pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -27,7 +28,7 @@ MYPY = False
27
28
 
28
29
  if not MYPY:
29
30
  class BackendConfigCmpv2AuthenticatorsArgsDict(TypedDict):
30
- cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
31
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
31
32
  """
32
33
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
33
34
  """
@@ -37,33 +38,33 @@ elif False:
37
38
  @pulumi.input_type
38
39
  class BackendConfigCmpv2AuthenticatorsArgs:
39
40
  def __init__(__self__, *,
40
- cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
41
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
41
42
  """
42
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
43
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
43
44
  """
44
45
  if cert is not None:
45
46
  pulumi.set(__self__, "cert", cert)
46
47
 
47
48
  @property
48
49
  @pulumi.getter
49
- def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
50
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
50
51
  """
51
52
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
52
53
  """
53
54
  return pulumi.get(self, "cert")
54
55
 
55
56
  @cert.setter
56
- def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
57
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
57
58
  pulumi.set(self, "cert", value)
58
59
 
59
60
 
60
61
  if not MYPY:
61
62
  class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
62
- cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
63
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
63
64
  """
64
65
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
65
66
  """
66
- userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
67
+ userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
67
68
  """
68
69
  "The accessor (required) property for user pass auth backends".
69
70
  """
@@ -73,11 +74,11 @@ elif False:
73
74
  @pulumi.input_type
74
75
  class BackendConfigEstAuthenticatorsArgs:
75
76
  def __init__(__self__, *,
76
- cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
77
- userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None):
77
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
78
+ userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
78
79
  """
79
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
80
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] userpass: "The accessor (required) property for user pass auth backends".
80
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
81
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] userpass: "The accessor (required) property for user pass auth backends".
81
82
  """
82
83
  if cert is not None:
83
84
  pulumi.set(__self__, "cert", cert)
@@ -86,40 +87,40 @@ class BackendConfigEstAuthenticatorsArgs:
86
87
 
87
88
  @property
88
89
  @pulumi.getter
89
- def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
90
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
90
91
  """
91
92
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
92
93
  """
93
94
  return pulumi.get(self, "cert")
94
95
 
95
96
  @cert.setter
96
- def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
97
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
97
98
  pulumi.set(self, "cert", value)
98
99
 
99
100
  @property
100
101
  @pulumi.getter
101
- def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
102
+ def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
102
103
  """
103
104
  "The accessor (required) property for user pass auth backends".
104
105
  """
105
106
  return pulumi.get(self, "userpass")
106
107
 
107
108
  @userpass.setter
108
- def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
109
+ def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
109
110
  pulumi.set(self, "userpass", value)
110
111
 
111
112
 
112
113
  if not MYPY:
113
114
  class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
114
- oid: pulumi.Input[str]
115
+ oid: pulumi.Input[builtins.str]
115
116
  """
116
117
  The OID for the policy identifier
117
118
  """
118
- cps: NotRequired[pulumi.Input[str]]
119
+ cps: NotRequired[pulumi.Input[builtins.str]]
119
120
  """
120
121
  The URL of the CPS for the policy identifier
121
122
  """
122
- notice: NotRequired[pulumi.Input[str]]
123
+ notice: NotRequired[pulumi.Input[builtins.str]]
123
124
  """
124
125
  A notice for the policy identifier
125
126
  """
@@ -129,13 +130,13 @@ elif False:
129
130
  @pulumi.input_type
130
131
  class SecretBackendRolePolicyIdentifierArgs:
131
132
  def __init__(__self__, *,
132
- oid: pulumi.Input[str],
133
- cps: Optional[pulumi.Input[str]] = None,
134
- notice: Optional[pulumi.Input[str]] = None):
133
+ oid: pulumi.Input[builtins.str],
134
+ cps: Optional[pulumi.Input[builtins.str]] = None,
135
+ notice: Optional[pulumi.Input[builtins.str]] = None):
135
136
  """
136
- :param pulumi.Input[str] oid: The OID for the policy identifier
137
- :param pulumi.Input[str] cps: The URL of the CPS for the policy identifier
138
- :param pulumi.Input[str] notice: A notice for the policy identifier
137
+ :param pulumi.Input[builtins.str] oid: The OID for the policy identifier
138
+ :param pulumi.Input[builtins.str] cps: The URL of the CPS for the policy identifier
139
+ :param pulumi.Input[builtins.str] notice: A notice for the policy identifier
139
140
  """
140
141
  pulumi.set(__self__, "oid", oid)
141
142
  if cps is not None:
@@ -145,38 +146,38 @@ class SecretBackendRolePolicyIdentifierArgs:
145
146
 
146
147
  @property
147
148
  @pulumi.getter
148
- def oid(self) -> pulumi.Input[str]:
149
+ def oid(self) -> pulumi.Input[builtins.str]:
149
150
  """
150
151
  The OID for the policy identifier
151
152
  """
152
153
  return pulumi.get(self, "oid")
153
154
 
154
155
  @oid.setter
155
- def oid(self, value: pulumi.Input[str]):
156
+ def oid(self, value: pulumi.Input[builtins.str]):
156
157
  pulumi.set(self, "oid", value)
157
158
 
158
159
  @property
159
160
  @pulumi.getter
160
- def cps(self) -> Optional[pulumi.Input[str]]:
161
+ def cps(self) -> Optional[pulumi.Input[builtins.str]]:
161
162
  """
162
163
  The URL of the CPS for the policy identifier
163
164
  """
164
165
  return pulumi.get(self, "cps")
165
166
 
166
167
  @cps.setter
167
- def cps(self, value: Optional[pulumi.Input[str]]):
168
+ def cps(self, value: Optional[pulumi.Input[builtins.str]]):
168
169
  pulumi.set(self, "cps", value)
169
170
 
170
171
  @property
171
172
  @pulumi.getter
172
- def notice(self) -> Optional[pulumi.Input[str]]:
173
+ def notice(self) -> Optional[pulumi.Input[builtins.str]]:
173
174
  """
174
175
  A notice for the policy identifier
175
176
  """
176
177
  return pulumi.get(self, "notice")
177
178
 
178
179
  @notice.setter
179
- def notice(self, value: Optional[pulumi.Input[str]]):
180
+ def notice(self, value: Optional[pulumi.Input[builtins.str]]):
180
181
  pulumi.set(self, "notice", value)
181
182
 
182
183
 
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,20 +20,20 @@ __all__ = ['BackendAcmeEabArgs', 'BackendAcmeEab']
19
20
  @pulumi.input_type
20
21
  class BackendAcmeEabArgs:
21
22
  def __init__(__self__, *,
22
- backend: pulumi.Input[str],
23
- issuer: Optional[pulumi.Input[str]] = None,
24
- namespace: Optional[pulumi.Input[str]] = None,
25
- role: Optional[pulumi.Input[str]] = None):
23
+ backend: pulumi.Input[builtins.str],
24
+ issuer: Optional[pulumi.Input[builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
26
+ role: Optional[pulumi.Input[builtins.str]] = None):
26
27
  """
27
28
  The set of arguments for constructing a BackendAcmeEab resource.
28
- :param pulumi.Input[str] backend: The path to the PKI secret backend to
29
+ :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
29
30
  create the EAB token within, with no leading or trailing `/`s.
30
- :param pulumi.Input[str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
31
- :param pulumi.Input[str] namespace: The namespace of the target resource.
31
+ :param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
32
+ :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
32
33
  The value should not contain leading or trailing forward slashes.
33
34
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
35
  *Available only for Vault Enterprise*.
35
- :param pulumi.Input[str] role: Create an EAB token that is specific to a role's ACME directory.
36
+ :param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
36
37
 
37
38
  **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
38
39
 
@@ -51,7 +52,7 @@ class BackendAcmeEabArgs:
51
52
 
52
53
  @property
53
54
  @pulumi.getter
54
- def backend(self) -> pulumi.Input[str]:
55
+ def backend(self) -> pulumi.Input[builtins.str]:
55
56
  """
56
57
  The path to the PKI secret backend to
57
58
  create the EAB token within, with no leading or trailing `/`s.
@@ -59,24 +60,24 @@ class BackendAcmeEabArgs:
59
60
  return pulumi.get(self, "backend")
60
61
 
61
62
  @backend.setter
62
- def backend(self, value: pulumi.Input[str]):
63
+ def backend(self, value: pulumi.Input[builtins.str]):
63
64
  pulumi.set(self, "backend", value)
64
65
 
65
66
  @property
66
67
  @pulumi.getter
67
- def issuer(self) -> Optional[pulumi.Input[str]]:
68
+ def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
68
69
  """
69
70
  Create an EAB token that is specific to an issuer's ACME directory.
70
71
  """
71
72
  return pulumi.get(self, "issuer")
72
73
 
73
74
  @issuer.setter
74
- def issuer(self, value: Optional[pulumi.Input[str]]):
75
+ def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
75
76
  pulumi.set(self, "issuer", value)
76
77
 
77
78
  @property
78
79
  @pulumi.getter
79
- def namespace(self) -> Optional[pulumi.Input[str]]:
80
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
80
81
  """
81
82
  The namespace of the target resource.
82
83
  The value should not contain leading or trailing forward slashes.
@@ -86,12 +87,12 @@ class BackendAcmeEabArgs:
86
87
  return pulumi.get(self, "namespace")
87
88
 
88
89
  @namespace.setter
89
- def namespace(self, value: Optional[pulumi.Input[str]]):
90
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
90
91
  pulumi.set(self, "namespace", value)
91
92
 
92
93
  @property
93
94
  @pulumi.getter
94
- def role(self) -> Optional[pulumi.Input[str]]:
95
+ def role(self) -> Optional[pulumi.Input[builtins.str]]:
95
96
  """
96
97
  Create an EAB token that is specific to a role's ACME directory.
97
98
 
@@ -105,37 +106,37 @@ class BackendAcmeEabArgs:
105
106
  return pulumi.get(self, "role")
106
107
 
107
108
  @role.setter
108
- def role(self, value: Optional[pulumi.Input[str]]):
109
+ def role(self, value: Optional[pulumi.Input[builtins.str]]):
109
110
  pulumi.set(self, "role", value)
110
111
 
111
112
 
112
113
  @pulumi.input_type
113
114
  class _BackendAcmeEabState:
114
115
  def __init__(__self__, *,
115
- acme_directory: Optional[pulumi.Input[str]] = None,
116
- backend: Optional[pulumi.Input[str]] = None,
117
- created_on: Optional[pulumi.Input[str]] = None,
118
- eab_id: Optional[pulumi.Input[str]] = None,
119
- issuer: Optional[pulumi.Input[str]] = None,
120
- key: Optional[pulumi.Input[str]] = None,
121
- key_type: Optional[pulumi.Input[str]] = None,
122
- namespace: Optional[pulumi.Input[str]] = None,
123
- role: Optional[pulumi.Input[str]] = None):
116
+ acme_directory: Optional[pulumi.Input[builtins.str]] = None,
117
+ backend: Optional[pulumi.Input[builtins.str]] = None,
118
+ created_on: Optional[pulumi.Input[builtins.str]] = None,
119
+ eab_id: Optional[pulumi.Input[builtins.str]] = None,
120
+ issuer: Optional[pulumi.Input[builtins.str]] = None,
121
+ key: Optional[pulumi.Input[builtins.str]] = None,
122
+ key_type: Optional[pulumi.Input[builtins.str]] = None,
123
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
124
+ role: Optional[pulumi.Input[builtins.str]] = None):
124
125
  """
125
126
  Input properties used for looking up and filtering BackendAcmeEab resources.
126
- :param pulumi.Input[str] acme_directory: The ACME directory to which the key belongs
127
- :param pulumi.Input[str] backend: The path to the PKI secret backend to
127
+ :param pulumi.Input[builtins.str] acme_directory: The ACME directory to which the key belongs
128
+ :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
128
129
  create the EAB token within, with no leading or trailing `/`s.
129
- :param pulumi.Input[str] created_on: An RFC3339 formatted date time when the EAB token was created
130
- :param pulumi.Input[str] eab_id: The identifier of a specific ACME EAB token
131
- :param pulumi.Input[str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
132
- :param pulumi.Input[str] key: The EAB token
133
- :param pulumi.Input[str] key_type: The key type of the EAB key
134
- :param pulumi.Input[str] namespace: The namespace of the target resource.
130
+ :param pulumi.Input[builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
131
+ :param pulumi.Input[builtins.str] eab_id: The identifier of a specific ACME EAB token
132
+ :param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
133
+ :param pulumi.Input[builtins.str] key: The EAB token
134
+ :param pulumi.Input[builtins.str] key_type: The key type of the EAB key
135
+ :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
135
136
  The value should not contain leading or trailing forward slashes.
136
137
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
137
138
  *Available only for Vault Enterprise*.
138
- :param pulumi.Input[str] role: Create an EAB token that is specific to a role's ACME directory.
139
+ :param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
139
140
 
140
141
  **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
141
142
 
@@ -165,19 +166,19 @@ class _BackendAcmeEabState:
165
166
 
166
167
  @property
167
168
  @pulumi.getter(name="acmeDirectory")
168
- def acme_directory(self) -> Optional[pulumi.Input[str]]:
169
+ def acme_directory(self) -> Optional[pulumi.Input[builtins.str]]:
169
170
  """
170
171
  The ACME directory to which the key belongs
171
172
  """
172
173
  return pulumi.get(self, "acme_directory")
173
174
 
174
175
  @acme_directory.setter
175
- def acme_directory(self, value: Optional[pulumi.Input[str]]):
176
+ def acme_directory(self, value: Optional[pulumi.Input[builtins.str]]):
176
177
  pulumi.set(self, "acme_directory", value)
177
178
 
178
179
  @property
179
180
  @pulumi.getter
180
- def backend(self) -> Optional[pulumi.Input[str]]:
181
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
181
182
  """
182
183
  The path to the PKI secret backend to
183
184
  create the EAB token within, with no leading or trailing `/`s.
@@ -185,72 +186,72 @@ class _BackendAcmeEabState:
185
186
  return pulumi.get(self, "backend")
186
187
 
187
188
  @backend.setter
188
- def backend(self, value: Optional[pulumi.Input[str]]):
189
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
189
190
  pulumi.set(self, "backend", value)
190
191
 
191
192
  @property
192
193
  @pulumi.getter(name="createdOn")
193
- def created_on(self) -> Optional[pulumi.Input[str]]:
194
+ def created_on(self) -> Optional[pulumi.Input[builtins.str]]:
194
195
  """
195
196
  An RFC3339 formatted date time when the EAB token was created
196
197
  """
197
198
  return pulumi.get(self, "created_on")
198
199
 
199
200
  @created_on.setter
200
- def created_on(self, value: Optional[pulumi.Input[str]]):
201
+ def created_on(self, value: Optional[pulumi.Input[builtins.str]]):
201
202
  pulumi.set(self, "created_on", value)
202
203
 
203
204
  @property
204
205
  @pulumi.getter(name="eabId")
205
- def eab_id(self) -> Optional[pulumi.Input[str]]:
206
+ def eab_id(self) -> Optional[pulumi.Input[builtins.str]]:
206
207
  """
207
208
  The identifier of a specific ACME EAB token
208
209
  """
209
210
  return pulumi.get(self, "eab_id")
210
211
 
211
212
  @eab_id.setter
212
- def eab_id(self, value: Optional[pulumi.Input[str]]):
213
+ def eab_id(self, value: Optional[pulumi.Input[builtins.str]]):
213
214
  pulumi.set(self, "eab_id", value)
214
215
 
215
216
  @property
216
217
  @pulumi.getter
217
- def issuer(self) -> Optional[pulumi.Input[str]]:
218
+ def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
218
219
  """
219
220
  Create an EAB token that is specific to an issuer's ACME directory.
220
221
  """
221
222
  return pulumi.get(self, "issuer")
222
223
 
223
224
  @issuer.setter
224
- def issuer(self, value: Optional[pulumi.Input[str]]):
225
+ def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
225
226
  pulumi.set(self, "issuer", value)
226
227
 
227
228
  @property
228
229
  @pulumi.getter
229
- def key(self) -> Optional[pulumi.Input[str]]:
230
+ def key(self) -> Optional[pulumi.Input[builtins.str]]:
230
231
  """
231
232
  The EAB token
232
233
  """
233
234
  return pulumi.get(self, "key")
234
235
 
235
236
  @key.setter
236
- def key(self, value: Optional[pulumi.Input[str]]):
237
+ def key(self, value: Optional[pulumi.Input[builtins.str]]):
237
238
  pulumi.set(self, "key", value)
238
239
 
239
240
  @property
240
241
  @pulumi.getter(name="keyType")
241
- def key_type(self) -> Optional[pulumi.Input[str]]:
242
+ def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
242
243
  """
243
244
  The key type of the EAB key
244
245
  """
245
246
  return pulumi.get(self, "key_type")
246
247
 
247
248
  @key_type.setter
248
- def key_type(self, value: Optional[pulumi.Input[str]]):
249
+ def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
249
250
  pulumi.set(self, "key_type", value)
250
251
 
251
252
  @property
252
253
  @pulumi.getter
253
- def namespace(self) -> Optional[pulumi.Input[str]]:
254
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
254
255
  """
255
256
  The namespace of the target resource.
256
257
  The value should not contain leading or trailing forward slashes.
@@ -260,12 +261,12 @@ class _BackendAcmeEabState:
260
261
  return pulumi.get(self, "namespace")
261
262
 
262
263
  @namespace.setter
263
- def namespace(self, value: Optional[pulumi.Input[str]]):
264
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
264
265
  pulumi.set(self, "namespace", value)
265
266
 
266
267
  @property
267
268
  @pulumi.getter
268
- def role(self) -> Optional[pulumi.Input[str]]:
269
+ def role(self) -> Optional[pulumi.Input[builtins.str]]:
269
270
  """
270
271
  Create an EAB token that is specific to a role's ACME directory.
271
272
 
@@ -279,7 +280,7 @@ class _BackendAcmeEabState:
279
280
  return pulumi.get(self, "role")
280
281
 
281
282
  @role.setter
282
- def role(self, value: Optional[pulumi.Input[str]]):
283
+ def role(self, value: Optional[pulumi.Input[builtins.str]]):
283
284
  pulumi.set(self, "role", value)
284
285
 
285
286
 
@@ -288,10 +289,10 @@ class BackendAcmeEab(pulumi.CustomResource):
288
289
  def __init__(__self__,
289
290
  resource_name: str,
290
291
  opts: Optional[pulumi.ResourceOptions] = None,
291
- backend: Optional[pulumi.Input[str]] = None,
292
- issuer: Optional[pulumi.Input[str]] = None,
293
- namespace: Optional[pulumi.Input[str]] = None,
294
- role: Optional[pulumi.Input[str]] = None,
292
+ backend: Optional[pulumi.Input[builtins.str]] = None,
293
+ issuer: Optional[pulumi.Input[builtins.str]] = None,
294
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
295
+ role: Optional[pulumi.Input[builtins.str]] = None,
295
296
  __props__=None):
296
297
  """
297
298
  Allows creating ACME EAB (External Account Binding) tokens and deleting unused ones.
@@ -317,14 +318,14 @@ class BackendAcmeEab(pulumi.CustomResource):
317
318
 
318
319
  :param str resource_name: The name of the resource.
319
320
  :param pulumi.ResourceOptions opts: Options for the resource.
320
- :param pulumi.Input[str] backend: The path to the PKI secret backend to
321
+ :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
321
322
  create the EAB token within, with no leading or trailing `/`s.
322
- :param pulumi.Input[str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
323
- :param pulumi.Input[str] namespace: The namespace of the target resource.
323
+ :param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
324
+ :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
324
325
  The value should not contain leading or trailing forward slashes.
325
326
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
326
327
  *Available only for Vault Enterprise*.
327
- :param pulumi.Input[str] role: Create an EAB token that is specific to a role's ACME directory.
328
+ :param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
328
329
 
329
330
  **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
330
331
 
@@ -376,10 +377,10 @@ class BackendAcmeEab(pulumi.CustomResource):
376
377
  def _internal_init(__self__,
377
378
  resource_name: str,
378
379
  opts: Optional[pulumi.ResourceOptions] = None,
379
- backend: Optional[pulumi.Input[str]] = None,
380
- issuer: Optional[pulumi.Input[str]] = None,
381
- namespace: Optional[pulumi.Input[str]] = None,
382
- role: Optional[pulumi.Input[str]] = None,
380
+ backend: Optional[pulumi.Input[builtins.str]] = None,
381
+ issuer: Optional[pulumi.Input[builtins.str]] = None,
382
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
383
+ role: Optional[pulumi.Input[builtins.str]] = None,
383
384
  __props__=None):
384
385
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
385
386
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -412,15 +413,15 @@ class BackendAcmeEab(pulumi.CustomResource):
412
413
  def get(resource_name: str,
413
414
  id: pulumi.Input[str],
414
415
  opts: Optional[pulumi.ResourceOptions] = None,
415
- acme_directory: Optional[pulumi.Input[str]] = None,
416
- backend: Optional[pulumi.Input[str]] = None,
417
- created_on: Optional[pulumi.Input[str]] = None,
418
- eab_id: Optional[pulumi.Input[str]] = None,
419
- issuer: Optional[pulumi.Input[str]] = None,
420
- key: Optional[pulumi.Input[str]] = None,
421
- key_type: Optional[pulumi.Input[str]] = None,
422
- namespace: Optional[pulumi.Input[str]] = None,
423
- role: Optional[pulumi.Input[str]] = None) -> 'BackendAcmeEab':
416
+ acme_directory: Optional[pulumi.Input[builtins.str]] = None,
417
+ backend: Optional[pulumi.Input[builtins.str]] = None,
418
+ created_on: Optional[pulumi.Input[builtins.str]] = None,
419
+ eab_id: Optional[pulumi.Input[builtins.str]] = None,
420
+ issuer: Optional[pulumi.Input[builtins.str]] = None,
421
+ key: Optional[pulumi.Input[builtins.str]] = None,
422
+ key_type: Optional[pulumi.Input[builtins.str]] = None,
423
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
424
+ role: Optional[pulumi.Input[builtins.str]] = None) -> 'BackendAcmeEab':
424
425
  """
425
426
  Get an existing BackendAcmeEab resource's state with the given name, id, and optional extra
426
427
  properties used to qualify the lookup.
@@ -428,19 +429,19 @@ class BackendAcmeEab(pulumi.CustomResource):
428
429
  :param str resource_name: The unique name of the resulting resource.
429
430
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
430
431
  :param pulumi.ResourceOptions opts: Options for the resource.
431
- :param pulumi.Input[str] acme_directory: The ACME directory to which the key belongs
432
- :param pulumi.Input[str] backend: The path to the PKI secret backend to
432
+ :param pulumi.Input[builtins.str] acme_directory: The ACME directory to which the key belongs
433
+ :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
433
434
  create the EAB token within, with no leading or trailing `/`s.
434
- :param pulumi.Input[str] created_on: An RFC3339 formatted date time when the EAB token was created
435
- :param pulumi.Input[str] eab_id: The identifier of a specific ACME EAB token
436
- :param pulumi.Input[str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
437
- :param pulumi.Input[str] key: The EAB token
438
- :param pulumi.Input[str] key_type: The key type of the EAB key
439
- :param pulumi.Input[str] namespace: The namespace of the target resource.
435
+ :param pulumi.Input[builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
436
+ :param pulumi.Input[builtins.str] eab_id: The identifier of a specific ACME EAB token
437
+ :param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
438
+ :param pulumi.Input[builtins.str] key: The EAB token
439
+ :param pulumi.Input[builtins.str] key_type: The key type of the EAB key
440
+ :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
440
441
  The value should not contain leading or trailing forward slashes.
441
442
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
442
443
  *Available only for Vault Enterprise*.
443
- :param pulumi.Input[str] role: Create an EAB token that is specific to a role's ACME directory.
444
+ :param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
444
445
 
445
446
  **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
446
447
 
@@ -466,7 +467,7 @@ class BackendAcmeEab(pulumi.CustomResource):
466
467
 
467
468
  @property
468
469
  @pulumi.getter(name="acmeDirectory")
469
- def acme_directory(self) -> pulumi.Output[str]:
470
+ def acme_directory(self) -> pulumi.Output[builtins.str]:
470
471
  """
471
472
  The ACME directory to which the key belongs
472
473
  """
@@ -474,7 +475,7 @@ class BackendAcmeEab(pulumi.CustomResource):
474
475
 
475
476
  @property
476
477
  @pulumi.getter
477
- def backend(self) -> pulumi.Output[str]:
478
+ def backend(self) -> pulumi.Output[builtins.str]:
478
479
  """
479
480
  The path to the PKI secret backend to
480
481
  create the EAB token within, with no leading or trailing `/`s.
@@ -483,7 +484,7 @@ class BackendAcmeEab(pulumi.CustomResource):
483
484
 
484
485
  @property
485
486
  @pulumi.getter(name="createdOn")
486
- def created_on(self) -> pulumi.Output[str]:
487
+ def created_on(self) -> pulumi.Output[builtins.str]:
487
488
  """
488
489
  An RFC3339 formatted date time when the EAB token was created
489
490
  """
@@ -491,7 +492,7 @@ class BackendAcmeEab(pulumi.CustomResource):
491
492
 
492
493
  @property
493
494
  @pulumi.getter(name="eabId")
494
- def eab_id(self) -> pulumi.Output[str]:
495
+ def eab_id(self) -> pulumi.Output[builtins.str]:
495
496
  """
496
497
  The identifier of a specific ACME EAB token
497
498
  """
@@ -499,7 +500,7 @@ class BackendAcmeEab(pulumi.CustomResource):
499
500
 
500
501
  @property
501
502
  @pulumi.getter
502
- def issuer(self) -> pulumi.Output[Optional[str]]:
503
+ def issuer(self) -> pulumi.Output[Optional[builtins.str]]:
503
504
  """
504
505
  Create an EAB token that is specific to an issuer's ACME directory.
505
506
  """
@@ -507,7 +508,7 @@ class BackendAcmeEab(pulumi.CustomResource):
507
508
 
508
509
  @property
509
510
  @pulumi.getter
510
- def key(self) -> pulumi.Output[str]:
511
+ def key(self) -> pulumi.Output[builtins.str]:
511
512
  """
512
513
  The EAB token
513
514
  """
@@ -515,7 +516,7 @@ class BackendAcmeEab(pulumi.CustomResource):
515
516
 
516
517
  @property
517
518
  @pulumi.getter(name="keyType")
518
- def key_type(self) -> pulumi.Output[str]:
519
+ def key_type(self) -> pulumi.Output[builtins.str]:
519
520
  """
520
521
  The key type of the EAB key
521
522
  """
@@ -523,7 +524,7 @@ class BackendAcmeEab(pulumi.CustomResource):
523
524
 
524
525
  @property
525
526
  @pulumi.getter
526
- def namespace(self) -> pulumi.Output[Optional[str]]:
527
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
527
528
  """
528
529
  The namespace of the target resource.
529
530
  The value should not contain leading or trailing forward slashes.
@@ -534,7 +535,7 @@ class BackendAcmeEab(pulumi.CustomResource):
534
535
 
535
536
  @property
536
537
  @pulumi.getter
537
- def role(self) -> pulumi.Output[Optional[str]]:
538
+ def role(self) -> pulumi.Output[Optional[builtins.str]]:
538
539
  """
539
540
  Create an EAB token that is specific to a role's ACME directory.
540
541