pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -69,22 +70,22 @@ class GetSecretBackendSignResult:
69
70
 
70
71
  @property
71
72
  @pulumi.getter(name="certType")
72
- def cert_type(self) -> Optional[str]:
73
+ def cert_type(self) -> Optional[builtins.str]:
73
74
  return pulumi.get(self, "cert_type")
74
75
 
75
76
  @property
76
77
  @pulumi.getter(name="criticalOptions")
77
- def critical_options(self) -> Optional[Mapping[str, str]]:
78
+ def critical_options(self) -> Optional[Mapping[str, builtins.str]]:
78
79
  return pulumi.get(self, "critical_options")
79
80
 
80
81
  @property
81
82
  @pulumi.getter
82
- def extensions(self) -> Optional[Mapping[str, str]]:
83
+ def extensions(self) -> Optional[Mapping[str, builtins.str]]:
83
84
  return pulumi.get(self, "extensions")
84
85
 
85
86
  @property
86
87
  @pulumi.getter
87
- def id(self) -> str:
88
+ def id(self) -> builtins.str:
88
89
  """
89
90
  The provider-assigned unique ID for this managed resource.
90
91
  """
@@ -92,32 +93,32 @@ class GetSecretBackendSignResult:
92
93
 
93
94
  @property
94
95
  @pulumi.getter(name="keyId")
95
- def key_id(self) -> Optional[str]:
96
+ def key_id(self) -> Optional[builtins.str]:
96
97
  return pulumi.get(self, "key_id")
97
98
 
98
99
  @property
99
100
  @pulumi.getter
100
- def name(self) -> str:
101
+ def name(self) -> builtins.str:
101
102
  return pulumi.get(self, "name")
102
103
 
103
104
  @property
104
105
  @pulumi.getter
105
- def namespace(self) -> Optional[str]:
106
+ def namespace(self) -> Optional[builtins.str]:
106
107
  return pulumi.get(self, "namespace")
107
108
 
108
109
  @property
109
110
  @pulumi.getter
110
- def path(self) -> str:
111
+ def path(self) -> builtins.str:
111
112
  return pulumi.get(self, "path")
112
113
 
113
114
  @property
114
115
  @pulumi.getter(name="publicKey")
115
- def public_key(self) -> str:
116
+ def public_key(self) -> builtins.str:
116
117
  return pulumi.get(self, "public_key")
117
118
 
118
119
  @property
119
120
  @pulumi.getter(name="serialNumber")
120
- def serial_number(self) -> str:
121
+ def serial_number(self) -> builtins.str:
121
122
  """
122
123
  The serial number of the certificate returned from Vault
123
124
  """
@@ -125,7 +126,7 @@ class GetSecretBackendSignResult:
125
126
 
126
127
  @property
127
128
  @pulumi.getter(name="signedKey")
128
- def signed_key(self) -> str:
129
+ def signed_key(self) -> builtins.str:
129
130
  """
130
131
  The signed certificate returned from Vault
131
132
  """
@@ -133,12 +134,12 @@ class GetSecretBackendSignResult:
133
134
 
134
135
  @property
135
136
  @pulumi.getter
136
- def ttl(self) -> Optional[str]:
137
+ def ttl(self) -> Optional[builtins.str]:
137
138
  return pulumi.get(self, "ttl")
138
139
 
139
140
  @property
140
141
  @pulumi.getter(name="validPrincipals")
141
- def valid_principals(self) -> Optional[str]:
142
+ def valid_principals(self) -> Optional[builtins.str]:
142
143
  return pulumi.get(self, "valid_principals")
143
144
 
144
145
 
@@ -163,16 +164,16 @@ class AwaitableGetSecretBackendSignResult(GetSecretBackendSignResult):
163
164
  valid_principals=self.valid_principals)
164
165
 
165
166
 
166
- def get_secret_backend_sign(cert_type: Optional[str] = None,
167
- critical_options: Optional[Mapping[str, str]] = None,
168
- extensions: Optional[Mapping[str, str]] = None,
169
- key_id: Optional[str] = None,
170
- name: Optional[str] = None,
171
- namespace: Optional[str] = None,
172
- path: Optional[str] = None,
173
- public_key: Optional[str] = None,
174
- ttl: Optional[str] = None,
175
- valid_principals: Optional[str] = None,
167
+ def get_secret_backend_sign(cert_type: Optional[builtins.str] = None,
168
+ critical_options: Optional[Mapping[str, builtins.str]] = None,
169
+ extensions: Optional[Mapping[str, builtins.str]] = None,
170
+ key_id: Optional[builtins.str] = None,
171
+ name: Optional[builtins.str] = None,
172
+ namespace: Optional[builtins.str] = None,
173
+ path: Optional[builtins.str] = None,
174
+ public_key: Optional[builtins.str] = None,
175
+ ttl: Optional[builtins.str] = None,
176
+ valid_principals: Optional[builtins.str] = None,
176
177
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretBackendSignResult:
177
178
  """
178
179
  This is a data source which can be used to sign an SSH public key
@@ -190,15 +191,15 @@ def get_secret_backend_sign(cert_type: Optional[str] = None,
190
191
  ```
191
192
 
192
193
 
193
- :param str cert_type: Specifies the type of certificate to be created; either "user" or "host".
194
- :param Mapping[str, str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
195
- :param Mapping[str, str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
196
- :param str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
197
- :param str name: Specifies the name of the role to sign.
198
- :param str path: Full path where SSH backend is mounted.
199
- :param str public_key: Specifies the SSH public key that should be signed.
200
- :param str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
201
- :param str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
194
+ :param builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
195
+ :param Mapping[str, builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
196
+ :param Mapping[str, builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
197
+ :param builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
198
+ :param builtins.str name: Specifies the name of the role to sign.
199
+ :param builtins.str path: Full path where SSH backend is mounted.
200
+ :param builtins.str public_key: Specifies the SSH public key that should be signed.
201
+ :param builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
202
+ :param builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
202
203
  """
203
204
  __args__ = dict()
204
205
  __args__['certType'] = cert_type
@@ -228,16 +229,16 @@ def get_secret_backend_sign(cert_type: Optional[str] = None,
228
229
  signed_key=pulumi.get(__ret__, 'signed_key'),
229
230
  ttl=pulumi.get(__ret__, 'ttl'),
230
231
  valid_principals=pulumi.get(__ret__, 'valid_principals'))
231
- def get_secret_backend_sign_output(cert_type: Optional[pulumi.Input[Optional[str]]] = None,
232
- critical_options: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None,
233
- extensions: Optional[pulumi.Input[Optional[Mapping[str, str]]]] = None,
234
- key_id: Optional[pulumi.Input[Optional[str]]] = None,
235
- name: Optional[pulumi.Input[str]] = None,
236
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
237
- path: Optional[pulumi.Input[str]] = None,
238
- public_key: Optional[pulumi.Input[str]] = None,
239
- ttl: Optional[pulumi.Input[Optional[str]]] = None,
240
- valid_principals: Optional[pulumi.Input[Optional[str]]] = None,
232
+ def get_secret_backend_sign_output(cert_type: Optional[pulumi.Input[Optional[builtins.str]]] = None,
233
+ critical_options: Optional[pulumi.Input[Optional[Mapping[str, builtins.str]]]] = None,
234
+ extensions: Optional[pulumi.Input[Optional[Mapping[str, builtins.str]]]] = None,
235
+ key_id: Optional[pulumi.Input[Optional[builtins.str]]] = None,
236
+ name: Optional[pulumi.Input[builtins.str]] = None,
237
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
238
+ path: Optional[pulumi.Input[builtins.str]] = None,
239
+ public_key: Optional[pulumi.Input[builtins.str]] = None,
240
+ ttl: Optional[pulumi.Input[Optional[builtins.str]]] = None,
241
+ valid_principals: Optional[pulumi.Input[Optional[builtins.str]]] = None,
241
242
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretBackendSignResult]:
242
243
  """
243
244
  This is a data source which can be used to sign an SSH public key
@@ -255,15 +256,15 @@ def get_secret_backend_sign_output(cert_type: Optional[pulumi.Input[Optional[str
255
256
  ```
256
257
 
257
258
 
258
- :param str cert_type: Specifies the type of certificate to be created; either "user" or "host".
259
- :param Mapping[str, str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
260
- :param Mapping[str, str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
261
- :param str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
262
- :param str name: Specifies the name of the role to sign.
263
- :param str path: Full path where SSH backend is mounted.
264
- :param str public_key: Specifies the SSH public key that should be signed.
265
- :param str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
266
- :param str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
259
+ :param builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
260
+ :param Mapping[str, builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
261
+ :param Mapping[str, builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
262
+ :param builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
263
+ :param builtins.str name: Specifies the name of the role to sign.
264
+ :param builtins.str path: Full path where SSH backend is mounted.
265
+ :param builtins.str public_key: Specifies the SSH public key that should be signed.
266
+ :param builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
267
+ :param builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
267
268
  """
268
269
  __args__ = dict()
269
270
  __args__['certType'] = cert_type
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -21,11 +22,11 @@ __all__ = [
21
22
  @pulumi.output_type
22
23
  class SecretBackendRoleAllowedUserKeyConfig(dict):
23
24
  def __init__(__self__, *,
24
- lengths: Sequence[int],
25
- type: str):
25
+ lengths: Sequence[builtins.int],
26
+ type: builtins.str):
26
27
  """
27
- :param Sequence[int] lengths: List of allowed key lengths, vault-1.10 and above
28
- :param str type: Key type, choices:
28
+ :param Sequence[builtins.int] lengths: List of allowed key lengths, vault-1.10 and above
29
+ :param builtins.str type: Key type, choices:
29
30
  rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
30
31
  """
31
32
  pulumi.set(__self__, "lengths", lengths)
@@ -33,7 +34,7 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
33
34
 
34
35
  @property
35
36
  @pulumi.getter
36
- def lengths(self) -> Sequence[int]:
37
+ def lengths(self) -> Sequence[builtins.int]:
37
38
  """
38
39
  List of allowed key lengths, vault-1.10 and above
39
40
  """
@@ -41,7 +42,7 @@ class SecretBackendRoleAllowedUserKeyConfig(dict):
41
42
 
42
43
  @property
43
44
  @pulumi.getter
44
- def type(self) -> str:
45
+ def type(self) -> builtins.str:
45
46
  """
46
47
  Key type, choices:
47
48
  rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521