pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -48,12 +49,12 @@ class GetBackendIssuersResult:
48
49
 
49
50
  @property
50
51
  @pulumi.getter
51
- def backend(self) -> str:
52
+ def backend(self) -> builtins.str:
52
53
  return pulumi.get(self, "backend")
53
54
 
54
55
  @property
55
56
  @pulumi.getter
56
- def id(self) -> str:
57
+ def id(self) -> builtins.str:
57
58
  """
58
59
  The provider-assigned unique ID for this managed resource.
59
60
  """
@@ -61,7 +62,7 @@ class GetBackendIssuersResult:
61
62
 
62
63
  @property
63
64
  @pulumi.getter(name="keyInfo")
64
- def key_info(self) -> Mapping[str, str]:
65
+ def key_info(self) -> Mapping[str, builtins.str]:
65
66
  """
66
67
  Map of issuer strings read from Vault.
67
68
  """
@@ -69,7 +70,7 @@ class GetBackendIssuersResult:
69
70
 
70
71
  @property
71
72
  @pulumi.getter(name="keyInfoJson")
72
- def key_info_json(self) -> str:
73
+ def key_info_json(self) -> builtins.str:
73
74
  """
74
75
  JSON-encoded issuer data read from Vault.
75
76
  """
@@ -77,7 +78,7 @@ class GetBackendIssuersResult:
77
78
 
78
79
  @property
79
80
  @pulumi.getter
80
- def keys(self) -> Sequence[str]:
81
+ def keys(self) -> Sequence[builtins.str]:
81
82
  """
82
83
  Keys used by issuers under the backend path.
83
84
  """
@@ -85,7 +86,7 @@ class GetBackendIssuersResult:
85
86
 
86
87
  @property
87
88
  @pulumi.getter
88
- def namespace(self) -> Optional[str]:
89
+ def namespace(self) -> Optional[builtins.str]:
89
90
  return pulumi.get(self, "namespace")
90
91
 
91
92
 
@@ -103,8 +104,8 @@ class AwaitableGetBackendIssuersResult(GetBackendIssuersResult):
103
104
  namespace=self.namespace)
104
105
 
105
106
 
106
- def get_backend_issuers(backend: Optional[str] = None,
107
- namespace: Optional[str] = None,
107
+ def get_backend_issuers(backend: Optional[builtins.str] = None,
108
+ namespace: Optional[builtins.str] = None,
108
109
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuersResult:
109
110
  """
110
111
  ## Example Usage
@@ -127,9 +128,9 @@ def get_backend_issuers(backend: Optional[str] = None,
127
128
  ```
128
129
 
129
130
 
130
- :param str backend: The path to the PKI secret backend to
131
+ :param builtins.str backend: The path to the PKI secret backend to
131
132
  read the issuers from, with no leading or trailing `/`s.
132
- :param str namespace: The namespace of the target resource.
133
+ :param builtins.str namespace: The namespace of the target resource.
133
134
  The value should not contain leading or trailing forward slashes.
134
135
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
135
136
  *Available only for Vault Enterprise*.
@@ -147,8 +148,8 @@ def get_backend_issuers(backend: Optional[str] = None,
147
148
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
148
149
  keys=pulumi.get(__ret__, 'keys'),
149
150
  namespace=pulumi.get(__ret__, 'namespace'))
150
- def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
151
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
151
+ def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = None,
152
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
152
153
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
153
154
  """
154
155
  ## Example Usage
@@ -171,9 +172,9 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[str]] = None,
171
172
  ```
172
173
 
173
174
 
174
- :param str backend: The path to the PKI secret backend to
175
+ :param builtins.str backend: The path to the PKI secret backend to
175
176
  read the issuers from, with no leading or trailing `/`s.
176
- :param str namespace: The namespace of the target resource.
177
+ :param builtins.str namespace: The namespace of the target resource.
177
178
  The value should not contain leading or trailing forward slashes.
178
179
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
180
  *Available only for Vault Enterprise*.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -51,12 +52,12 @@ class GetBackendKeyResult:
51
52
 
52
53
  @property
53
54
  @pulumi.getter
54
- def backend(self) -> str:
55
+ def backend(self) -> builtins.str:
55
56
  return pulumi.get(self, "backend")
56
57
 
57
58
  @property
58
59
  @pulumi.getter
59
- def id(self) -> str:
60
+ def id(self) -> builtins.str:
60
61
  """
61
62
  The provider-assigned unique ID for this managed resource.
62
63
  """
@@ -64,7 +65,7 @@ class GetBackendKeyResult:
64
65
 
65
66
  @property
66
67
  @pulumi.getter(name="keyId")
67
- def key_id(self) -> str:
68
+ def key_id(self) -> builtins.str:
68
69
  """
69
70
  ID of the key.
70
71
  """
@@ -72,7 +73,7 @@ class GetBackendKeyResult:
72
73
 
73
74
  @property
74
75
  @pulumi.getter(name="keyName")
75
- def key_name(self) -> str:
76
+ def key_name(self) -> builtins.str:
76
77
  """
77
78
  Name of the key.
78
79
  """
@@ -80,12 +81,12 @@ class GetBackendKeyResult:
80
81
 
81
82
  @property
82
83
  @pulumi.getter(name="keyRef")
83
- def key_ref(self) -> str:
84
+ def key_ref(self) -> builtins.str:
84
85
  return pulumi.get(self, "key_ref")
85
86
 
86
87
  @property
87
88
  @pulumi.getter(name="keyType")
88
- def key_type(self) -> str:
89
+ def key_type(self) -> builtins.str:
89
90
  """
90
91
  Type of the key.
91
92
  """
@@ -93,7 +94,7 @@ class GetBackendKeyResult:
93
94
 
94
95
  @property
95
96
  @pulumi.getter
96
- def namespace(self) -> Optional[str]:
97
+ def namespace(self) -> Optional[builtins.str]:
97
98
  return pulumi.get(self, "namespace")
98
99
 
99
100
 
@@ -112,9 +113,9 @@ class AwaitableGetBackendKeyResult(GetBackendKeyResult):
112
113
  namespace=self.namespace)
113
114
 
114
115
 
115
- def get_backend_key(backend: Optional[str] = None,
116
- key_ref: Optional[str] = None,
117
- namespace: Optional[str] = None,
116
+ def get_backend_key(backend: Optional[builtins.str] = None,
117
+ key_ref: Optional[builtins.str] = None,
118
+ namespace: Optional[builtins.str] = None,
118
119
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeyResult:
119
120
  """
120
121
  ## Example Usage
@@ -138,10 +139,10 @@ def get_backend_key(backend: Optional[str] = None,
138
139
  ```
139
140
 
140
141
 
141
- :param str backend: The path to the PKI secret backend to
142
+ :param builtins.str backend: The path to the PKI secret backend to
142
143
  read the key from, with no leading or trailing `/`s.
143
- :param str key_ref: Reference to an existing key.
144
- :param str namespace: The namespace of the target resource.
144
+ :param builtins.str key_ref: Reference to an existing key.
145
+ :param builtins.str namespace: The namespace of the target resource.
145
146
  The value should not contain leading or trailing forward slashes.
146
147
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
147
148
  *Available only for Vault Enterprise*.
@@ -161,9 +162,9 @@ def get_backend_key(backend: Optional[str] = None,
161
162
  key_ref=pulumi.get(__ret__, 'key_ref'),
162
163
  key_type=pulumi.get(__ret__, 'key_type'),
163
164
  namespace=pulumi.get(__ret__, 'namespace'))
164
- def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
165
- key_ref: Optional[pulumi.Input[str]] = None,
166
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
165
+ def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
166
+ key_ref: Optional[pulumi.Input[builtins.str]] = None,
167
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
167
168
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
168
169
  """
169
170
  ## Example Usage
@@ -187,10 +188,10 @@ def get_backend_key_output(backend: Optional[pulumi.Input[str]] = None,
187
188
  ```
188
189
 
189
190
 
190
- :param str backend: The path to the PKI secret backend to
191
+ :param builtins.str backend: The path to the PKI secret backend to
191
192
  read the key from, with no leading or trailing `/`s.
192
- :param str key_ref: Reference to an existing key.
193
- :param str namespace: The namespace of the target resource.
193
+ :param builtins.str key_ref: Reference to an existing key.
194
+ :param builtins.str namespace: The namespace of the target resource.
194
195
  The value should not contain leading or trailing forward slashes.
195
196
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
196
197
  *Available only for Vault Enterprise*.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -48,12 +49,12 @@ class GetBackendKeysResult:
48
49
 
49
50
  @property
50
51
  @pulumi.getter
51
- def backend(self) -> str:
52
+ def backend(self) -> builtins.str:
52
53
  return pulumi.get(self, "backend")
53
54
 
54
55
  @property
55
56
  @pulumi.getter
56
- def id(self) -> str:
57
+ def id(self) -> builtins.str:
57
58
  """
58
59
  The provider-assigned unique ID for this managed resource.
59
60
  """
@@ -61,7 +62,7 @@ class GetBackendKeysResult:
61
62
 
62
63
  @property
63
64
  @pulumi.getter(name="keyInfo")
64
- def key_info(self) -> Mapping[str, str]:
65
+ def key_info(self) -> Mapping[str, builtins.str]:
65
66
  """
66
67
  Map of key strings read from Vault.
67
68
  """
@@ -69,7 +70,7 @@ class GetBackendKeysResult:
69
70
 
70
71
  @property
71
72
  @pulumi.getter(name="keyInfoJson")
72
- def key_info_json(self) -> str:
73
+ def key_info_json(self) -> builtins.str:
73
74
  """
74
75
  JSON-encoded key data read from Vault.
75
76
  """
@@ -77,7 +78,7 @@ class GetBackendKeysResult:
77
78
 
78
79
  @property
79
80
  @pulumi.getter
80
- def keys(self) -> Sequence[str]:
81
+ def keys(self) -> Sequence[builtins.str]:
81
82
  """
82
83
  Keys used under the backend path.
83
84
  """
@@ -85,7 +86,7 @@ class GetBackendKeysResult:
85
86
 
86
87
  @property
87
88
  @pulumi.getter
88
- def namespace(self) -> Optional[str]:
89
+ def namespace(self) -> Optional[builtins.str]:
89
90
  return pulumi.get(self, "namespace")
90
91
 
91
92
 
@@ -103,8 +104,8 @@ class AwaitableGetBackendKeysResult(GetBackendKeysResult):
103
104
  namespace=self.namespace)
104
105
 
105
106
 
106
- def get_backend_keys(backend: Optional[str] = None,
107
- namespace: Optional[str] = None,
107
+ def get_backend_keys(backend: Optional[builtins.str] = None,
108
+ namespace: Optional[builtins.str] = None,
108
109
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeysResult:
109
110
  """
110
111
  ## Example Usage
@@ -127,9 +128,9 @@ def get_backend_keys(backend: Optional[str] = None,
127
128
  ```
128
129
 
129
130
 
130
- :param str backend: The path to the PKI secret backend to
131
+ :param builtins.str backend: The path to the PKI secret backend to
131
132
  read the keys from, with no leading or trailing `/`s.
132
- :param str namespace: The namespace of the target resource.
133
+ :param builtins.str namespace: The namespace of the target resource.
133
134
  The value should not contain leading or trailing forward slashes.
134
135
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
135
136
  *Available only for Vault Enterprise*.
@@ -147,8 +148,8 @@ def get_backend_keys(backend: Optional[str] = None,
147
148
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
148
149
  keys=pulumi.get(__ret__, 'keys'),
149
150
  namespace=pulumi.get(__ret__, 'namespace'))
150
- def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
151
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
151
+ def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None,
152
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
152
153
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
153
154
  """
154
155
  ## Example Usage
@@ -171,9 +172,9 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[str]] = None,
171
172
  ```
172
173
 
173
174
 
174
- :param str backend: The path to the PKI secret backend to
175
+ :param builtins.str backend: The path to the PKI secret backend to
175
176
  read the keys from, with no leading or trailing `/`s.
176
- :param str namespace: The namespace of the target resource.
177
+ :param builtins.str namespace: The namespace of the target resource.
177
178
  The value should not contain leading or trailing forward slashes.
178
179
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
179
180
  *Available only for Vault Enterprise*.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -25,16 +26,16 @@ __all__ = [
25
26
  @pulumi.output_type
26
27
  class BackendConfigCmpv2Authenticators(dict):
27
28
  def __init__(__self__, *,
28
- cert: Optional[Mapping[str, str]] = None):
29
+ cert: Optional[Mapping[str, builtins.str]] = None):
29
30
  """
30
- :param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
31
+ :param Mapping[str, builtins.str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
31
32
  """
32
33
  if cert is not None:
33
34
  pulumi.set(__self__, "cert", cert)
34
35
 
35
36
  @property
36
37
  @pulumi.getter
37
- def cert(self) -> Optional[Mapping[str, str]]:
38
+ def cert(self) -> Optional[Mapping[str, builtins.str]]:
38
39
  """
39
40
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
40
41
  """
@@ -44,11 +45,11 @@ class BackendConfigCmpv2Authenticators(dict):
44
45
  @pulumi.output_type
45
46
  class BackendConfigEstAuthenticators(dict):
46
47
  def __init__(__self__, *,
47
- cert: Optional[Mapping[str, str]] = None,
48
- userpass: Optional[Mapping[str, str]] = None):
48
+ cert: Optional[Mapping[str, builtins.str]] = None,
49
+ userpass: Optional[Mapping[str, builtins.str]] = None):
49
50
  """
50
- :param Mapping[str, str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
51
- :param Mapping[str, str] userpass: "The accessor (required) property for user pass auth backends".
51
+ :param Mapping[str, builtins.str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
52
+ :param Mapping[str, builtins.str] userpass: "The accessor (required) property for user pass auth backends".
52
53
  """
53
54
  if cert is not None:
54
55
  pulumi.set(__self__, "cert", cert)
@@ -57,7 +58,7 @@ class BackendConfigEstAuthenticators(dict):
57
58
 
58
59
  @property
59
60
  @pulumi.getter
60
- def cert(self) -> Optional[Mapping[str, str]]:
61
+ def cert(self) -> Optional[Mapping[str, builtins.str]]:
61
62
  """
62
63
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
63
64
  """
@@ -65,7 +66,7 @@ class BackendConfigEstAuthenticators(dict):
65
66
 
66
67
  @property
67
68
  @pulumi.getter
68
- def userpass(self) -> Optional[Mapping[str, str]]:
69
+ def userpass(self) -> Optional[Mapping[str, builtins.str]]:
69
70
  """
70
71
  "The accessor (required) property for user pass auth backends".
71
72
  """
@@ -75,13 +76,13 @@ class BackendConfigEstAuthenticators(dict):
75
76
  @pulumi.output_type
76
77
  class SecretBackendRolePolicyIdentifier(dict):
77
78
  def __init__(__self__, *,
78
- oid: str,
79
- cps: Optional[str] = None,
80
- notice: Optional[str] = None):
79
+ oid: builtins.str,
80
+ cps: Optional[builtins.str] = None,
81
+ notice: Optional[builtins.str] = None):
81
82
  """
82
- :param str oid: The OID for the policy identifier
83
- :param str cps: The URL of the CPS for the policy identifier
84
- :param str notice: A notice for the policy identifier
83
+ :param builtins.str oid: The OID for the policy identifier
84
+ :param builtins.str cps: The URL of the CPS for the policy identifier
85
+ :param builtins.str notice: A notice for the policy identifier
85
86
  """
86
87
  pulumi.set(__self__, "oid", oid)
87
88
  if cps is not None:
@@ -91,7 +92,7 @@ class SecretBackendRolePolicyIdentifier(dict):
91
92
 
92
93
  @property
93
94
  @pulumi.getter
94
- def oid(self) -> str:
95
+ def oid(self) -> builtins.str:
95
96
  """
96
97
  The OID for the policy identifier
97
98
  """
@@ -99,7 +100,7 @@ class SecretBackendRolePolicyIdentifier(dict):
99
100
 
100
101
  @property
101
102
  @pulumi.getter
102
- def cps(self) -> Optional[str]:
103
+ def cps(self) -> Optional[builtins.str]:
103
104
  """
104
105
  The URL of the CPS for the policy identifier
105
106
  """
@@ -107,7 +108,7 @@ class SecretBackendRolePolicyIdentifier(dict):
107
108
 
108
109
  @property
109
110
  @pulumi.getter
110
- def notice(self) -> Optional[str]:
111
+ def notice(self) -> Optional[builtins.str]:
111
112
  """
112
113
  A notice for the policy identifier
113
114
  """
@@ -117,16 +118,16 @@ class SecretBackendRolePolicyIdentifier(dict):
117
118
  @pulumi.output_type
118
119
  class GetBackendConfigCmpv2AuthenticatorResult(dict):
119
120
  def __init__(__self__, *,
120
- cert: Optional[Mapping[str, str]] = None):
121
+ cert: Optional[Mapping[str, builtins.str]] = None):
121
122
  """
122
- :param Mapping[str, str] cert: The accessor and cert_role properties for cert auth backends
123
+ :param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends
123
124
  """
124
125
  if cert is not None:
125
126
  pulumi.set(__self__, "cert", cert)
126
127
 
127
128
  @property
128
129
  @pulumi.getter
129
- def cert(self) -> Optional[Mapping[str, str]]:
130
+ def cert(self) -> Optional[Mapping[str, builtins.str]]:
130
131
  """
131
132
  The accessor and cert_role properties for cert auth backends
132
133
  """
@@ -136,11 +137,11 @@ class GetBackendConfigCmpv2AuthenticatorResult(dict):
136
137
  @pulumi.output_type
137
138
  class GetBackendConfigEstAuthenticatorResult(dict):
138
139
  def __init__(__self__, *,
139
- cert: Optional[Mapping[str, str]] = None,
140
- userpass: Optional[Mapping[str, str]] = None):
140
+ cert: Optional[Mapping[str, builtins.str]] = None,
141
+ userpass: Optional[Mapping[str, builtins.str]] = None):
141
142
  """
142
- :param Mapping[str, str] cert: "The accessor and cert_role properties for cert auth backends".
143
- :param Mapping[str, str] userpass: "The accessor property for user pass auth backends".
143
+ :param Mapping[str, builtins.str] cert: "The accessor and cert_role properties for cert auth backends".
144
+ :param Mapping[str, builtins.str] userpass: "The accessor property for user pass auth backends".
144
145
  """
145
146
  if cert is not None:
146
147
  pulumi.set(__self__, "cert", cert)
@@ -149,7 +150,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
149
150
 
150
151
  @property
151
152
  @pulumi.getter
152
- def cert(self) -> Optional[Mapping[str, str]]:
153
+ def cert(self) -> Optional[Mapping[str, builtins.str]]:
153
154
  """
154
155
  "The accessor and cert_role properties for cert auth backends".
155
156
  """
@@ -157,7 +158,7 @@ class GetBackendConfigEstAuthenticatorResult(dict):
157
158
 
158
159
  @property
159
160
  @pulumi.getter
160
- def userpass(self) -> Optional[Mapping[str, str]]:
161
+ def userpass(self) -> Optional[Mapping[str, builtins.str]]:
161
162
  """
162
163
  "The accessor property for user pass auth backends".
163
164
  """