self) -> pulumi.Output[Optional[builtins.bool]]:
782
783
  """
783
784
  If set to true, permanently deletes all
784
785
  versions for the specified key.
@@ -787,7 +788,7 @@ class SecretV2(pulumi.CustomResource):
787
788
 
788
789
  @property
789
790
  @pulumi.getter(name="disableRead")
790
- def disable_read(self) -> pulumi.Output[Optional[bool]]:
791
+ def disable_read(self) -> pulumi.Output[Optional[builtins.bool]]:
791
792
  """
792
793
  If set to true, disables reading secret from Vault;
793
794
  note: drift won't be detected.
@@ -796,7 +797,7 @@ class SecretV2(pulumi.CustomResource):
796
797
 
797
798
  @property
798
799
  @pulumi.getter
799
- def metadata(self) -> pulumi.Output[Mapping[str, str]]:
800
+ def metadata(self) -> pulumi.Output[Mapping[str, builtins.str]]:
800
801
  """
801
802
  Metadata associated with this secret read from Vault.
802
803
  """
@@ -804,7 +805,7 @@ class SecretV2(pulumi.CustomResource):
804
805
 
805
806
  @property
806
807
  @pulumi.getter
807
- def mount(self) -> pulumi.Output[str]:
808
+ def mount(self) -> pulumi.Output[builtins.str]:
808
809
  """
809
810
  Path where KV-V2 engine is mounted.
810
811
  """
@@ -812,7 +813,7 @@ class SecretV2(pulumi.CustomResource):
812
813
 
813
814
  @property
814
815
  @pulumi.getter
815
- def name(self) -> pulumi.Output[str]:
816
+ def name(self) -> pulumi.Output[builtins.str]:
816
817
  """
817
818
  Full name of the secret. For a nested secret
818
819
  the name is the nested path excluding the mount and data
@@ -823,7 +824,7 @@ class SecretV2(pulumi.CustomResource):
823
824
 
824
825
  @property
825
826
  @pulumi.getter
826
- def namespace(self) -> pulumi.Output[Optional[str]]:
827
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
827
828
  """
828
829
  The namespace to provision the resource in.
829
830
  The value should not contain leading or trailing forward slashes.
@@ -834,7 +835,7 @@ class SecretV2(pulumi.CustomResource):
834
835
 
835
836
  @property
836
837
  @pulumi.getter
837
- def options(self) -> pulumi.Output[Optional[Mapping[str, str]]]:
838
+ def options(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
838
839
  """
839
840
  An object that holds option settings.
840
841
  """
@@ -842,7 +843,7 @@ class SecretV2(pulumi.CustomResource):
842
843
 
843
844
  @property
844
845
  @pulumi.getter
845
- def path(self) -> pulumi.Output[str]:
846
+ def path(self) -> pulumi.Output[builtins.str]:
846
847
  """
847
848
  Full path where the KV-V2 secret will be written.
848
849
  """