pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -57,7 +58,7 @@ class GetBackendCertMetadataResult:
57
58
 
58
59
  @property
59
60
  @pulumi.getter(name="certMetadata")
60
- def cert_metadata(self) -> str:
61
+ def cert_metadata(self) -> builtins.str:
61
62
  """
62
63
  The metadata associated with the certificate
63
64
  """
@@ -65,7 +66,7 @@ class GetBackendCertMetadataResult:
65
66
 
66
67
  @property
67
68
  @pulumi.getter
68
- def expiration(self) -> str:
69
+ def expiration(self) -> builtins.str:
69
70
  """
70
71
  The expiration date of the certificate in unix epoch format
71
72
  """
@@ -73,7 +74,7 @@ class GetBackendCertMetadataResult:
73
74
 
74
75
  @property
75
76
  @pulumi.getter
76
- def id(self) -> str:
77
+ def id(self) -> builtins.str:
77
78
  """
78
79
  The provider-assigned unique ID for this managed resource.
79
80
  """
@@ -81,7 +82,7 @@ class GetBackendCertMetadataResult:
81
82
 
82
83
  @property
83
84
  @pulumi.getter(name="issuerId")
84
- def issuer_id(self) -> str:
85
+ def issuer_id(self) -> builtins.str:
85
86
  """
86
87
  ID of the issuer.
87
88
  """
@@ -89,17 +90,17 @@ class GetBackendCertMetadataResult:
89
90
 
90
91
  @property
91
92
  @pulumi.getter
92
- def namespace(self) -> Optional[str]:
93
+ def namespace(self) -> Optional[builtins.str]:
93
94
  return pulumi.get(self, "namespace")
94
95
 
95
96
  @property
96
97
  @pulumi.getter
97
- def path(self) -> str:
98
+ def path(self) -> builtins.str:
98
99
  return pulumi.get(self, "path")
99
100
 
100
101
  @property
101
102
  @pulumi.getter
102
- def role(self) -> str:
103
+ def role(self) -> builtins.str:
103
104
  """
104
105
  The role used to create the certificate
105
106
  """
@@ -107,12 +108,12 @@ class GetBackendCertMetadataResult:
107
108
 
108
109
  @property
109
110
  @pulumi.getter
110
- def serial(self) -> str:
111
+ def serial(self) -> builtins.str:
111
112
  return pulumi.get(self, "serial")
112
113
 
113
114
  @property
114
115
  @pulumi.getter(name="serialNumber")
115
- def serial_number(self) -> str:
116
+ def serial_number(self) -> builtins.str:
116
117
  """
117
118
  The serial number
118
119
  """
@@ -136,9 +137,9 @@ class AwaitableGetBackendCertMetadataResult(GetBackendCertMetadataResult):
136
137
  serial_number=self.serial_number)
137
138
 
138
139
 
139
- def get_backend_cert_metadata(namespace: Optional[str] = None,
140
- path: Optional[str] = None,
141
- serial: Optional[str] = None,
140
+ def get_backend_cert_metadata(namespace: Optional[builtins.str] = None,
141
+ path: Optional[builtins.str] = None,
142
+ serial: Optional[builtins.str] = None,
142
143
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendCertMetadataResult:
143
144
  """
144
145
  ## Example Usage
@@ -181,13 +182,13 @@ def get_backend_cert_metadata(namespace: Optional[str] = None,
181
182
  ```
182
183
 
183
184
 
184
- :param str namespace: The namespace of the target resource.
185
+ :param builtins.str namespace: The namespace of the target resource.
185
186
  The value should not contain leading or trailing forward slashes.
186
187
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
187
188
  *Available only for Vault Enterprise*.
188
- :param str path: The path to the PKI secret backend to
189
+ :param builtins.str path: The path to the PKI secret backend to
189
190
  read the cert metadata from, with no leading or trailing `/`s.
190
- :param str serial: Specifies the serial of the certificate whose metadata to read.
191
+ :param builtins.str serial: Specifies the serial of the certificate whose metadata to read.
191
192
  """
192
193
  __args__ = dict()
193
194
  __args__['namespace'] = namespace
@@ -206,9 +207,9 @@ def get_backend_cert_metadata(namespace: Optional[str] = None,
206
207
  role=pulumi.get(__ret__, 'role'),
207
208
  serial=pulumi.get(__ret__, 'serial'),
208
209
  serial_number=pulumi.get(__ret__, 'serial_number'))
209
- def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
210
- path: Optional[pulumi.Input[str]] = None,
211
- serial: Optional[pulumi.Input[str]] = None,
210
+ def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
211
+ path: Optional[pulumi.Input[builtins.str]] = None,
212
+ serial: Optional[pulumi.Input[builtins.str]] = None,
212
213
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendCertMetadataResult]:
213
214
  """
214
215
  ## Example Usage
@@ -251,13 +252,13 @@ def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[s
251
252
  ```
252
253
 
253
254
 
254
- :param str namespace: The namespace of the target resource.
255
+ :param builtins.str namespace: The namespace of the target resource.
255
256
  The value should not contain leading or trailing forward slashes.
256
257
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
257
258
  *Available only for Vault Enterprise*.
258
- :param str path: The path to the PKI secret backend to
259
+ :param builtins.str path: The path to the PKI secret backend to
259
260
  read the cert metadata from, with no leading or trailing `/`s.
260
- :param str serial: Specifies the serial of the certificate whose metadata to read.
261
+ :param builtins.str serial: Specifies the serial of the certificate whose metadata to read.
261
262
  """
262
263
  __args__ = dict()
263
264
  __args__['namespace'] = namespace
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -61,7 +62,7 @@ class GetBackendConfigCmpv2Result:
61
62
 
62
63
  @property
63
64
  @pulumi.getter(name="auditFields")
64
- def audit_fields(self) -> Sequence[str]:
65
+ def audit_fields(self) -> Sequence[builtins.str]:
65
66
  return pulumi.get(self, "audit_fields")
66
67
 
67
68
  @property
@@ -71,32 +72,32 @@ class GetBackendConfigCmpv2Result:
71
72
 
72
73
  @property
73
74
  @pulumi.getter
74
- def backend(self) -> str:
75
+ def backend(self) -> builtins.str:
75
76
  return pulumi.get(self, "backend")
76
77
 
77
78
  @property
78
79
  @pulumi.getter(name="defaultPathPolicy")
79
- def default_path_policy(self) -> str:
80
+ def default_path_policy(self) -> builtins.str:
80
81
  return pulumi.get(self, "default_path_policy")
81
82
 
82
83
  @property
83
84
  @pulumi.getter(name="disabledValidations")
84
- def disabled_validations(self) -> Optional[Sequence[str]]:
85
+ def disabled_validations(self) -> Optional[Sequence[builtins.str]]:
85
86
  return pulumi.get(self, "disabled_validations")
86
87
 
87
88
  @property
88
89
  @pulumi.getter(name="enableSentinelParsing")
89
- def enable_sentinel_parsing(self) -> bool:
90
+ def enable_sentinel_parsing(self) -> builtins.bool:
90
91
  return pulumi.get(self, "enable_sentinel_parsing")
91
92
 
92
93
  @property
93
94
  @pulumi.getter
94
- def enabled(self) -> bool:
95
+ def enabled(self) -> builtins.bool:
95
96
  return pulumi.get(self, "enabled")
96
97
 
97
98
  @property
98
99
  @pulumi.getter
99
- def id(self) -> str:
100
+ def id(self) -> builtins.str:
100
101
  """
101
102
  The provider-assigned unique ID for this managed resource.
102
103
  """
@@ -104,12 +105,12 @@ class GetBackendConfigCmpv2Result:
104
105
 
105
106
  @property
106
107
  @pulumi.getter(name="lastUpdated")
107
- def last_updated(self) -> str:
108
+ def last_updated(self) -> builtins.str:
108
109
  return pulumi.get(self, "last_updated")
109
110
 
110
111
  @property
111
112
  @pulumi.getter
112
- def namespace(self) -> Optional[str]:
113
+ def namespace(self) -> Optional[builtins.str]:
113
114
  return pulumi.get(self, "namespace")
114
115
 
115
116
 
@@ -131,9 +132,9 @@ class AwaitableGetBackendConfigCmpv2Result(GetBackendConfigCmpv2Result):
131
132
  namespace=self.namespace)
132
133
 
133
134
 
134
- def get_backend_config_cmpv2(backend: Optional[str] = None,
135
- disabled_validations: Optional[Sequence[str]] = None,
136
- namespace: Optional[str] = None,
135
+ def get_backend_config_cmpv2(backend: Optional[builtins.str] = None,
136
+ disabled_validations: Optional[Sequence[builtins.str]] = None,
137
+ namespace: Optional[builtins.str] = None,
137
138
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigCmpv2Result:
138
139
  """
139
140
  ## Example Usage
@@ -150,12 +151,12 @@ def get_backend_config_cmpv2(backend: Optional[str] = None,
150
151
  ```
151
152
 
152
153
 
153
- :param str backend: The path to the PKI secret backend to
154
+ :param builtins.str backend: The path to the PKI secret backend to
154
155
  read the CMPv2 configuration from, with no leading or trailing `/`s.
155
156
 
156
157
  # Attributes Reference
157
- :param Sequence[str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
158
- :param str namespace: The namespace of the target resource.
158
+ :param Sequence[builtins.str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
159
+ :param builtins.str namespace: The namespace of the target resource.
159
160
  The value should not contain leading or trailing forward slashes.
160
161
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
161
162
  *Available only for Vault Enterprise*.
@@ -178,9 +179,9 @@ def get_backend_config_cmpv2(backend: Optional[str] = None,
178
179
  id=pulumi.get(__ret__, 'id'),
179
180
  last_updated=pulumi.get(__ret__, 'last_updated'),
180
181
  namespace=pulumi.get(__ret__, 'namespace'))
181
- def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[str]] = None,
182
- disabled_validations: Optional[pulumi.Input[Optional[Sequence[str]]]] = None,
183
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
182
+ def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[builtins.str]] = None,
183
+ disabled_validations: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
184
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
184
185
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigCmpv2Result]:
185
186
  """
186
187
  ## Example Usage
@@ -197,12 +198,12 @@ def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[str]] = None,
197
198
  ```
198
199
 
199
200
 
200
- :param str backend: The path to the PKI secret backend to
201
+ :param builtins.str backend: The path to the PKI secret backend to
201
202
  read the CMPv2 configuration from, with no leading or trailing `/`s.
202
203
 
203
204
  # Attributes Reference
204
- :param Sequence[str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
205
- :param str namespace: The namespace of the target resource.
205
+ :param Sequence[builtins.str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
206
+ :param builtins.str namespace: The namespace of the target resource.
206
207
  The value should not contain leading or trailing forward slashes.
207
208
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
208
209
  *Available only for Vault Enterprise*.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -64,7 +65,7 @@ class GetBackendConfigEstResult:
64
65
 
65
66
  @property
66
67
  @pulumi.getter(name="auditFields")
67
- def audit_fields(self) -> Sequence[str]:
68
+ def audit_fields(self) -> Sequence[builtins.str]:
68
69
  """
69
70
  Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
70
71
  """
@@ -80,12 +81,12 @@ class GetBackendConfigEstResult:
80
81
 
81
82
  @property
82
83
  @pulumi.getter
83
- def backend(self) -> str:
84
+ def backend(self) -> builtins.str:
84
85
  return pulumi.get(self, "backend")
85
86
 
86
87
  @property
87
88
  @pulumi.getter(name="defaultMount")
88
- def default_mount(self) -> bool:
89
+ def default_mount(self) -> builtins.bool:
89
90
  """
90
91
  If set, this mount is registered as the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
91
92
  """
@@ -93,7 +94,7 @@ class GetBackendConfigEstResult:
93
94
 
94
95
  @property
95
96
  @pulumi.getter(name="defaultPathPolicy")
96
- def default_path_policy(self) -> str:
97
+ def default_path_policy(self) -> builtins.str:
97
98
  """
98
99
  Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
99
100
  """
@@ -101,7 +102,7 @@ class GetBackendConfigEstResult:
101
102
 
102
103
  @property
103
104
  @pulumi.getter(name="enableSentinelParsing")
104
- def enable_sentinel_parsing(self) -> bool:
105
+ def enable_sentinel_parsing(self) -> builtins.bool:
105
106
  """
106
107
  If set, parse out fields from the provided CSR making them available for Sentinel policies.
107
108
  """
@@ -109,7 +110,7 @@ class GetBackendConfigEstResult:
109
110
 
110
111
  @property
111
112
  @pulumi.getter
112
- def enabled(self) -> bool:
113
+ def enabled(self) -> builtins.bool:
113
114
  """
114
115
  Specifies whether EST is enabled.
115
116
  """
@@ -117,7 +118,7 @@ class GetBackendConfigEstResult:
117
118
 
118
119
  @property
119
120
  @pulumi.getter
120
- def id(self) -> str:
121
+ def id(self) -> builtins.str:
121
122
  """
122
123
  The provider-assigned unique ID for this managed resource.
123
124
  """
@@ -125,7 +126,7 @@ class GetBackendConfigEstResult:
125
126
 
126
127
  @property
127
128
  @pulumi.getter(name="labelToPathPolicy")
128
- def label_to_path_policy(self) -> Mapping[str, str]:
129
+ def label_to_path_policy(self) -> Mapping[str, builtins.str]:
129
130
  """
130
131
  A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
131
132
  """
@@ -133,7 +134,7 @@ class GetBackendConfigEstResult:
133
134
 
134
135
  @property
135
136
  @pulumi.getter(name="lastUpdated")
136
- def last_updated(self) -> str:
137
+ def last_updated(self) -> builtins.str:
137
138
  """
138
139
  A read-only timestamp representing the last time the configuration was updated.
139
140
  """
@@ -141,7 +142,7 @@ class GetBackendConfigEstResult:
141
142
 
142
143
  @property
143
144
  @pulumi.getter
144
- def namespace(self) -> Optional[str]:
145
+ def namespace(self) -> Optional[builtins.str]:
145
146
  return pulumi.get(self, "namespace")
146
147
 
147
148
 
@@ -164,8 +165,8 @@ class AwaitableGetBackendConfigEstResult(GetBackendConfigEstResult):
164
165
  namespace=self.namespace)
165
166
 
166
167
 
167
- def get_backend_config_est(backend: Optional[str] = None,
168
- namespace: Optional[str] = None,
168
+ def get_backend_config_est(backend: Optional[builtins.str] = None,
169
+ namespace: Optional[builtins.str] = None,
169
170
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigEstResult:
170
171
  """
171
172
  ## Example Usage
@@ -182,9 +183,9 @@ def get_backend_config_est(backend: Optional[str] = None,
182
183
  ```
183
184
 
184
185
 
185
- :param str backend: The path to the PKI secret backend to
186
+ :param builtins.str backend: The path to the PKI secret backend to
186
187
  read the EST configuration from, with no leading or trailing `/`s.
187
- :param str namespace: The namespace of the target resource.
188
+ :param builtins.str namespace: The namespace of the target resource.
188
189
  The value should not contain leading or trailing forward slashes.
189
190
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
190
191
  *Available only for Vault Enterprise*.
@@ -207,8 +208,8 @@ def get_backend_config_est(backend: Optional[str] = None,
207
208
  label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
208
209
  last_updated=pulumi.get(__ret__, 'last_updated'),
209
210
  namespace=pulumi.get(__ret__, 'namespace'))
210
- def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
211
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
211
+ def get_backend_config_est_output(backend: Optional[pulumi.Input[builtins.str]] = None,
212
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
212
213
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
213
214
  """
214
215
  ## Example Usage
@@ -225,9 +226,9 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[str]] = None,
225
226
  ```
226
227
 
227
228
 
228
- :param str backend: The path to the PKI secret backend to
229
+ :param builtins.str backend: The path to the PKI secret backend to
229
230
  read the EST configuration from, with no leading or trailing `/`s.
230
- :param str namespace: The namespace of the target resource.
231
+ :param builtins.str namespace: The namespace of the target resource.
231
232
  The value should not contain leading or trailing forward slashes.
232
233
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
233
234
  *Available only for Vault Enterprise*.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -78,12 +79,12 @@ class GetBackendIssuerResult:
78
79
 
79
80
  @property
80
81
  @pulumi.getter
81
- def backend(self) -> str:
82
+ def backend(self) -> builtins.str:
82
83
  return pulumi.get(self, "backend")
83
84
 
84
85
  @property
85
86
  @pulumi.getter(name="caChains")
86
- def ca_chains(self) -> Sequence[str]:
87
+ def ca_chains(self) -> Sequence[builtins.str]:
87
88
  """
88
89
  The CA chain as a list of format specific certificates.
89
90
  """
@@ -91,7 +92,7 @@ class GetBackendIssuerResult:
91
92
 
92
93
  @property
93
94
  @pulumi.getter
94
- def certificate(self) -> str:
95
+ def certificate(self) -> builtins.str:
95
96
  """
96
97
  Certificate associated with this issuer.
97
98
  """
@@ -99,7 +100,7 @@ class GetBackendIssuerResult:
99
100
 
100
101
  @property
101
102
  @pulumi.getter(name="disableCriticalExtensionChecks")
102
- def disable_critical_extension_checks(self) -> Optional[bool]:
103
+ def disable_critical_extension_checks(self) -> Optional[builtins.bool]:
103
104
  """
104
105
  This determines whether this
105
106
  issuer is able to issue certificates where the chain of trust (including the
@@ -109,7 +110,7 @@ class GetBackendIssuerResult:
109
110
 
110
111
  @property
111
112
  @pulumi.getter(name="disableNameChecks")
112
- def disable_name_checks(self) -> Optional[bool]:
113
+ def disable_name_checks(self) -> Optional[builtins.bool]:
113
114
  """
114
115
  This determines whether this issuer is able
115
116
  to issue certificates where the chain of trust (including the final issued
@@ -120,7 +121,7 @@ class GetBackendIssuerResult:
120
121
 
121
122
  @property
122
123
  @pulumi.getter(name="disableNameConstraintChecks")
123
- def disable_name_constraint_checks(self) -> Optional[bool]:
124
+ def disable_name_constraint_checks(self) -> Optional[builtins.bool]:
124
125
  """
125
126
  This determines whether this
126
127
  issuer is able to issue certificates where the chain of trust (including the
@@ -131,7 +132,7 @@ class GetBackendIssuerResult:
131
132
 
132
133
  @property
133
134
  @pulumi.getter(name="disablePathLengthChecks")
134
- def disable_path_length_checks(self) -> Optional[bool]:
135
+ def disable_path_length_checks(self) -> Optional[builtins.bool]:
135
136
  """
136
137
  This determines whether this issuer
137
138
  is able to issue certificates where the chain of trust (including the final
@@ -142,7 +143,7 @@ class GetBackendIssuerResult:
142
143
 
143
144
  @property
144
145
  @pulumi.getter
145
- def id(self) -> str:
146
+ def id(self) -> builtins.str:
146
147
  """
147
148
  The provider-assigned unique ID for this managed resource.
148
149
  """
@@ -150,7 +151,7 @@ class GetBackendIssuerResult:
150
151
 
151
152
  @property
152
153
  @pulumi.getter(name="issuerId")
153
- def issuer_id(self) -> str:
154
+ def issuer_id(self) -> builtins.str:
154
155
  """
155
156
  ID of the issuer.
156
157
  """
@@ -158,7 +159,7 @@ class GetBackendIssuerResult:
158
159
 
159
160
  @property
160
161
  @pulumi.getter(name="issuerName")
161
- def issuer_name(self) -> str:
162
+ def issuer_name(self) -> builtins.str:
162
163
  """
163
164
  Name of the issuer.
164
165
  """
@@ -166,12 +167,12 @@ class GetBackendIssuerResult:
166
167
 
167
168
  @property
168
169
  @pulumi.getter(name="issuerRef")
169
- def issuer_ref(self) -> str:
170
+ def issuer_ref(self) -> builtins.str:
170
171
  return pulumi.get(self, "issuer_ref")
171
172
 
172
173
  @property
173
174
  @pulumi.getter(name="keyId")
174
- def key_id(self) -> str:
175
+ def key_id(self) -> builtins.str:
175
176
  """
176
177
  ID of the key used by the issuer.
177
178
  """
@@ -179,7 +180,7 @@ class GetBackendIssuerResult:
179
180
 
180
181
  @property
181
182
  @pulumi.getter(name="leafNotAfterBehavior")
182
- def leaf_not_after_behavior(self) -> str:
183
+ def leaf_not_after_behavior(self) -> builtins.str:
183
184
  """
184
185
  Behavior of a leaf's NotAfter field during issuance.
185
186
  """
@@ -187,7 +188,7 @@ class GetBackendIssuerResult:
187
188
 
188
189
  @property
189
190
  @pulumi.getter(name="manualChains")
190
- def manual_chains(self) -> Sequence[str]:
191
+ def manual_chains(self) -> Sequence[builtins.str]:
191
192
  """
192
193
  Chain of issuer references to build this issuer's computed
193
194
  CAChain field from, when non-empty.
@@ -196,12 +197,12 @@ class GetBackendIssuerResult:
196
197
 
197
198
  @property
198
199
  @pulumi.getter
199
- def namespace(self) -> Optional[str]:
200
+ def namespace(self) -> Optional[builtins.str]:
200
201
  return pulumi.get(self, "namespace")
201
202
 
202
203
  @property
203
204
  @pulumi.getter
204
- def usage(self) -> str:
205
+ def usage(self) -> builtins.str:
205
206
  """
206
207
  Allowed usages for this issuer.
207
208
  """
@@ -232,13 +233,13 @@ class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
232
233
  usage=self.usage)
233
234
 
234
235
 
235
- def get_backend_issuer(backend: Optional[str] = None,
236
- disable_critical_extension_checks: Optional[bool] = None,
237
- disable_name_checks: Optional[bool] = None,
238
- disable_name_constraint_checks: Optional[bool] = None,
239
- disable_path_length_checks: Optional[bool] = None,
240
- issuer_ref: Optional[str] = None,
241
- namespace: Optional[str] = None,
236
+ def get_backend_issuer(backend: Optional[builtins.str] = None,
237
+ disable_critical_extension_checks: Optional[builtins.bool] = None,
238
+ disable_name_checks: Optional[builtins.bool] = None,
239
+ disable_name_constraint_checks: Optional[builtins.bool] = None,
240
+ disable_path_length_checks: Optional[builtins.bool] = None,
241
+ issuer_ref: Optional[builtins.str] = None,
242
+ namespace: Optional[builtins.str] = None,
242
243
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
243
244
  """
244
245
  ## Example Usage
@@ -262,25 +263,25 @@ def get_backend_issuer(backend: Optional[str] = None,
262
263
  ```
263
264
 
264
265
 
265
- :param str backend: The path to the PKI secret backend to
266
+ :param builtins.str backend: The path to the PKI secret backend to
266
267
  read the issuer from, with no leading or trailing `/`s.
267
- :param bool disable_critical_extension_checks: This determines whether this
268
+ :param builtins.bool disable_critical_extension_checks: This determines whether this
268
269
  issuer is able to issue certificates where the chain of trust (including the
269
270
  issued certificate) contain critical extensions not processed by Vault.
270
- :param bool disable_name_checks: This determines whether this issuer is able
271
+ :param builtins.bool disable_name_checks: This determines whether this issuer is able
271
272
  to issue certificates where the chain of trust (including the final issued
272
273
  certificate) contains a link in which the subject of the issuing certificate
273
274
  does not match the named issuer of the certificate it signed.
274
- :param bool disable_name_constraint_checks: This determines whether this
275
+ :param builtins.bool disable_name_constraint_checks: This determines whether this
275
276
  issuer is able to issue certificates where the chain of trust (including the
276
277
  final issued certificate) violates the name constraints critical extension of
277
278
  one of the issuer certificates in the chain.
278
- :param bool disable_path_length_checks: This determines whether this issuer
279
+ :param builtins.bool disable_path_length_checks: This determines whether this issuer
279
280
  is able to issue certificates where the chain of trust (including the final
280
281
  issued certificate) is longer than allowed by a certificate authority in that
281
282
  chain.
282
- :param str issuer_ref: Reference to an existing issuer.
283
- :param str namespace: The namespace of the target resource.
283
+ :param builtins.str issuer_ref: Reference to an existing issuer.
284
+ :param builtins.str namespace: The namespace of the target resource.
284
285
  The value should not contain leading or trailing forward slashes.
285
286
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
286
287
  *Available only for Vault Enterprise*.
@@ -313,13 +314,13 @@ def get_backend_issuer(backend: Optional[str] = None,
313
314
  manual_chains=pulumi.get(__ret__, 'manual_chains'),
314
315
  namespace=pulumi.get(__ret__, 'namespace'),
315
316
  usage=pulumi.get(__ret__, 'usage'))
316
- def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
317
- disable_critical_extension_checks: Optional[pulumi.Input[Optional[bool]]] = None,
318
- disable_name_checks: Optional[pulumi.Input[Optional[bool]]] = None,
319
- disable_name_constraint_checks: Optional[pulumi.Input[Optional[bool]]] = None,
320
- disable_path_length_checks: Optional[pulumi.Input[Optional[bool]]] = None,
321
- issuer_ref: Optional[pulumi.Input[str]] = None,
322
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
317
+ def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = None,
318
+ disable_critical_extension_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
319
+ disable_name_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
320
+ disable_name_constraint_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
321
+ disable_path_length_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
322
+ issuer_ref: Optional[pulumi.Input[builtins.str]] = None,
323
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
323
324
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
324
325
  """
325
326
  ## Example Usage
@@ -343,25 +344,25 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[str]] = None,
343
344
  ```
344
345
 
345
346
 
346
- :param str backend: The path to the PKI secret backend to
347
+ :param builtins.str backend: The path to the PKI secret backend to
347
348
  read the issuer from, with no leading or trailing `/`s.
348
- :param bool disable_critical_extension_checks: This determines whether this
349
+ :param builtins.bool disable_critical_extension_checks: This determines whether this
349
350
  issuer is able to issue certificates where the chain of trust (including the
350
351
  issued certificate) contain critical extensions not processed by Vault.
351
- :param bool disable_name_checks: This determines whether this issuer is able
352
+ :param builtins.bool disable_name_checks: This determines whether this issuer is able
352
353
  to issue certificates where the chain of trust (including the final issued
353
354
  certificate) contains a link in which the subject of the issuing certificate
354
355
  does not match the named issuer of the certificate it signed.
355
- :param bool disable_name_constraint_checks: This determines whether this
356
+ :param builtins.bool disable_name_constraint_checks: This determines whether this
356
357
  issuer is able to issue certificates where the chain of trust (including the
357
358
  final issued certificate) violates the name constraints critical extension of
358
359
  one of the issuer certificates in the chain.
359
- :param bool disable_path_length_checks: This determines whether this issuer
360
+ :param builtins.bool disable_path_length_checks: This determines whether this issuer
360
361
  is able to issue certificates where the chain of trust (including the final
361
362
  issued certificate) is longer than allowed by a certificate authority in that
362
363
  chain.
363
- :param str issuer_ref: Reference to an existing issuer.
364
- :param str namespace: The namespace of the target resource.
364
+ :param builtins.str issuer_ref: Reference to an existing issuer.
365
+ :param builtins.str namespace: The namespace of the target resource.
365
366
  The value should not contain leading or trailing forward slashes.
366
367
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
367
368
  *Available only for Vault Enterprise*.