pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,25 +20,25 @@ __all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
19
20
  @pulumi.input_type
20
21
  class SecretBackendCaArgs:
21
22
  def __init__(__self__, *,
22
- backend: Optional[pulumi.Input[str]] = None,
23
- generate_signing_key: Optional[pulumi.Input[bool]] = None,
24
- key_bits: Optional[pulumi.Input[int]] = None,
25
- key_type: Optional[pulumi.Input[str]] = None,
26
- namespace: Optional[pulumi.Input[str]] = None,
27
- private_key: Optional[pulumi.Input[str]] = None,
28
- public_key: Optional[pulumi.Input[str]] = None):
23
+ backend: Optional[pulumi.Input[builtins.str]] = None,
24
+ generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
25
+ key_bits: Optional[pulumi.Input[builtins.int]] = None,
26
+ key_type: Optional[pulumi.Input[builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
28
+ private_key: Optional[pulumi.Input[builtins.str]] = None,
29
+ public_key: Optional[pulumi.Input[builtins.str]] = None):
29
30
  """
30
31
  The set of arguments for constructing a SecretBackendCa resource.
31
- :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
32
- :param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
33
- :param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
34
- :param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
35
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
32
+ :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
33
+ :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
34
+ :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
35
+ :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
36
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
36
37
  The value should not contain leading or trailing forward slashes.
37
38
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
39
  *Available only for Vault Enterprise*.
39
- :param pulumi.Input[str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
40
- :param pulumi.Input[str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
40
+ :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
41
+ :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
41
42
  """
42
43
  if backend is not None:
43
44
  pulumi.set(__self__, "backend", backend)
@@ -56,55 +57,55 @@ class SecretBackendCaArgs:
56
57
 
57
58
  @property
58
59
  @pulumi.getter
59
- def backend(self) -> Optional[pulumi.Input[str]]:
60
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
60
61
  """
61
62
  The path where the SSH secret backend is mounted. Defaults to 'ssh'
62
63
  """
63
64
  return pulumi.get(self, "backend")
64
65
 
65
66
  @backend.setter
66
- def backend(self, value: Optional[pulumi.Input[str]]):
67
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
67
68
  pulumi.set(self, "backend", value)
68
69
 
69
70
  @property
70
71
  @pulumi.getter(name="generateSigningKey")
71
- def generate_signing_key(self) -> Optional[pulumi.Input[bool]]:
72
+ def generate_signing_key(self) -> Optional[pulumi.Input[builtins.bool]]:
72
73
  """
73
74
  Whether Vault should generate the signing key pair internally. Defaults to true
74
75
  """
75
76
  return pulumi.get(self, "generate_signing_key")
76
77
 
77
78
  @generate_signing_key.setter
78
- def generate_signing_key(self, value: Optional[pulumi.Input[bool]]):
79
+ def generate_signing_key(self, value: Optional[pulumi.Input[builtins.bool]]):
79
80
  pulumi.set(self, "generate_signing_key", value)
80
81
 
81
82
  @property
82
83
  @pulumi.getter(name="keyBits")
83
- def key_bits(self) -> Optional[pulumi.Input[int]]:
84
+ def key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
84
85
  """
85
86
  Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
86
87
  """
87
88
  return pulumi.get(self, "key_bits")
88
89
 
89
90
  @key_bits.setter
90
- def key_bits(self, value: Optional[pulumi.Input[int]]):
91
+ def key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
91
92
  pulumi.set(self, "key_bits", value)
92
93
 
93
94
  @property
94
95
  @pulumi.getter(name="keyType")
95
- def key_type(self) -> Optional[pulumi.Input[str]]:
96
+ def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
96
97
  """
97
98
  Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
98
99
  """
99
100
  return pulumi.get(self, "key_type")
100
101
 
101
102
  @key_type.setter
102
- def key_type(self, value: Optional[pulumi.Input[str]]):
103
+ def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
103
104
  pulumi.set(self, "key_type", value)
104
105
 
105
106
  @property
106
107
  @pulumi.getter
107
- def namespace(self) -> Optional[pulumi.Input[str]]:
108
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
108
109
  """
109
110
  The namespace to provision the resource in.
110
111
  The value should not contain leading or trailing forward slashes.
@@ -114,56 +115,56 @@ class SecretBackendCaArgs:
114
115
  return pulumi.get(self, "namespace")
115
116
 
116
117
  @namespace.setter
117
- def namespace(self, value: Optional[pulumi.Input[str]]):
118
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
118
119
  pulumi.set(self, "namespace", value)
119
120
 
120
121
  @property
121
122
  @pulumi.getter(name="privateKey")
122
- def private_key(self) -> Optional[pulumi.Input[str]]:
123
+ def private_key(self) -> Optional[pulumi.Input[builtins.str]]:
123
124
  """
124
125
  Private key part the SSH CA key pair; required if generate_signing_key is false.
125
126
  """
126
127
  return pulumi.get(self, "private_key")
127
128
 
128
129
  @private_key.setter
129
- def private_key(self, value: Optional[pulumi.Input[str]]):
130
+ def private_key(self, value: Optional[pulumi.Input[builtins.str]]):
130
131
  pulumi.set(self, "private_key", value)
131
132
 
132
133
  @property
133
134
  @pulumi.getter(name="publicKey")
134
- def public_key(self) -> Optional[pulumi.Input[str]]:
135
+ def public_key(self) -> Optional[pulumi.Input[builtins.str]]:
135
136
  """
136
137
  The public key part the SSH CA key pair; required if generate_signing_key is false.
137
138
  """
138
139
  return pulumi.get(self, "public_key")
139
140
 
140
141
  @public_key.setter
141
- def public_key(self, value: Optional[pulumi.Input[str]]):
142
+ def public_key(self, value: Optional[pulumi.Input[builtins.str]]):
142
143
  pulumi.set(self, "public_key", value)
143
144
 
144
145
 
145
146
  @pulumi.input_type
146
147
  class _SecretBackendCaState:
147
148
  def __init__(__self__, *,
148
- backend: Optional[pulumi.Input[str]] = None,
149
- generate_signing_key: Optional[pulumi.Input[bool]] = None,
150
- key_bits: Optional[pulumi.Input[int]] = None,
151
- key_type: Optional[pulumi.Input[str]] = None,
152
- namespace: Optional[pulumi.Input[str]] = None,
153
- private_key: Optional[pulumi.Input[str]] = None,
154
- public_key: Optional[pulumi.Input[str]] = None):
149
+ backend: Optional[pulumi.Input[builtins.str]] = None,
150
+ generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
151
+ key_bits: Optional[pulumi.Input[builtins.int]] = None,
152
+ key_type: Optional[pulumi.Input[builtins.str]] = None,
153
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
154
+ private_key: Optional[pulumi.Input[builtins.str]] = None,
155
+ public_key: Optional[pulumi.Input[builtins.str]] = None):
155
156
  """
156
157
  Input properties used for looking up and filtering SecretBackendCa resources.
157
- :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
158
- :param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
159
- :param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
160
- :param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
161
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
158
+ :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
159
+ :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
160
+ :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
161
+ :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
162
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
162
163
  The value should not contain leading or trailing forward slashes.
163
164
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
164
165
  *Available only for Vault Enterprise*.
165
- :param pulumi.Input[str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
166
- :param pulumi.Input[str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
166
+ :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
167
+ :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
167
168
  """
168
169
  if backend is not None:
169
170
  pulumi.set(__self__, "backend", backend)
@@ -182,55 +183,55 @@ class _SecretBackendCaState:
182
183
 
183
184
  @property
184
185
  @pulumi.getter
185
- def backend(self) -> Optional[pulumi.Input[str]]:
186
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
186
187
  """
187
188
  The path where the SSH secret backend is mounted. Defaults to 'ssh'
188
189
  """
189
190
  return pulumi.get(self, "backend")
190
191
 
191
192
  @backend.setter
192
- def backend(self, value: Optional[pulumi.Input[str]]):
193
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
193
194
  pulumi.set(self, "backend", value)
194
195
 
195
196
  @property
196
197
  @pulumi.getter(name="generateSigningKey")
197
- def generate_signing_key(self) -> Optional[pulumi.Input[bool]]:
198
+ def generate_signing_key(self) -> Optional[pulumi.Input[builtins.bool]]:
198
199
  """
199
200
  Whether Vault should generate the signing key pair internally. Defaults to true
200
201
  """
201
202
  return pulumi.get(self, "generate_signing_key")
202
203
 
203
204
  @generate_signing_key.setter
204
- def generate_signing_key(self, value: Optional[pulumi.Input[bool]]):
205
+ def generate_signing_key(self, value: Optional[pulumi.Input[builtins.bool]]):
205
206
  pulumi.set(self, "generate_signing_key", value)
206
207
 
207
208
  @property
208
209
  @pulumi.getter(name="keyBits")
209
- def key_bits(self) -> Optional[pulumi.Input[int]]:
210
+ def key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
210
211
  """
211
212
  Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
212
213
  """
213
214
  return pulumi.get(self, "key_bits")
214
215
 
215
216
  @key_bits.setter
216
- def key_bits(self, value: Optional[pulumi.Input[int]]):
217
+ def key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
217
218
  pulumi.set(self, "key_bits", value)
218
219
 
219
220
  @property
220
221
  @pulumi.getter(name="keyType")
221
- def key_type(self) -> Optional[pulumi.Input[str]]:
222
+ def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
222
223
  """
223
224
  Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
224
225
  """
225
226
  return pulumi.get(self, "key_type")
226
227
 
227
228
  @key_type.setter
228
- def key_type(self, value: Optional[pulumi.Input[str]]):
229
+ def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
229
230
  pulumi.set(self, "key_type", value)
230
231
 
231
232
  @property
232
233
  @pulumi.getter
233
- def namespace(self) -> Optional[pulumi.Input[str]]:
234
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
234
235
  """
235
236
  The namespace to provision the resource in.
236
237
  The value should not contain leading or trailing forward slashes.
@@ -240,31 +241,31 @@ class _SecretBackendCaState:
240
241
  return pulumi.get(self, "namespace")
241
242
 
242
243
  @namespace.setter
243
- def namespace(self, value: Optional[pulumi.Input[str]]):
244
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
244
245
  pulumi.set(self, "namespace", value)
245
246
 
246
247
  @property
247
248
  @pulumi.getter(name="privateKey")
248
- def private_key(self) -> Optional[pulumi.Input[str]]:
249
+ def private_key(self) -> Optional[pulumi.Input[builtins.str]]:
249
250
  """
250
251
  Private key part the SSH CA key pair; required if generate_signing_key is false.
251
252
  """
252
253
  return pulumi.get(self, "private_key")
253
254
 
254
255
  @private_key.setter
255
- def private_key(self, value: Optional[pulumi.Input[str]]):
256
+ def private_key(self, value: Optional[pulumi.Input[builtins.str]]):
256
257
  pulumi.set(self, "private_key", value)
257
258
 
258
259
  @property
259
260
  @pulumi.getter(name="publicKey")
260
- def public_key(self) -> Optional[pulumi.Input[str]]:
261
+ def public_key(self) -> Optional[pulumi.Input[builtins.str]]:
261
262
  """
262
263
  The public key part the SSH CA key pair; required if generate_signing_key is false.
263
264
  """
264
265
  return pulumi.get(self, "public_key")
265
266
 
266
267
  @public_key.setter
267
- def public_key(self, value: Optional[pulumi.Input[str]]):
268
+ def public_key(self, value: Optional[pulumi.Input[builtins.str]]):
268
269
  pulumi.set(self, "public_key", value)
269
270
 
270
271
 
@@ -273,13 +274,13 @@ class SecretBackendCa(pulumi.CustomResource):
273
274
  def __init__(__self__,
274
275
  resource_name: str,
275
276
  opts: Optional[pulumi.ResourceOptions] = None,
276
- backend: Optional[pulumi.Input[str]] = None,
277
- generate_signing_key: Optional[pulumi.Input[bool]] = None,
278
- key_bits: Optional[pulumi.Input[int]] = None,
279
- key_type: Optional[pulumi.Input[str]] = None,
280
- namespace: Optional[pulumi.Input[str]] = None,
281
- private_key: Optional[pulumi.Input[str]] = None,
282
- public_key: Optional[pulumi.Input[str]] = None,
277
+ backend: Optional[pulumi.Input[builtins.str]] = None,
278
+ generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
279
+ key_bits: Optional[pulumi.Input[builtins.int]] = None,
280
+ key_type: Optional[pulumi.Input[builtins.str]] = None,
281
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
282
+ private_key: Optional[pulumi.Input[builtins.str]] = None,
283
+ public_key: Optional[pulumi.Input[builtins.str]] = None,
283
284
  __props__=None):
284
285
  """
285
286
  Provides a resource to manage CA information in an SSH secret backend
@@ -305,16 +306,16 @@ class SecretBackendCa(pulumi.CustomResource):
305
306
 
306
307
  :param str resource_name: The name of the resource.
307
308
  :param pulumi.ResourceOptions opts: Options for the resource.
308
- :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
309
- :param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
310
- :param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
311
- :param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
312
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
309
+ :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
310
+ :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
311
+ :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
312
+ :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
313
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
313
314
  The value should not contain leading or trailing forward slashes.
314
315
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
315
316
  *Available only for Vault Enterprise*.
316
- :param pulumi.Input[str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
317
- :param pulumi.Input[str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
317
+ :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
318
+ :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
318
319
  """
319
320
  ...
320
321
  @overload
@@ -359,13 +360,13 @@ class SecretBackendCa(pulumi.CustomResource):
359
360
  def _internal_init(__self__,
360
361
  resource_name: str,
361
362
  opts: Optional[pulumi.ResourceOptions] = None,
362
- backend: Optional[pulumi.Input[str]] = None,
363
- generate_signing_key: Optional[pulumi.Input[bool]] = None,
364
- key_bits: Optional[pulumi.Input[int]] = None,
365
- key_type: Optional[pulumi.Input[str]] = None,
366
- namespace: Optional[pulumi.Input[str]] = None,
367
- private_key: Optional[pulumi.Input[str]] = None,
368
- public_key: Optional[pulumi.Input[str]] = None,
363
+ backend: Optional[pulumi.Input[builtins.str]] = None,
364
+ generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
365
+ key_bits: Optional[pulumi.Input[builtins.int]] = None,
366
+ key_type: Optional[pulumi.Input[builtins.str]] = None,
367
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
368
+ private_key: Optional[pulumi.Input[builtins.str]] = None,
369
+ public_key: Optional[pulumi.Input[builtins.str]] = None,
369
370
  __props__=None):
370
371
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
371
372
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -394,13 +395,13 @@ class SecretBackendCa(pulumi.CustomResource):
394
395
  def get(resource_name: str,
395
396
  id: pulumi.Input[str],
396
397
  opts: Optional[pulumi.ResourceOptions] = None,
397
- backend: Optional[pulumi.Input[str]] = None,
398
- generate_signing_key: Optional[pulumi.Input[bool]] = None,
399
- key_bits: Optional[pulumi.Input[int]] = None,
400
- key_type: Optional[pulumi.Input[str]] = None,
401
- namespace: Optional[pulumi.Input[str]] = None,
402
- private_key: Optional[pulumi.Input[str]] = None,
403
- public_key: Optional[pulumi.Input[str]] = None) -> 'SecretBackendCa':
398
+ backend: Optional[pulumi.Input[builtins.str]] = None,
399
+ generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
400
+ key_bits: Optional[pulumi.Input[builtins.int]] = None,
401
+ key_type: Optional[pulumi.Input[builtins.str]] = None,
402
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
403
+ private_key: Optional[pulumi.Input[builtins.str]] = None,
404
+ public_key: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendCa':
404
405
  """
405
406
  Get an existing SecretBackendCa resource's state with the given name, id, and optional extra
406
407
  properties used to qualify the lookup.
@@ -408,16 +409,16 @@ class SecretBackendCa(pulumi.CustomResource):
408
409
  :param str resource_name: The unique name of the resulting resource.
409
410
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
410
411
  :param pulumi.ResourceOptions opts: Options for the resource.
411
- :param pulumi.Input[str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
412
- :param pulumi.Input[bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
413
- :param pulumi.Input[int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
414
- :param pulumi.Input[str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
415
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
412
+ :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
413
+ :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
414
+ :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
415
+ :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
416
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
416
417
  The value should not contain leading or trailing forward slashes.
417
418
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
418
419
  *Available only for Vault Enterprise*.
419
- :param pulumi.Input[str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
420
- :param pulumi.Input[str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
420
+ :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
421
+ :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
421
422
  """
422
423
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
423
424
 
@@ -434,7 +435,7 @@ class SecretBackendCa(pulumi.CustomResource):
434
435
 
435
436
  @property
436
437
  @pulumi.getter
437
- def backend(self) -> pulumi.Output[Optional[str]]:
438
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
438
439
  """
439
440
  The path where the SSH secret backend is mounted. Defaults to 'ssh'
440
441
  """
@@ -442,7 +443,7 @@ class SecretBackendCa(pulumi.CustomResource):
442
443
 
443
444
  @property
444
445
  @pulumi.getter(name="generateSigningKey")
445
- def generate_signing_key(self) -> pulumi.Output[Optional[bool]]:
446
+ def generate_signing_key(self) -> pulumi.Output[Optional[builtins.bool]]:
446
447
  """
447
448
  Whether Vault should generate the signing key pair internally. Defaults to true
448
449
  """
@@ -450,7 +451,7 @@ class SecretBackendCa(pulumi.CustomResource):
450
451
 
451
452
  @property
452
453
  @pulumi.getter(name="keyBits")
453
- def key_bits(self) -> pulumi.Output[Optional[int]]:
454
+ def key_bits(self) -> pulumi.Output[Optional[builtins.int]]:
454
455
  """
455
456
  Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
456
457
  """
@@ -458,7 +459,7 @@ class SecretBackendCa(pulumi.CustomResource):
458
459
 
459
460
  @property
460
461
  @pulumi.getter(name="keyType")
461
- def key_type(self) -> pulumi.Output[Optional[str]]:
462
+ def key_type(self) -> pulumi.Output[Optional[builtins.str]]:
462
463
  """
463
464
  Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
464
465
  """
@@ -466,7 +467,7 @@ class SecretBackendCa(pulumi.CustomResource):
466
467
 
467
468
  @property
468
469
  @pulumi.getter
469
- def namespace(self) -> pulumi.Output[Optional[str]]:
470
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
470
471
  """
471
472
  The namespace to provision the resource in.
472
473
  The value should not contain leading or trailing forward slashes.
@@ -477,7 +478,7 @@ class SecretBackendCa(pulumi.CustomResource):
477
478
 
478
479
  @property
479
480
  @pulumi.getter(name="privateKey")
480
- def private_key(self) -> pulumi.Output[str]:
481
+ def private_key(self) -> pulumi.Output[builtins.str]:
481
482
  """
482
483
  Private key part the SSH CA key pair; required if generate_signing_key is false.
483
484
  """
@@ -485,7 +486,7 @@ class SecretBackendCa(pulumi.CustomResource):
485
486
 
486
487
  @property
487
488
  @pulumi.getter(name="publicKey")
488
- def public_key(self) -> pulumi.Output[str]:
489
+ def public_key(self) -> pulumi.Output[builtins.str]:
489
490
  """
490
491
  The public key part the SSH CA key pair; required if generate_signing_key is false.
491
492
  """