pulumi-vault 6.7.0a1743490126__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743490126.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743490126.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -63,7 +64,7 @@ class GetSecretResult:
63
64
 
64
65
  @property
65
66
  @pulumi.getter
66
- def data(self) -> Mapping[str, str]:
67
+ def data(self) -> Mapping[str, builtins.str]:
67
68
  """
68
69
  A mapping whose keys are the top-level data keys returned from
69
70
  Vault and whose values are the corresponding values. This map can only
@@ -74,7 +75,7 @@ class GetSecretResult:
74
75
 
75
76
  @property
76
77
  @pulumi.getter(name="dataJson")
77
- def data_json(self) -> str:
78
+ def data_json(self) -> builtins.str:
78
79
  """
79
80
  A string containing the full data payload retrieved from
80
81
  Vault, serialized in JSON format.
@@ -83,7 +84,7 @@ class GetSecretResult:
83
84
 
84
85
  @property
85
86
  @pulumi.getter
86
- def id(self) -> str:
87
+ def id(self) -> builtins.str:
87
88
  """
88
89
  The provider-assigned unique ID for this managed resource.
89
90
  """
@@ -91,7 +92,7 @@ class GetSecretResult:
91
92
 
92
93
  @property
93
94
  @pulumi.getter(name="leaseDuration")
94
- def lease_duration(self) -> int:
95
+ def lease_duration(self) -> builtins.int:
95
96
  """
96
97
  The duration of the secret lease, in seconds relative
97
98
  to the time the data was requested. Once this time has passed any plan
@@ -101,7 +102,7 @@ class GetSecretResult:
101
102
 
102
103
  @property
103
104
  @pulumi.getter(name="leaseId")
104
- def lease_id(self) -> str:
105
+ def lease_id(self) -> builtins.str:
105
106
  """
106
107
  The lease identifier assigned by Vault, if any.
107
108
  """
@@ -109,32 +110,32 @@ class GetSecretResult:
109
110
 
110
111
  @property
111
112
  @pulumi.getter(name="leaseRenewable")
112
- def lease_renewable(self) -> bool:
113
+ def lease_renewable(self) -> builtins.bool:
113
114
  return pulumi.get(self, "lease_renewable")
114
115
 
115
116
  @property
116
117
  @pulumi.getter(name="leaseStartTime")
117
- def lease_start_time(self) -> str:
118
+ def lease_start_time(self) -> builtins.str:
118
119
  return pulumi.get(self, "lease_start_time")
119
120
 
120
121
  @property
121
122
  @pulumi.getter
122
- def namespace(self) -> Optional[str]:
123
+ def namespace(self) -> Optional[builtins.str]:
123
124
  return pulumi.get(self, "namespace")
124
125
 
125
126
  @property
126
127
  @pulumi.getter
127
- def path(self) -> str:
128
+ def path(self) -> builtins.str:
128
129
  return pulumi.get(self, "path")
129
130
 
130
131
  @property
131
132
  @pulumi.getter
132
- def version(self) -> Optional[int]:
133
+ def version(self) -> Optional[builtins.int]:
133
134
  return pulumi.get(self, "version")
134
135
 
135
136
  @property
136
137
  @pulumi.getter(name="withLeaseStartTime")
137
- def with_lease_start_time(self) -> Optional[bool]:
138
+ def with_lease_start_time(self) -> Optional[builtins.bool]:
138
139
  return pulumi.get(self, "with_lease_start_time")
139
140
 
140
141
 
@@ -157,10 +158,10 @@ class AwaitableGetSecretResult(GetSecretResult):
157
158
  with_lease_start_time=self.with_lease_start_time)
158
159
 
159
160
 
160
- def get_secret(namespace: Optional[str] = None,
161
- path: Optional[str] = None,
162
- version: Optional[int] = None,
163
- with_lease_start_time: Optional[bool] = None,
161
+ def get_secret(namespace: Optional[builtins.str] = None,
162
+ path: Optional[builtins.str] = None,
163
+ version: Optional[builtins.int] = None,
164
+ with_lease_start_time: Optional[builtins.bool] = None,
164
165
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
165
166
  """
166
167
  ## Example Usage
@@ -195,19 +196,19 @@ def get_secret(namespace: Optional[str] = None,
195
196
  Use of this resource requires the `read` capability on the given path.
196
197
 
197
198
 
198
- :param str namespace: The namespace of the target resource.
199
+ :param builtins.str namespace: The namespace of the target resource.
199
200
  The value should not contain leading or trailing forward slashes.
200
201
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
201
202
  *Available only for Vault Enterprise*.
202
- :param str path: The full logical path from which to request data.
203
+ :param builtins.str path: The full logical path from which to request data.
203
204
  To read data from the "generic" secret backend mounted in Vault by
204
205
  default, this should be prefixed with `secret/`. Reading from other backends
205
206
  with this data source is possible; consult each backend's documentation
206
207
  to see which endpoints support the `GET` method.
207
- :param int version: The version of the secret to read. This is used by the
208
+ :param builtins.int version: The version of the secret to read. This is used by the
208
209
  Vault KV secrets engine - version 2 to indicate which version of the secret
209
210
  to read.
210
- :param bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
211
+ :param builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
211
212
  Note that storing the `lease_start_time` in the TF state will cause a persistent drift
212
213
  on every `pulumi preview` and will require a `pulumi up`.
213
214
  """
@@ -231,10 +232,10 @@ def get_secret(namespace: Optional[str] = None,
231
232
  path=pulumi.get(__ret__, 'path'),
232
233
  version=pulumi.get(__ret__, 'version'),
233
234
  with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
234
- def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
235
- path: Optional[pulumi.Input[str]] = None,
236
- version: Optional[pulumi.Input[Optional[int]]] = None,
237
- with_lease_start_time: Optional[pulumi.Input[Optional[bool]]] = None,
235
+ def get_secret_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
236
+ path: Optional[pulumi.Input[builtins.str]] = None,
237
+ version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
238
+ with_lease_start_time: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
238
239
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
239
240
  """
240
241
  ## Example Usage
@@ -269,19 +270,19 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
269
270
  Use of this resource requires the `read` capability on the given path.
270
271
 
271
272
 
272
- :param str namespace: The namespace of the target resource.
273
+ :param builtins.str namespace: The namespace of the target resource.
273
274
  The value should not contain leading or trailing forward slashes.
274
275
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
275
276
  *Available only for Vault Enterprise*.
276
- :param str path: The full logical path from which to request data.
277
+ :param builtins.str path: The full logical path from which to request data.
277
278
  To read data from the "generic" secret backend mounted in Vault by
278
279
  default, this should be prefixed with `secret/`. Reading from other backends
279
280
  with this data source is possible; consult each backend's documentation
280
281
  to see which endpoints support the `GET` method.
281
- :param int version: The version of the secret to read. This is used by the
282
+ :param builtins.int version: The version of the secret to read. This is used by the
282
283
  Vault KV secrets engine - version 2 to indicate which version of the secret
283
284
  to read.
284
- :param bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
285
+ :param builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
285
286
  Note that storing the `lease_start_time` in the TF state will cause a persistent drift
286
287
  on every `pulumi preview` and will require a `pulumi up`.
287
288
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,28 +20,28 @@ __all__ = ['SecretArgs', 'Secret']
19
20
  @pulumi.input_type
20
21
  class SecretArgs:
21
22
  def __init__(__self__, *,
22
- data_json: pulumi.Input[str],
23
- path: pulumi.Input[str],
24
- delete_all_versions: Optional[pulumi.Input[bool]] = None,
25
- disable_read: Optional[pulumi.Input[bool]] = None,
26
- namespace: Optional[pulumi.Input[str]] = None):
23
+ data_json: pulumi.Input[builtins.str],
24
+ path: pulumi.Input[builtins.str],
25
+ delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
26
+ disable_read: Optional[pulumi.Input[builtins.bool]] = None,
27
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
27
28
  """
28
29
  The set of arguments for constructing a Secret resource.
29
- :param pulumi.Input[str] data_json: String containing a JSON-encoded object that will be
30
+ :param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
30
31
  written as the secret data at the given path.
31
- :param pulumi.Input[str] path: The full logical path at which to write the given data.
32
+ :param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
32
33
  To write data into the "generic" secret backend mounted in Vault by default,
33
34
  this should be prefixed with `secret/`. Writing to other backends with this
34
35
  resource is possible; consult each backend's documentation to see which
35
36
  endpoints support the `PUT` and `DELETE` methods.
36
- :param pulumi.Input[bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
37
+ :param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
37
38
  If set to `true`, permanently deletes all versions for
38
39
  the specified key. The default behavior is to only delete the latest version of the
39
40
  secret.
40
- :param pulumi.Input[bool] disable_read: true/false. Set this to true if your vault
41
+ :param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
41
42
  authentication is not able to read the data. Setting this to `true` will
42
43
  break drift detection. Defaults to false.
43
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
44
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
44
45
  The value should not contain leading or trailing forward slashes.
45
46
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
46
47
  *Available only for Vault Enterprise*.
@@ -56,7 +57,7 @@ class SecretArgs:
56
57
 
57
58
  @property
58
59
  @pulumi.getter(name="dataJson")
59
- def data_json(self) -> pulumi.Input[str]:
60
+ def data_json(self) -> pulumi.Input[builtins.str]:
60
61
  """
61
62
  String containing a JSON-encoded object that will be
62
63
  written as the secret data at the given path.
@@ -64,12 +65,12 @@ class SecretArgs:
64
65
  return pulumi.get(self, "data_json")
65
66
 
66
67
  @data_json.setter
67
- def data_json(self, value: pulumi.Input[str]):
68
+ def data_json(self, value: pulumi.Input[builtins.str]):
68
69
  pulumi.set(self, "data_json", value)
69
70
 
70
71
  @property
71
72
  @pulumi.getter
72
- def path(self) -> pulumi.Input[str]:
73
+ def path(self) -> pulumi.Input[builtins.str]:
73
74
  """
74
75
  The full logical path at which to write the given data.
75
76
  To write data into the "generic" secret backend mounted in Vault by default,
@@ -80,12 +81,12 @@ class SecretArgs:
80
81
  return pulumi.get(self, "path")
81
82
 
82
83
  @path.setter
83
- def path(self, value: pulumi.Input[str]):
84
+ def path(self, value: pulumi.Input[builtins.str]):
84
85
  pulumi.set(self, "path", value)
85
86
 
86
87
  @property
87
88
  @pulumi.getter(name="deleteAllVersions")
88
- def delete_all_versions(self) -> Optional[pulumi.Input[bool]]:
89
+ def delete_all_versions(self) -> Optional[pulumi.Input[builtins.bool]]:
89
90
  """
90
91
  true/false. Only applicable for kv-v2 stores.
91
92
  If set to `true`, permanently deletes all versions for
@@ -95,12 +96,12 @@ class SecretArgs:
95
96
  return pulumi.get(self, "delete_all_versions")
96
97
 
97
98
  @delete_all_versions.setter
98
- def delete_all_versions(self, value: Optional[pulumi.Input[bool]]):
99
+ def delete_all_versions(self, value: Optional[pulumi.Input[builtins.bool]]):
99
100
  pulumi.set(self, "delete_all_versions", value)
100
101
 
101
102
  @property
102
103
  @pulumi.getter(name="disableRead")
103
- def disable_read(self) -> Optional[pulumi.Input[bool]]:
104
+ def disable_read(self) -> Optional[pulumi.Input[builtins.bool]]:
104
105
  """
105
106
  true/false. Set this to true if your vault
106
107
  authentication is not able to read the data. Setting this to `true` will
@@ -109,12 +110,12 @@ class SecretArgs:
109
110
  return pulumi.get(self, "disable_read")
110
111
 
111
112
  @disable_read.setter
112
- def disable_read(self, value: Optional[pulumi.Input[bool]]):
113
+ def disable_read(self, value: Optional[pulumi.Input[builtins.bool]]):
113
114
  pulumi.set(self, "disable_read", value)
114
115
 
115
116
  @property
116
117
  @pulumi.getter
117
- def namespace(self) -> Optional[pulumi.Input[str]]:
118
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
118
119
  """
119
120
  The namespace to provision the resource in.
120
121
  The value should not contain leading or trailing forward slashes.
@@ -124,39 +125,39 @@ class SecretArgs:
124
125
  return pulumi.get(self, "namespace")
125
126
 
126
127
  @namespace.setter
127
- def namespace(self, value: Optional[pulumi.Input[str]]):
128
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
128
129
  pulumi.set(self, "namespace", value)
129
130
 
130
131
 
131
132
  @pulumi.input_type
132
133
  class _SecretState:
133
134
  def __init__(__self__, *,
134
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
135
- data_json: Optional[pulumi.Input[str]] = None,
136
- delete_all_versions: Optional[pulumi.Input[bool]] = None,
137
- disable_read: Optional[pulumi.Input[bool]] = None,
138
- namespace: Optional[pulumi.Input[str]] = None,
139
- path: Optional[pulumi.Input[str]] = None):
135
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
136
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
137
+ delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
138
+ disable_read: Optional[pulumi.Input[builtins.bool]] = None,
139
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
140
+ path: Optional[pulumi.Input[builtins.str]] = None):
140
141
  """
141
142
  Input properties used for looking up and filtering Secret resources.
142
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
143
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
143
144
  Vault and whose values are the corresponding values. This map can only
144
145
  represent string data, so any non-string values returned from Vault are
145
146
  serialized as JSON.
146
- :param pulumi.Input[str] data_json: String containing a JSON-encoded object that will be
147
+ :param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
147
148
  written as the secret data at the given path.
148
- :param pulumi.Input[bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
149
+ :param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
149
150
  If set to `true`, permanently deletes all versions for
150
151
  the specified key. The default behavior is to only delete the latest version of the
151
152
  secret.
152
- :param pulumi.Input[bool] disable_read: true/false. Set this to true if your vault
153
+ :param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
153
154
  authentication is not able to read the data. Setting this to `true` will
154
155
  break drift detection. Defaults to false.
155
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
156
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
156
157
  The value should not contain leading or trailing forward slashes.
157
158
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
158
159
  *Available only for Vault Enterprise*.
159
- :param pulumi.Input[str] path: The full logical path at which to write the given data.
160
+ :param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
160
161
  To write data into the "generic" secret backend mounted in Vault by default,
161
162
  this should be prefixed with `secret/`. Writing to other backends with this
162
163
  resource is possible; consult each backend's documentation to see which
@@ -177,7 +178,7 @@ class _SecretState:
177
178
 
178
179
  @property
179
180
  @pulumi.getter
180
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
181
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
181
182
  """
182
183
  A mapping whose keys are the top-level data keys returned from
183
184
  Vault and whose values are the corresponding values. This map can only
@@ -187,12 +188,12 @@ class _SecretState:
187
188
  return pulumi.get(self, "data")
188
189
 
189
190
  @data.setter
190
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
191
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
191
192
  pulumi.set(self, "data", value)
192
193
 
193
194
  @property
194
195
  @pulumi.getter(name="dataJson")
195
- def data_json(self) -> Optional[pulumi.Input[str]]:
196
+ def data_json(self) -> Optional[pulumi.Input[builtins.str]]:
196
197
  """
197
198
  String containing a JSON-encoded object that will be
198
199
  written as the secret data at the given path.
@@ -200,12 +201,12 @@ class _SecretState:
200
201
  return pulumi.get(self, "data_json")
201
202
 
202
203
  @data_json.setter
203
- def data_json(self, value: Optional[pulumi.Input[str]]):
204
+ def data_json(self, value: Optional[pulumi.Input[builtins.str]]):
204
205
  pulumi.set(self, "data_json", value)
205
206
 
206
207
  @property
207
208
  @pulumi.getter(name="deleteAllVersions")
208
- def delete_all_versions(self) -> Optional[pulumi.Input[bool]]:
209
+ def delete_all_versions(self) -> Optional[pulumi.Input[builtins.bool]]:
209
210
  """
210
211
  true/false. Only applicable for kv-v2 stores.
211
212
  If set to `true`, permanently deletes all versions for
@@ -215,12 +216,12 @@ class _SecretState:
215
216
  return pulumi.get(self, "delete_all_versions")
216
217
 
217
218
  @delete_all_versions.setter
218
- def delete_all_versions(self, value: Optional[pulumi.Input[bool]]):
219
+ def delete_all_versions(self, value: Optional[pulumi.Input[builtins.bool]]):
219
220
  pulumi.set(self, "delete_all_versions", value)
220
221
 
221
222
  @property
222
223
  @pulumi.getter(name="disableRead")
223
- def disable_read(self) -> Optional[pulumi.Input[bool]]:
224
+ def disable_read(self) -> Optional[pulumi.Input[builtins.bool]]:
224
225
  """
225
226
  true/false. Set this to true if your vault
226
227
  authentication is not able to read the data. Setting this to `true` will
@@ -229,12 +230,12 @@ class _SecretState:
229
230
  return pulumi.get(self, "disable_read")
230
231
 
231
232
  @disable_read.setter
232
- def disable_read(self, value: Optional[pulumi.Input[bool]]):
233
+ def disable_read(self, value: Optional[pulumi.Input[builtins.bool]]):
233
234
  pulumi.set(self, "disable_read", value)
234
235
 
235
236
  @property
236
237
  @pulumi.getter
237
- def namespace(self) -> Optional[pulumi.Input[str]]:
238
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
238
239
  """
239
240
  The namespace to provision the resource in.
240
241
  The value should not contain leading or trailing forward slashes.
@@ -244,12 +245,12 @@ class _SecretState:
244
245
  return pulumi.get(self, "namespace")
245
246
 
246
247
  @namespace.setter
247
- def namespace(self, value: Optional[pulumi.Input[str]]):
248
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
248
249
  pulumi.set(self, "namespace", value)
249
250
 
250
251
  @property
251
252
  @pulumi.getter
252
- def path(self) -> Optional[pulumi.Input[str]]:
253
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
253
254
  """
254
255
  The full logical path at which to write the given data.
255
256
  To write data into the "generic" secret backend mounted in Vault by default,
@@ -260,7 +261,7 @@ class _SecretState:
260
261
  return pulumi.get(self, "path")
261
262
 
262
263
  @path.setter
263
- def path(self, value: Optional[pulumi.Input[str]]):
264
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
264
265
  pulumi.set(self, "path", value)
265
266
 
266
267
 
@@ -269,11 +270,11 @@ class Secret(pulumi.CustomResource):
269
270
  def __init__(__self__,
270
271
  resource_name: str,
271
272
  opts: Optional[pulumi.ResourceOptions] = None,
272
- data_json: Optional[pulumi.Input[str]] = None,
273
- delete_all_versions: Optional[pulumi.Input[bool]] = None,
274
- disable_read: Optional[pulumi.Input[bool]] = None,
275
- namespace: Optional[pulumi.Input[str]] = None,
276
- path: Optional[pulumi.Input[str]] = None,
273
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
274
+ delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
275
+ disable_read: Optional[pulumi.Input[builtins.bool]] = None,
276
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
277
+ path: Optional[pulumi.Input[builtins.str]] = None,
277
278
  __props__=None):
278
279
  """
279
280
  ## Import
@@ -286,20 +287,20 @@ class Secret(pulumi.CustomResource):
286
287
 
287
288
  :param str resource_name: The name of the resource.
288
289
  :param pulumi.ResourceOptions opts: Options for the resource.
289
- :param pulumi.Input[str] data_json: String containing a JSON-encoded object that will be
290
+ :param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
290
291
  written as the secret data at the given path.
291
- :param pulumi.Input[bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
292
+ :param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
292
293
  If set to `true`, permanently deletes all versions for
293
294
  the specified key. The default behavior is to only delete the latest version of the
294
295
  secret.
295
- :param pulumi.Input[bool] disable_read: true/false. Set this to true if your vault
296
+ :param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
296
297
  authentication is not able to read the data. Setting this to `true` will
297
298
  break drift detection. Defaults to false.
298
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
299
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
299
300
  The value should not contain leading or trailing forward slashes.
300
301
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
301
302
  *Available only for Vault Enterprise*.
302
- :param pulumi.Input[str] path: The full logical path at which to write the given data.
303
+ :param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
303
304
  To write data into the "generic" secret backend mounted in Vault by default,
304
305
  this should be prefixed with `secret/`. Writing to other backends with this
305
306
  resource is possible; consult each backend's documentation to see which
@@ -335,11 +336,11 @@ class Secret(pulumi.CustomResource):
335
336
  def _internal_init(__self__,
336
337
  resource_name: str,
337
338
  opts: Optional[pulumi.ResourceOptions] = None,
338
- data_json: Optional[pulumi.Input[str]] = None,
339
- delete_all_versions: Optional[pulumi.Input[bool]] = None,
340
- disable_read: Optional[pulumi.Input[bool]] = None,
341
- namespace: Optional[pulumi.Input[str]] = None,
342
- path: Optional[pulumi.Input[str]] = None,
339
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
340
+ delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
341
+ disable_read: Optional[pulumi.Input[builtins.bool]] = None,
342
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
343
+ path: Optional[pulumi.Input[builtins.str]] = None,
343
344
  __props__=None):
344
345
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
345
346
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -371,12 +372,12 @@ class Secret(pulumi.CustomResource):
371
372
  def get(resource_name: str,
372
373
  id: pulumi.Input[str],
373
374
  opts: Optional[pulumi.ResourceOptions] = None,
374
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
375
- data_json: Optional[pulumi.Input[str]] = None,
376
- delete_all_versions: Optional[pulumi.Input[bool]] = None,
377
- disable_read: Optional[pulumi.Input[bool]] = None,
378
- namespace: Optional[pulumi.Input[str]] = None,
379
- path: Optional[pulumi.Input[str]] = None) -> 'Secret':
375
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
376
+ data_json: Optional[pulumi.Input[builtins.str]] = None,
377
+ delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
378
+ disable_read: Optional[pulumi.Input[builtins.bool]] = None,
379
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
380
+ path: Optional[pulumi.Input[builtins.str]] = None) -> 'Secret':
380
381
  """
381
382
  Get an existing Secret resource's state with the given name, id, and optional extra
382
383
  properties used to qualify the lookup.
@@ -384,24 +385,24 @@ class Secret(pulumi.CustomResource):
384
385
  :param str resource_name: The unique name of the resulting resource.
385
386
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
386
387
  :param pulumi.ResourceOptions opts: Options for the resource.
387
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
388
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
388
389
  Vault and whose values are the corresponding values. This map can only
389
390
  represent string data, so any non-string values returned from Vault are
390
391
  serialized as JSON.
391
- :param pulumi.Input[str] data_json: String containing a JSON-encoded object that will be
392
+ :param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
392
393
  written as the secret data at the given path.
393
- :param pulumi.Input[bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
394
+ :param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
394
395
  If set to `true`, permanently deletes all versions for
395
396
  the specified key. The default behavior is to only delete the latest version of the
396
397
  secret.
397
- :param pulumi.Input[bool] disable_read: true/false. Set this to true if your vault
398
+ :param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
398
399
  authentication is not able to read the data. Setting this to `true` will
399
400
  break drift detection. Defaults to false.
400
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
401
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
401
402
  The value should not contain leading or trailing forward slashes.
402
403
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
403
404
  *Available only for Vault Enterprise*.
404
- :param pulumi.Input[str] path: The full logical path at which to write the given data.
405
+ :param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
405
406
  To write data into the "generic" secret backend mounted in Vault by default,
406
407
  this should be prefixed with `secret/`. Writing to other backends with this
407
408
  resource is possible; consult each backend's documentation to see which
@@ -421,7 +422,7 @@ class Secret(pulumi.CustomResource):
421
422
 
422
423
  @property
423
424
  @pulumi.getter
424
- def data(self) -> pulumi.Output[Mapping[str, str]]:
425
+ def data(self) -> pulumi.Output[Mapping[str, builtins.str]]:
425
426
  """
426
427
  A mapping whose keys are the top-level data keys returned from
427
428
  Vault and whose values are the corresponding values. This map can only
@@ -432,7 +433,7 @@ class Secret(pulumi.CustomResource):
432
433
 
433
434
  @property
434
435
  @pulumi.getter(name="dataJson")
435
- def data_json(self) -> pulumi.Output[str]:
436
+ def data_json(self) -> pulumi.Output[builtins.str]:
436
437
  """
437
438
  String containing a JSON-encoded object that will be
438
439
  written as the secret data at the given path.
@@ -441,7 +442,7 @@ class Secret(pulumi.CustomResource):
441
442
 
442
443
  @property
443
444
  @pulumi.getter(name="deleteAllVersions")
444
- def delete_all_versions(self) -> pulumi.Output[Optional[bool]]:
445
+ def delete_all_versions(self) -> pulumi.Output[Optional[builtins.bool]]:
445
446
  """
446
447
  true/false. Only applicable for kv-v2 stores.
447
448
  If set to `true`, permanently deletes all versions for
@@ -452,7 +453,7 @@ class Secret(pulumi.CustomResource):
452
453
 
453
454
  @property
454
455
  @pulumi.getter(name="disableRead")
455
- def disable_read(self) -> pulumi.Output[Optional[bool]]:
456
+ def disable_read(self) -> pulumi.Output[Optional[builtins.bool]]:
456
457
  """
457
458
  true/false. Set this to true if your vault
458
459
  authentication is not able to read the data. Setting this to `true` will
@@ -462,7 +463,7 @@ class Secret(pulumi.CustomResource):
462
463
 
463
464
  @property
464
465
  @pulumi.getter
465
- def namespace(self) -> pulumi.Output[Optional[str]]:
466
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
466
467
  """
467
468
  The namespace to provision the resource in.
468
469
  The value should not contain leading or trailing forward slashes.
@@ -473,7 +474,7 @@ class Secret(pulumi.CustomResource):
473
474
 
474
475
  @property
475
476
  @pulumi.getter
476
- def path(self) -> pulumi.Output[str]:
477
+ def path(self) -> pulumi.Output[builtins.str]:
477
478
  """
478
479
  The full logical path at which to write the given data.
479
480
  To write data into the "generic" secret backend mounted in Vault by default,