pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -39,18 +40,18 @@ class AuthBackendGroup(dict):
39
40
  return super().get(key, default)
40
41
 
41
42
  def __init__(__self__, *,
42
- group_name: str,
43
- policies: Sequence[str]):
43
+ group_name: builtins.str,
44
+ policies: Sequence[builtins.str]):
44
45
  """
45
- :param str group_name: Name of the Okta group
46
- :param Sequence[str] policies: Policies to associate with this group
46
+ :param builtins.str group_name: Name of the Okta group
47
+ :param Sequence[builtins.str] policies: Policies to associate with this group
47
48
  """
48
49
  pulumi.set(__self__, "group_name", group_name)
49
50
  pulumi.set(__self__, "policies", policies)
50
51
 
51
52
  @property
52
53
  @pulumi.getter(name="groupName")
53
- def group_name(self) -> str:
54
+ def group_name(self) -> builtins.str:
54
55
  """
55
56
  Name of the Okta group
56
57
  """
@@ -58,7 +59,7 @@ class AuthBackendGroup(dict):
58
59
 
59
60
  @property
60
61
  @pulumi.getter
61
- def policies(self) -> Sequence[str]:
62
+ def policies(self) -> Sequence[builtins.str]:
62
63
  """
63
64
  Policies to associate with this group
64
65
  """
@@ -68,13 +69,13 @@ class AuthBackendGroup(dict):
68
69
  @pulumi.output_type
69
70
  class AuthBackendUser(dict):
70
71
  def __init__(__self__, *,
71
- username: str,
72
- groups: Optional[Sequence[str]] = None,
73
- policies: Optional[Sequence[str]] = None):
72
+ username: builtins.str,
73
+ groups: Optional[Sequence[builtins.str]] = None,
74
+ policies: Optional[Sequence[builtins.str]] = None):
74
75
  """
75
- :param str username: Name of the user within Okta
76
- :param Sequence[str] groups: Groups within the Okta auth backend to associate with this user
77
- :param Sequence[str] policies: Policies to associate with this user
76
+ :param builtins.str username: Name of the user within Okta
77
+ :param Sequence[builtins.str] groups: Groups within the Okta auth backend to associate with this user
78
+ :param Sequence[builtins.str] policies: Policies to associate with this user
78
79
  """
79
80
  pulumi.set(__self__, "username", username)
80
81
  if groups is not None:
@@ -84,7 +85,7 @@ class AuthBackendUser(dict):
84
85
 
85
86
  @property
86
87
  @pulumi.getter
87
- def username(self) -> str:
88
+ def username(self) -> builtins.str:
88
89
  """
89
90
  Name of the user within Okta
90
91
  """
@@ -92,7 +93,7 @@ class AuthBackendUser(dict):
92
93
 
93
94
  @property
94
95
  @pulumi.getter
95
- def groups(self) -> Optional[Sequence[str]]:
96
+ def groups(self) -> Optional[Sequence[builtins.str]]:
96
97
  """
97
98
  Groups within the Okta auth backend to associate with this user
98
99
  """
@@ -100,7 +101,7 @@ class AuthBackendUser(dict):
100
101
 
101
102
  @property
102
103
  @pulumi.getter
103
- def policies(self) -> Optional[Sequence[str]]:
104
+ def policies(self) -> Optional[Sequence[builtins.str]]:
104
105
  """
105
106
  Policies to associate with this user
106
107
  """
pulumi_vault/outputs.py CHANGED
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -56,32 +57,32 @@ class AuthBackendTune(dict):
56
57
  return super().get(key, default)
57
58
 
58
59
  def __init__(__self__, *,
59
- allowed_response_headers: Optional[Sequence[str]] = None,
60
- audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
61
- audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
62
- default_lease_ttl: Optional[str] = None,
63
- listing_visibility: Optional[str] = None,
64
- max_lease_ttl: Optional[str] = None,
65
- passthrough_request_headers: Optional[Sequence[str]] = None,
66
- token_type: Optional[str] = None):
67
- """
68
- :param Sequence[str] allowed_response_headers: List of headers to whitelist and allowing
60
+ allowed_response_headers: Optional[Sequence[builtins.str]] = None,
61
+ audit_non_hmac_request_keys: Optional[Sequence[builtins.str]] = None,
62
+ audit_non_hmac_response_keys: Optional[Sequence[builtins.str]] = None,
63
+ default_lease_ttl: Optional[builtins.str] = None,
64
+ listing_visibility: Optional[builtins.str] = None,
65
+ max_lease_ttl: Optional[builtins.str] = None,
66
+ passthrough_request_headers: Optional[Sequence[builtins.str]] = None,
67
+ token_type: Optional[builtins.str] = None):
68
+ """
69
+ :param Sequence[builtins.str] allowed_response_headers: List of headers to whitelist and allowing
69
70
  a plugin to include them in the response.
70
- :param Sequence[str] audit_non_hmac_request_keys: Specifies the list of keys that will
71
+ :param Sequence[builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
71
72
  not be HMAC'd by audit devices in the request data object.
72
- :param Sequence[str] audit_non_hmac_response_keys: Specifies the list of keys that will
73
+ :param Sequence[builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
73
74
  not be HMAC'd by audit devices in the response data object.
74
- :param str default_lease_ttl: Specifies the default time-to-live.
75
+ :param builtins.str default_lease_ttl: Specifies the default time-to-live.
75
76
  If set, this overrides the global default.
76
77
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
77
- :param str listing_visibility: Specifies whether to show this mount in
78
+ :param builtins.str listing_visibility: Specifies whether to show this mount in
78
79
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
79
- :param str max_lease_ttl: Specifies the maximum time-to-live.
80
+ :param builtins.str max_lease_ttl: Specifies the maximum time-to-live.
80
81
  If set, this overrides the global default.
81
82
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
82
- :param Sequence[str] passthrough_request_headers: List of headers to whitelist and
83
+ :param Sequence[builtins.str] passthrough_request_headers: List of headers to whitelist and
83
84
  pass from the request to the backend.
84
- :param str token_type: Specifies the type of tokens that should be returned by
85
+ :param builtins.str token_type: Specifies the type of tokens that should be returned by
85
86
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
86
87
  """
87
88
  if allowed_response_headers is not None:
@@ -103,7 +104,7 @@ class AuthBackendTune(dict):
103
104
 
104
105
  @property
105
106
  @pulumi.getter(name="allowedResponseHeaders")
106
- def allowed_response_headers(self) -> Optional[Sequence[str]]:
107
+ def allowed_response_headers(self) -> Optional[Sequence[builtins.str]]:
107
108
  """
108
109
  List of headers to whitelist and allowing
109
110
  a plugin to include them in the response.
@@ -112,7 +113,7 @@ class AuthBackendTune(dict):
112
113
 
113
114
  @property
114
115
  @pulumi.getter(name="auditNonHmacRequestKeys")
115
- def audit_non_hmac_request_keys(self) -> Optional[Sequence[str]]:
116
+ def audit_non_hmac_request_keys(self) -> Optional[Sequence[builtins.str]]:
116
117
  """
117
118
  Specifies the list of keys that will
118
119
  not be HMAC'd by audit devices in the request data object.
@@ -121,7 +122,7 @@ class AuthBackendTune(dict):
121
122
 
122
123
  @property
123
124
  @pulumi.getter(name="auditNonHmacResponseKeys")
124
- def audit_non_hmac_response_keys(self) -> Optional[Sequence[str]]:
125
+ def audit_non_hmac_response_keys(self) -> Optional[Sequence[builtins.str]]:
125
126
  """
126
127
  Specifies the list of keys that will
127
128
  not be HMAC'd by audit devices in the response data object.
@@ -130,7 +131,7 @@ class AuthBackendTune(dict):
130
131
 
131
132
  @property
132
133
  @pulumi.getter(name="defaultLeaseTtl")
133
- def default_lease_ttl(self) -> Optional[str]:
134
+ def default_lease_ttl(self) -> Optional[builtins.str]:
134
135
  """
135
136
  Specifies the default time-to-live.
136
137
  If set, this overrides the global default.
@@ -140,7 +141,7 @@ class AuthBackendTune(dict):
140
141
 
141
142
  @property
142
143
  @pulumi.getter(name="listingVisibility")
143
- def listing_visibility(self) -> Optional[str]:
144
+ def listing_visibility(self) -> Optional[builtins.str]:
144
145
  """
145
146
  Specifies whether to show this mount in
146
147
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
@@ -149,7 +150,7 @@ class AuthBackendTune(dict):
149
150
 
150
151
  @property
151
152
  @pulumi.getter(name="maxLeaseTtl")
152
- def max_lease_ttl(self) -> Optional[str]:
153
+ def max_lease_ttl(self) -> Optional[builtins.str]:
153
154
  """
154
155
  Specifies the maximum time-to-live.
155
156
  If set, this overrides the global default.
@@ -159,7 +160,7 @@ class AuthBackendTune(dict):
159
160
 
160
161
  @property
161
162
  @pulumi.getter(name="passthroughRequestHeaders")
162
- def passthrough_request_headers(self) -> Optional[Sequence[str]]:
163
+ def passthrough_request_headers(self) -> Optional[Sequence[builtins.str]]:
163
164
  """
164
165
  List of headers to whitelist and
165
166
  pass from the request to the backend.
@@ -168,7 +169,7 @@ class AuthBackendTune(dict):
168
169
 
169
170
  @property
170
171
  @pulumi.getter(name="tokenType")
171
- def token_type(self) -> Optional[str]:
172
+ def token_type(self) -> Optional[builtins.str]:
172
173
  """
173
174
  Specifies the type of tokens that should be returned by
174
175
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -179,23 +180,23 @@ class AuthBackendTune(dict):
179
180
  @pulumi.output_type
180
181
  class GetPolicyDocumentRuleResult(dict):
181
182
  def __init__(__self__, *,
182
- capabilities: Sequence[str],
183
- path: str,
183
+ capabilities: Sequence[builtins.str],
184
+ path: builtins.str,
184
185
  allowed_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleAllowedParameterResult']] = None,
185
186
  denied_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleDeniedParameterResult']] = None,
186
- description: Optional[str] = None,
187
- max_wrapping_ttl: Optional[str] = None,
188
- min_wrapping_ttl: Optional[str] = None,
189
- required_parameters: Optional[Sequence[str]] = None):
187
+ description: Optional[builtins.str] = None,
188
+ max_wrapping_ttl: Optional[builtins.str] = None,
189
+ min_wrapping_ttl: Optional[builtins.str] = None,
190
+ required_parameters: Optional[Sequence[builtins.str]] = None):
190
191
  """
191
- :param Sequence[str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
192
- :param str path: A path in Vault that this rule applies to.
192
+ :param Sequence[builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
193
+ :param builtins.str path: A path in Vault that this rule applies to.
193
194
  :param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
194
195
  :param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
195
- :param str description: Description of the rule. Will be added as a comment to rendered rule.
196
- :param str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
197
- :param str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
198
- :param Sequence[str] required_parameters: A list of parameters that must be specified.
196
+ :param builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
197
+ :param builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
198
+ :param builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
199
+ :param Sequence[builtins.str] required_parameters: A list of parameters that must be specified.
199
200
  """
200
201
  pulumi.set(__self__, "capabilities", capabilities)
201
202
  pulumi.set(__self__, "path", path)
@@ -214,7 +215,7 @@ class GetPolicyDocumentRuleResult(dict):
214
215
 
215
216
  @property
216
217
  @pulumi.getter
217
- def capabilities(self) -> Sequence[str]:
218
+ def capabilities(self) -> Sequence[builtins.str]:
218
219
  """
219
220
  A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
220
221
  """
@@ -222,7 +223,7 @@ class GetPolicyDocumentRuleResult(dict):
222
223
 
223
224
  @property
224
225
  @pulumi.getter
225
- def path(self) -> str:
226
+ def path(self) -> builtins.str:
226
227
  """
227
228
  A path in Vault that this rule applies to.
228
229
  """
@@ -246,7 +247,7 @@ class GetPolicyDocumentRuleResult(dict):
246
247
 
247
248
  @property
248
249
  @pulumi.getter
249
- def description(self) -> Optional[str]:
250
+ def description(self) -> Optional[builtins.str]:
250
251
  """
251
252
  Description of the rule. Will be added as a comment to rendered rule.
252
253
  """
@@ -254,7 +255,7 @@ class GetPolicyDocumentRuleResult(dict):
254
255
 
255
256
  @property
256
257
  @pulumi.getter(name="maxWrappingTtl")
257
- def max_wrapping_ttl(self) -> Optional[str]:
258
+ def max_wrapping_ttl(self) -> Optional[builtins.str]:
258
259
  """
259
260
  The maximum allowed TTL that clients can specify for a wrapped response.
260
261
  """
@@ -262,7 +263,7 @@ class GetPolicyDocumentRuleResult(dict):
262
263
 
263
264
  @property
264
265
  @pulumi.getter(name="minWrappingTtl")
265
- def min_wrapping_ttl(self) -> Optional[str]:
266
+ def min_wrapping_ttl(self) -> Optional[builtins.str]:
266
267
  """
267
268
  The minimum allowed TTL that clients can specify for a wrapped response.
268
269
  """
@@ -270,7 +271,7 @@ class GetPolicyDocumentRuleResult(dict):
270
271
 
271
272
  @property
272
273
  @pulumi.getter(name="requiredParameters")
273
- def required_parameters(self) -> Optional[Sequence[str]]:
274
+ def required_parameters(self) -> Optional[Sequence[builtins.str]]:
274
275
  """
275
276
  A list of parameters that must be specified.
276
277
  """
@@ -280,18 +281,18 @@ class GetPolicyDocumentRuleResult(dict):
280
281
  @pulumi.output_type
281
282
  class GetPolicyDocumentRuleAllowedParameterResult(dict):
282
283
  def __init__(__self__, *,
283
- key: str,
284
- values: Sequence[str]):
284
+ key: builtins.str,
285
+ values: Sequence[builtins.str]):
285
286
  """
286
- :param str key: name of permitted or denied parameter.
287
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
287
+ :param builtins.str key: name of permitted or denied parameter.
288
+ :param Sequence[builtins.str] values: list of values what are permitted or denied by policy rule.
288
289
  """
289
290
  pulumi.set(__self__, "key", key)
290
291
  pulumi.set(__self__, "values", values)
291
292
 
292
293
  @property
293
294
  @pulumi.getter
294
- def key(self) -> str:
295
+ def key(self) -> builtins.str:
295
296
  """
296
297
  name of permitted or denied parameter.
297
298
  """
@@ -299,7 +300,7 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
299
300
 
300
301
  @property
301
302
  @pulumi.getter
302
- def values(self) -> Sequence[str]:
303
+ def values(self) -> Sequence[builtins.str]:
303
304
  """
304
305
  list of values what are permitted or denied by policy rule.
305
306
  """
@@ -309,18 +310,18 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
309
310
  @pulumi.output_type
310
311
  class GetPolicyDocumentRuleDeniedParameterResult(dict):
311
312
  def __init__(__self__, *,
312
- key: str,
313
- values: Sequence[str]):
313
+ key: builtins.str,
314
+ values: Sequence[builtins.str]):
314
315
  """
315
- :param str key: name of permitted or denied parameter.
316
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
316
+ :param builtins.str key: name of permitted or denied parameter.
317
+ :param Sequence[builtins.str] values: list of values what are permitted or denied by policy rule.
317
318
  """
318
319
  pulumi.set(__self__, "key", key)
319
320
  pulumi.set(__self__, "values", values)
320
321
 
321
322
  @property
322
323
  @pulumi.getter
323
- def key(self) -> str:
324
+ def key(self) -> builtins.str:
324
325
  """
325
326
  name of permitted or denied parameter.
326
327
  """
@@ -328,7 +329,7 @@ class GetPolicyDocumentRuleDeniedParameterResult(dict):
328
329
 
329
330
  @property
330
331
  @pulumi.getter
331
- def values(self) -> Sequence[str]:
332
+ def values(self) -> Sequence[builtins.str]:
332
333
  """
333
334
  list of values what are permitted or denied by policy rule.
334
335
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,14 +20,14 @@ __all__ = ['PasswordPolicyArgs', 'PasswordPolicy']
19
20
  @pulumi.input_type
20
21
  class PasswordPolicyArgs:
21
22
  def __init__(__self__, *,
22
- policy: pulumi.Input[str],
23
- name: Optional[pulumi.Input[str]] = None,
24
- namespace: Optional[pulumi.Input[str]] = None):
23
+ policy: pulumi.Input[builtins.str],
24
+ name: Optional[pulumi.Input[builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
25
26
  """
26
27
  The set of arguments for constructing a PasswordPolicy resource.
27
- :param pulumi.Input[str] policy: String containing a password policy.
28
- :param pulumi.Input[str] name: The name of the password policy.
29
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
28
+ :param pulumi.Input[builtins.str] policy: String containing a password policy.
29
+ :param pulumi.Input[builtins.str] name: The name of the password policy.
30
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
30
31
  The value should not contain leading or trailing forward slashes.
31
32
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
32
33
  *Available only for Vault Enterprise*.
@@ -39,31 +40,31 @@ class PasswordPolicyArgs:
39
40
 
40
41
  @property
41
42
  @pulumi.getter
42
- def policy(self) -> pulumi.Input[str]:
43
+ def policy(self) -> pulumi.Input[builtins.str]:
43
44
  """
44
45
  String containing a password policy.
45
46
  """
46
47
  return pulumi.get(self, "policy")
47
48
 
48
49
  @policy.setter
49
- def policy(self, value: pulumi.Input[str]):
50
+ def policy(self, value: pulumi.Input[builtins.str]):
50
51
  pulumi.set(self, "policy", value)
51
52
 
52
53
  @property
53
54
  @pulumi.getter
54
- def name(self) -> Optional[pulumi.Input[str]]:
55
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
55
56
  """
56
57
  The name of the password policy.
57
58
  """
58
59
  return pulumi.get(self, "name")
59
60
 
60
61
  @name.setter
61
- def name(self, value: Optional[pulumi.Input[str]]):
62
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
62
63
  pulumi.set(self, "name", value)
63
64
 
64
65
  @property
65
66
  @pulumi.getter
66
- def namespace(self) -> Optional[pulumi.Input[str]]:
67
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
67
68
  """
68
69
  The namespace to provision the resource in.
69
70
  The value should not contain leading or trailing forward slashes.
@@ -73,24 +74,24 @@ class PasswordPolicyArgs:
73
74
  return pulumi.get(self, "namespace")
74
75
 
75
76
  @namespace.setter
76
- def namespace(self, value: Optional[pulumi.Input[str]]):
77
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
77
78
  pulumi.set(self, "namespace", value)
78
79
 
79
80
 
80
81
  @pulumi.input_type
81
82
  class _PasswordPolicyState:
82
83
  def __init__(__self__, *,
83
- name: Optional[pulumi.Input[str]] = None,
84
- namespace: Optional[pulumi.Input[str]] = None,
85
- policy: Optional[pulumi.Input[str]] = None):
84
+ name: Optional[pulumi.Input[builtins.str]] = None,
85
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
86
+ policy: Optional[pulumi.Input[builtins.str]] = None):
86
87
  """
87
88
  Input properties used for looking up and filtering PasswordPolicy resources.
88
- :param pulumi.Input[str] name: The name of the password policy.
89
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
89
+ :param pulumi.Input[builtins.str] name: The name of the password policy.
90
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
90
91
  The value should not contain leading or trailing forward slashes.
91
92
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
92
93
  *Available only for Vault Enterprise*.
93
- :param pulumi.Input[str] policy: String containing a password policy.
94
+ :param pulumi.Input[builtins.str] policy: String containing a password policy.
94
95
  """
95
96
  if name is not None:
96
97
  pulumi.set(__self__, "name", name)
@@ -101,19 +102,19 @@ class _PasswordPolicyState:
101
102
 
102
103
  @property
103
104
  @pulumi.getter
104
- def name(self) -> Optional[pulumi.Input[str]]:
105
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
105
106
  """
106
107
  The name of the password policy.
107
108
  """
108
109
  return pulumi.get(self, "name")
109
110
 
110
111
  @name.setter
111
- def name(self, value: Optional[pulumi.Input[str]]):
112
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
112
113
  pulumi.set(self, "name", value)
113
114
 
114
115
  @property
115
116
  @pulumi.getter
116
- def namespace(self) -> Optional[pulumi.Input[str]]:
117
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
117
118
  """
118
119
  The namespace to provision the resource in.
119
120
  The value should not contain leading or trailing forward slashes.
@@ -123,19 +124,19 @@ class _PasswordPolicyState:
123
124
  return pulumi.get(self, "namespace")
124
125
 
125
126
  @namespace.setter
126
- def namespace(self, value: Optional[pulumi.Input[str]]):
127
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
127
128
  pulumi.set(self, "namespace", value)
128
129
 
129
130
  @property
130
131
  @pulumi.getter
131
- def policy(self) -> Optional[pulumi.Input[str]]:
132
+ def policy(self) -> Optional[pulumi.Input[builtins.str]]:
132
133
  """
133
134
  String containing a password policy.
134
135
  """
135
136
  return pulumi.get(self, "policy")
136
137
 
137
138
  @policy.setter
138
- def policy(self, value: Optional[pulumi.Input[str]]):
139
+ def policy(self, value: Optional[pulumi.Input[builtins.str]]):
139
140
  pulumi.set(self, "policy", value)
140
141
 
141
142
 
@@ -144,9 +145,9 @@ class PasswordPolicy(pulumi.CustomResource):
144
145
  def __init__(__self__,
145
146
  resource_name: str,
146
147
  opts: Optional[pulumi.ResourceOptions] = None,
147
- name: Optional[pulumi.Input[str]] = None,
148
- namespace: Optional[pulumi.Input[str]] = None,
149
- policy: Optional[pulumi.Input[str]] = None,
148
+ name: Optional[pulumi.Input[builtins.str]] = None,
149
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
150
+ policy: Optional[pulumi.Input[builtins.str]] = None,
150
151
  __props__=None):
151
152
  """
152
153
  Provides a resource to manage Password Policies
@@ -178,12 +179,12 @@ class PasswordPolicy(pulumi.CustomResource):
178
179
 
179
180
  :param str resource_name: The name of the resource.
180
181
  :param pulumi.ResourceOptions opts: Options for the resource.
181
- :param pulumi.Input[str] name: The name of the password policy.
182
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
182
+ :param pulumi.Input[builtins.str] name: The name of the password policy.
183
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
183
184
  The value should not contain leading or trailing forward slashes.
184
185
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
185
186
  *Available only for Vault Enterprise*.
186
- :param pulumi.Input[str] policy: String containing a password policy.
187
+ :param pulumi.Input[builtins.str] policy: String containing a password policy.
187
188
  """
188
189
  ...
189
190
  @overload
@@ -234,9 +235,9 @@ class PasswordPolicy(pulumi.CustomResource):
234
235
  def _internal_init(__self__,
235
236
  resource_name: str,
236
237
  opts: Optional[pulumi.ResourceOptions] = None,
237
- name: Optional[pulumi.Input[str]] = None,
238
- namespace: Optional[pulumi.Input[str]] = None,
239
- policy: Optional[pulumi.Input[str]] = None,
238
+ name: Optional[pulumi.Input[builtins.str]] = None,
239
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
240
+ policy: Optional[pulumi.Input[builtins.str]] = None,
240
241
  __props__=None):
241
242
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
242
243
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -261,9 +262,9 @@ class PasswordPolicy(pulumi.CustomResource):
261
262
  def get(resource_name: str,
262
263
  id: pulumi.Input[str],
263
264
  opts: Optional[pulumi.ResourceOptions] = None,
264
- name: Optional[pulumi.Input[str]] = None,
265
- namespace: Optional[pulumi.Input[str]] = None,
266
- policy: Optional[pulumi.Input[str]] = None) -> 'PasswordPolicy':
265
+ name: Optional[pulumi.Input[builtins.str]] = None,
266
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
267
+ policy: Optional[pulumi.Input[builtins.str]] = None) -> 'PasswordPolicy':
267
268
  """
268
269
  Get an existing PasswordPolicy resource's state with the given name, id, and optional extra
269
270
  properties used to qualify the lookup.
@@ -271,12 +272,12 @@ class PasswordPolicy(pulumi.CustomResource):
271
272
  :param str resource_name: The unique name of the resulting resource.
272
273
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
273
274
  :param pulumi.ResourceOptions opts: Options for the resource.
274
- :param pulumi.Input[str] name: The name of the password policy.
275
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
275
+ :param pulumi.Input[builtins.str] name: The name of the password policy.
276
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
276
277
  The value should not contain leading or trailing forward slashes.
277
278
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
278
279
  *Available only for Vault Enterprise*.
279
- :param pulumi.Input[str] policy: String containing a password policy.
280
+ :param pulumi.Input[builtins.str] policy: String containing a password policy.
280
281
  """
281
282
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
282
283
 
@@ -289,7 +290,7 @@ class PasswordPolicy(pulumi.CustomResource):
289
290
 
290
291
  @property
291
292
  @pulumi.getter
292
- def name(self) -> pulumi.Output[str]:
293
+ def name(self) -> pulumi.Output[builtins.str]:
293
294
  """
294
295
  The name of the password policy.
295
296
  """
@@ -297,7 +298,7 @@ class PasswordPolicy(pulumi.CustomResource):
297
298
 
298
299
  @property
299
300
  @pulumi.getter
300
- def namespace(self) -> pulumi.Output[Optional[str]]:
301
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
301
302
  """
302
303
  The namespace to provision the resource in.
303
304
  The value should not contain leading or trailing forward slashes.
@@ -308,7 +309,7 @@ class PasswordPolicy(pulumi.CustomResource):
308
309
 
309
310
  @property
310
311
  @pulumi.getter
311
- def policy(self) -> pulumi.Output[str]:
312
+ def policy(self) -> pulumi.Output[builtins.str]:
312
313
  """
313
314
  String containing a password policy.
314
315
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members: