pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,28 +20,28 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
19
20
  @pulumi.input_type
20
21
  class SecretBackendStaticRoleArgs:
21
22
  def __init__(__self__, *,
22
- role_name: pulumi.Input[str],
23
- rotation_period: pulumi.Input[int],
24
- username: pulumi.Input[str],
25
- dn: Optional[pulumi.Input[str]] = None,
26
- mount: Optional[pulumi.Input[str]] = None,
27
- namespace: Optional[pulumi.Input[str]] = None,
28
- skip_import_rotation: Optional[pulumi.Input[bool]] = None):
23
+ role_name: pulumi.Input[builtins.str],
24
+ rotation_period: pulumi.Input[builtins.int],
25
+ username: pulumi.Input[builtins.str],
26
+ dn: Optional[pulumi.Input[builtins.str]] = None,
27
+ mount: Optional[pulumi.Input[builtins.str]] = None,
28
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
29
+ skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None):
29
30
  """
30
31
  The set of arguments for constructing a SecretBackendStaticRole resource.
31
- :param pulumi.Input[str] role_name: Name of the role.
32
- :param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
33
- :param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
34
- :param pulumi.Input[str] dn: Distinguished name (DN) of the existing LDAP entry to manage
32
+ :param pulumi.Input[builtins.str] role_name: Name of the role.
33
+ :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
34
+ :param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
35
+ :param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
35
36
  password rotation for. If given, it will take precedence over `username` for the LDAP
36
37
  search performed during password rotation. Cannot be modified after creation.
37
- :param pulumi.Input[str] mount: The unique path this backend should be mounted at. Must
38
+ :param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
38
39
  not begin or end with a `/`. Defaults to `ldap`.
39
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
40
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
40
41
  The value should not contain leading or trailing forward slashes.
41
42
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
42
43
  *Available only for Vault Enterprise*.
43
- :param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
44
+ :param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
44
45
  Requires Vault 1.16 or above.
45
46
  """
46
47
  pulumi.set(__self__, "role_name", role_name)
@@ -57,43 +58,43 @@ class SecretBackendStaticRoleArgs:
57
58
 
58
59
  @property
59
60
  @pulumi.getter(name="roleName")
60
- def role_name(self) -> pulumi.Input[str]:
61
+ def role_name(self) -> pulumi.Input[builtins.str]:
61
62
  """
62
63
  Name of the role.
63
64
  """
64
65
  return pulumi.get(self, "role_name")
65
66
 
66
67
  @role_name.setter
67
- def role_name(self, value: pulumi.Input[str]):
68
+ def role_name(self, value: pulumi.Input[builtins.str]):
68
69
  pulumi.set(self, "role_name", value)
69
70
 
70
71
  @property
71
72
  @pulumi.getter(name="rotationPeriod")
72
- def rotation_period(self) -> pulumi.Input[int]:
73
+ def rotation_period(self) -> pulumi.Input[builtins.int]:
73
74
  """
74
75
  How often Vault should rotate the password of the user entry.
75
76
  """
76
77
  return pulumi.get(self, "rotation_period")
77
78
 
78
79
  @rotation_period.setter
79
- def rotation_period(self, value: pulumi.Input[int]):
80
+ def rotation_period(self, value: pulumi.Input[builtins.int]):
80
81
  pulumi.set(self, "rotation_period", value)
81
82
 
82
83
  @property
83
84
  @pulumi.getter
84
- def username(self) -> pulumi.Input[str]:
85
+ def username(self) -> pulumi.Input[builtins.str]:
85
86
  """
86
87
  The username of the existing LDAP entry to manage password rotation for.
87
88
  """
88
89
  return pulumi.get(self, "username")
89
90
 
90
91
  @username.setter
91
- def username(self, value: pulumi.Input[str]):
92
+ def username(self, value: pulumi.Input[builtins.str]):
92
93
  pulumi.set(self, "username", value)
93
94
 
94
95
  @property
95
96
  @pulumi.getter
96
- def dn(self) -> Optional[pulumi.Input[str]]:
97
+ def dn(self) -> Optional[pulumi.Input[builtins.str]]:
97
98
  """
98
99
  Distinguished name (DN) of the existing LDAP entry to manage
99
100
  password rotation for. If given, it will take precedence over `username` for the LDAP
@@ -102,12 +103,12 @@ class SecretBackendStaticRoleArgs:
102
103
  return pulumi.get(self, "dn")
103
104
 
104
105
  @dn.setter
105
- def dn(self, value: Optional[pulumi.Input[str]]):
106
+ def dn(self, value: Optional[pulumi.Input[builtins.str]]):
106
107
  pulumi.set(self, "dn", value)
107
108
 
108
109
  @property
109
110
  @pulumi.getter
110
- def mount(self) -> Optional[pulumi.Input[str]]:
111
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
111
112
  """
112
113
  The unique path this backend should be mounted at. Must
113
114
  not begin or end with a `/`. Defaults to `ldap`.
@@ -115,12 +116,12 @@ class SecretBackendStaticRoleArgs:
115
116
  return pulumi.get(self, "mount")
116
117
 
117
118
  @mount.setter
118
- def mount(self, value: Optional[pulumi.Input[str]]):
119
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
119
120
  pulumi.set(self, "mount", value)
120
121
 
121
122
  @property
122
123
  @pulumi.getter
123
- def namespace(self) -> Optional[pulumi.Input[str]]:
124
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
124
125
  """
125
126
  The namespace to provision the resource in.
126
127
  The value should not contain leading or trailing forward slashes.
@@ -130,12 +131,12 @@ class SecretBackendStaticRoleArgs:
130
131
  return pulumi.get(self, "namespace")
131
132
 
132
133
  @namespace.setter
133
- def namespace(self, value: Optional[pulumi.Input[str]]):
134
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
134
135
  pulumi.set(self, "namespace", value)
135
136
 
136
137
  @property
137
138
  @pulumi.getter(name="skipImportRotation")
138
- def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
139
+ def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
139
140
  """
140
141
  Causes vault to skip the initial secret rotation on import. Not applicable to updates.
141
142
  Requires Vault 1.16 or above.
@@ -143,36 +144,36 @@ class SecretBackendStaticRoleArgs:
143
144
  return pulumi.get(self, "skip_import_rotation")
144
145
 
145
146
  @skip_import_rotation.setter
146
- def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
147
+ def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
147
148
  pulumi.set(self, "skip_import_rotation", value)
148
149
 
149
150
 
150
151
  @pulumi.input_type
151
152
  class _SecretBackendStaticRoleState:
152
153
  def __init__(__self__, *,
153
- dn: Optional[pulumi.Input[str]] = None,
154
- mount: Optional[pulumi.Input[str]] = None,
155
- namespace: Optional[pulumi.Input[str]] = None,
156
- role_name: Optional[pulumi.Input[str]] = None,
157
- rotation_period: Optional[pulumi.Input[int]] = None,
158
- skip_import_rotation: Optional[pulumi.Input[bool]] = None,
159
- username: Optional[pulumi.Input[str]] = None):
154
+ dn: Optional[pulumi.Input[builtins.str]] = None,
155
+ mount: Optional[pulumi.Input[builtins.str]] = None,
156
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
157
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
158
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
159
+ skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
160
+ username: Optional[pulumi.Input[builtins.str]] = None):
160
161
  """
161
162
  Input properties used for looking up and filtering SecretBackendStaticRole resources.
162
- :param pulumi.Input[str] dn: Distinguished name (DN) of the existing LDAP entry to manage
163
+ :param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
163
164
  password rotation for. If given, it will take precedence over `username` for the LDAP
164
165
  search performed during password rotation. Cannot be modified after creation.
165
- :param pulumi.Input[str] mount: The unique path this backend should be mounted at. Must
166
+ :param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
166
167
  not begin or end with a `/`. Defaults to `ldap`.
167
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
168
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
168
169
  The value should not contain leading or trailing forward slashes.
169
170
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
170
171
  *Available only for Vault Enterprise*.
171
- :param pulumi.Input[str] role_name: Name of the role.
172
- :param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
173
- :param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
172
+ :param pulumi.Input[builtins.str] role_name: Name of the role.
173
+ :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
174
+ :param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
174
175
  Requires Vault 1.16 or above.
175
- :param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
176
+ :param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
176
177
  """
177
178
  if dn is not None:
178
179
  pulumi.set(__self__, "dn", dn)
@@ -191,7 +192,7 @@ class _SecretBackendStaticRoleState:
191
192
 
192
193
  @property
193
194
  @pulumi.getter
194
- def dn(self) -> Optional[pulumi.Input[str]]:
195
+ def dn(self) -> Optional[pulumi.Input[builtins.str]]:
195
196
  """
196
197
  Distinguished name (DN) of the existing LDAP entry to manage
197
198
  password rotation for. If given, it will take precedence over `username` for the LDAP
@@ -200,12 +201,12 @@ class _SecretBackendStaticRoleState:
200
201
  return pulumi.get(self, "dn")
201
202
 
202
203
  @dn.setter
203
- def dn(self, value: Optional[pulumi.Input[str]]):
204
+ def dn(self, value: Optional[pulumi.Input[builtins.str]]):
204
205
  pulumi.set(self, "dn", value)
205
206
 
206
207
  @property
207
208
  @pulumi.getter
208
- def mount(self) -> Optional[pulumi.Input[str]]:
209
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
209
210
  """
210
211
  The unique path this backend should be mounted at. Must
211
212
  not begin or end with a `/`. Defaults to `ldap`.
@@ -213,12 +214,12 @@ class _SecretBackendStaticRoleState:
213
214
  return pulumi.get(self, "mount")
214
215
 
215
216
  @mount.setter
216
- def mount(self, value: Optional[pulumi.Input[str]]):
217
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
217
218
  pulumi.set(self, "mount", value)
218
219
 
219
220
  @property
220
221
  @pulumi.getter
221
- def namespace(self) -> Optional[pulumi.Input[str]]:
222
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
222
223
  """
223
224
  The namespace to provision the resource in.
224
225
  The value should not contain leading or trailing forward slashes.
@@ -228,36 +229,36 @@ class _SecretBackendStaticRoleState:
228
229
  return pulumi.get(self, "namespace")
229
230
 
230
231
  @namespace.setter
231
- def namespace(self, value: Optional[pulumi.Input[str]]):
232
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
232
233
  pulumi.set(self, "namespace", value)
233
234
 
234
235
  @property
235
236
  @pulumi.getter(name="roleName")
236
- def role_name(self) -> Optional[pulumi.Input[str]]:
237
+ def role_name(self) -> Optional[pulumi.Input[builtins.str]]:
237
238
  """
238
239
  Name of the role.
239
240
  """
240
241
  return pulumi.get(self, "role_name")
241
242
 
242
243
  @role_name.setter
243
- def role_name(self, value: Optional[pulumi.Input[str]]):
244
+ def role_name(self, value: Optional[pulumi.Input[builtins.str]]):
244
245
  pulumi.set(self, "role_name", value)
245
246
 
246
247
  @property
247
248
  @pulumi.getter(name="rotationPeriod")
248
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
249
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
249
250
  """
250
251
  How often Vault should rotate the password of the user entry.
251
252
  """
252
253
  return pulumi.get(self, "rotation_period")
253
254
 
254
255
  @rotation_period.setter
255
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
256
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
256
257
  pulumi.set(self, "rotation_period", value)
257
258
 
258
259
  @property
259
260
  @pulumi.getter(name="skipImportRotation")
260
- def skip_import_rotation(self) -> Optional[pulumi.Input[bool]]:
261
+ def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
261
262
  """
262
263
  Causes vault to skip the initial secret rotation on import. Not applicable to updates.
263
264
  Requires Vault 1.16 or above.
@@ -265,19 +266,19 @@ class _SecretBackendStaticRoleState:
265
266
  return pulumi.get(self, "skip_import_rotation")
266
267
 
267
268
  @skip_import_rotation.setter
268
- def skip_import_rotation(self, value: Optional[pulumi.Input[bool]]):
269
+ def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
269
270
  pulumi.set(self, "skip_import_rotation", value)
270
271
 
271
272
  @property
272
273
  @pulumi.getter
273
- def username(self) -> Optional[pulumi.Input[str]]:
274
+ def username(self) -> Optional[pulumi.Input[builtins.str]]:
274
275
  """
275
276
  The username of the existing LDAP entry to manage password rotation for.
276
277
  """
277
278
  return pulumi.get(self, "username")
278
279
 
279
280
  @username.setter
280
- def username(self, value: Optional[pulumi.Input[str]]):
281
+ def username(self, value: Optional[pulumi.Input[builtins.str]]):
281
282
  pulumi.set(self, "username", value)
282
283
 
283
284
 
@@ -286,13 +287,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
286
287
  def __init__(__self__,
287
288
  resource_name: str,
288
289
  opts: Optional[pulumi.ResourceOptions] = None,
289
- dn: Optional[pulumi.Input[str]] = None,
290
- mount: Optional[pulumi.Input[str]] = None,
291
- namespace: Optional[pulumi.Input[str]] = None,
292
- role_name: Optional[pulumi.Input[str]] = None,
293
- rotation_period: Optional[pulumi.Input[int]] = None,
294
- skip_import_rotation: Optional[pulumi.Input[bool]] = None,
295
- username: Optional[pulumi.Input[str]] = None,
290
+ dn: Optional[pulumi.Input[builtins.str]] = None,
291
+ mount: Optional[pulumi.Input[builtins.str]] = None,
292
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
293
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
294
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
295
+ skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
296
+ username: Optional[pulumi.Input[builtins.str]] = None,
296
297
  __props__=None):
297
298
  """
298
299
  ## Example Usage
@@ -327,20 +328,20 @@ class SecretBackendStaticRole(pulumi.CustomResource):
327
328
 
328
329
  :param str resource_name: The name of the resource.
329
330
  :param pulumi.ResourceOptions opts: Options for the resource.
330
- :param pulumi.Input[str] dn: Distinguished name (DN) of the existing LDAP entry to manage
331
+ :param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
331
332
  password rotation for. If given, it will take precedence over `username` for the LDAP
332
333
  search performed during password rotation. Cannot be modified after creation.
333
- :param pulumi.Input[str] mount: The unique path this backend should be mounted at. Must
334
+ :param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
334
335
  not begin or end with a `/`. Defaults to `ldap`.
335
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
336
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
336
337
  The value should not contain leading or trailing forward slashes.
337
338
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
338
339
  *Available only for Vault Enterprise*.
339
- :param pulumi.Input[str] role_name: Name of the role.
340
- :param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
341
- :param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
340
+ :param pulumi.Input[builtins.str] role_name: Name of the role.
341
+ :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
342
+ :param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
342
343
  Requires Vault 1.16 or above.
343
- :param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
344
+ :param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
344
345
  """
345
346
  ...
346
347
  @overload
@@ -394,13 +395,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
394
395
  def _internal_init(__self__,
395
396
  resource_name: str,
396
397
  opts: Optional[pulumi.ResourceOptions] = None,
397
- dn: Optional[pulumi.Input[str]] = None,
398
- mount: Optional[pulumi.Input[str]] = None,
399
- namespace: Optional[pulumi.Input[str]] = None,
400
- role_name: Optional[pulumi.Input[str]] = None,
401
- rotation_period: Optional[pulumi.Input[int]] = None,
402
- skip_import_rotation: Optional[pulumi.Input[bool]] = None,
403
- username: Optional[pulumi.Input[str]] = None,
398
+ dn: Optional[pulumi.Input[builtins.str]] = None,
399
+ mount: Optional[pulumi.Input[builtins.str]] = None,
400
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
401
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
402
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
403
+ skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
404
+ username: Optional[pulumi.Input[builtins.str]] = None,
404
405
  __props__=None):
405
406
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
406
407
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -433,13 +434,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
433
434
  def get(resource_name: str,
434
435
  id: pulumi.Input[str],
435
436
  opts: Optional[pulumi.ResourceOptions] = None,
436
- dn: Optional[pulumi.Input[str]] = None,
437
- mount: Optional[pulumi.Input[str]] = None,
438
- namespace: Optional[pulumi.Input[str]] = None,
439
- role_name: Optional[pulumi.Input[str]] = None,
440
- rotation_period: Optional[pulumi.Input[int]] = None,
441
- skip_import_rotation: Optional[pulumi.Input[bool]] = None,
442
- username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
437
+ dn: Optional[pulumi.Input[builtins.str]] = None,
438
+ mount: Optional[pulumi.Input[builtins.str]] = None,
439
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
440
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
441
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
442
+ skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
443
+ username: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendStaticRole':
443
444
  """
444
445
  Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
445
446
  properties used to qualify the lookup.
@@ -447,20 +448,20 @@ class SecretBackendStaticRole(pulumi.CustomResource):
447
448
  :param str resource_name: The unique name of the resulting resource.
448
449
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
449
450
  :param pulumi.ResourceOptions opts: Options for the resource.
450
- :param pulumi.Input[str] dn: Distinguished name (DN) of the existing LDAP entry to manage
451
+ :param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
451
452
  password rotation for. If given, it will take precedence over `username` for the LDAP
452
453
  search performed during password rotation. Cannot be modified after creation.
453
- :param pulumi.Input[str] mount: The unique path this backend should be mounted at. Must
454
+ :param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
454
455
  not begin or end with a `/`. Defaults to `ldap`.
455
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
456
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
456
457
  The value should not contain leading or trailing forward slashes.
457
458
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
458
459
  *Available only for Vault Enterprise*.
459
- :param pulumi.Input[str] role_name: Name of the role.
460
- :param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
461
- :param pulumi.Input[bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
460
+ :param pulumi.Input[builtins.str] role_name: Name of the role.
461
+ :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
462
+ :param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
462
463
  Requires Vault 1.16 or above.
463
- :param pulumi.Input[str] username: The username of the existing LDAP entry to manage password rotation for.
464
+ :param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
464
465
  """
465
466
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
466
467
 
@@ -477,7 +478,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
477
478
 
478
479
  @property
479
480
  @pulumi.getter
480
- def dn(self) -> pulumi.Output[Optional[str]]:
481
+ def dn(self) -> pulumi.Output[Optional[builtins.str]]:
481
482
  """
482
483
  Distinguished name (DN) of the existing LDAP entry to manage
483
484
  password rotation for. If given, it will take precedence over `username` for the LDAP
@@ -487,7 +488,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
487
488
 
488
489
  @property
489
490
  @pulumi.getter
490
- def mount(self) -> pulumi.Output[Optional[str]]:
491
+ def mount(self) -> pulumi.Output[Optional[builtins.str]]:
491
492
  """
492
493
  The unique path this backend should be mounted at. Must
493
494
  not begin or end with a `/`. Defaults to `ldap`.
@@ -496,7 +497,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
496
497
 
497
498
  @property
498
499
  @pulumi.getter
499
- def namespace(self) -> pulumi.Output[Optional[str]]:
500
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
500
501
  """
501
502
  The namespace to provision the resource in.
502
503
  The value should not contain leading or trailing forward slashes.
@@ -507,7 +508,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
507
508
 
508
509
  @property
509
510
  @pulumi.getter(name="roleName")
510
- def role_name(self) -> pulumi.Output[str]:
511
+ def role_name(self) -> pulumi.Output[builtins.str]:
511
512
  """
512
513
  Name of the role.
513
514
  """
@@ -515,7 +516,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
515
516
 
516
517
  @property
517
518
  @pulumi.getter(name="rotationPeriod")
518
- def rotation_period(self) -> pulumi.Output[int]:
519
+ def rotation_period(self) -> pulumi.Output[builtins.int]:
519
520
  """
520
521
  How often Vault should rotate the password of the user entry.
521
522
  """
@@ -523,7 +524,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
523
524
 
524
525
  @property
525
526
  @pulumi.getter(name="skipImportRotation")
526
- def skip_import_rotation(self) -> pulumi.Output[Optional[bool]]:
527
+ def skip_import_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
527
528
  """
528
529
  Causes vault to skip the initial secret rotation on import. Not applicable to updates.
529
530
  Requires Vault 1.16 or above.
@@ -532,7 +533,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
532
533
 
533
534
  @property
534
535
  @pulumi.getter
535
- def username(self) -> pulumi.Output[str]:
536
+ def username(self) -> pulumi.Output[builtins.str]:
536
537
  """
537
538
  The username of the existing LDAP entry to manage password rotation for.
538
539
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members: