pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,25 +20,25 @@ __all__ = ['AuthBackendCertArgs', 'AuthBackendCert']
19
20
  @pulumi.input_type
20
21
  class AuthBackendCertArgs:
21
22
  def __init__(__self__, *,
22
- aws_public_cert: pulumi.Input[str],
23
- cert_name: pulumi.Input[str],
24
- backend: Optional[pulumi.Input[str]] = None,
25
- namespace: Optional[pulumi.Input[str]] = None,
26
- type: Optional[pulumi.Input[str]] = None):
23
+ aws_public_cert: pulumi.Input[builtins.str],
24
+ cert_name: pulumi.Input[builtins.str],
25
+ backend: Optional[pulumi.Input[builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
27
+ type: Optional[pulumi.Input[builtins.str]] = None):
27
28
  """
28
29
  The set of arguments for constructing a AuthBackendCert resource.
29
- :param pulumi.Input[str] aws_public_cert: The Base64 encoded AWS Public key required to
30
+ :param pulumi.Input[builtins.str] aws_public_cert: The Base64 encoded AWS Public key required to
30
31
  verify PKCS7 signature of the EC2 instance metadata. You can find this key in
31
32
  the [AWS
32
33
  documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html).
33
- :param pulumi.Input[str] cert_name: The name of the certificate.
34
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
34
+ :param pulumi.Input[builtins.str] cert_name: The name of the certificate.
35
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
35
36
  mounted at. Defaults to `aws`.
36
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
37
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
37
38
  The value should not contain leading or trailing forward slashes.
38
39
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
40
  *Available only for Vault Enterprise*.
40
- :param pulumi.Input[str] type: Either "pkcs7" or "identity", indicating the type of
41
+ :param pulumi.Input[builtins.str] type: Either "pkcs7" or "identity", indicating the type of
41
42
  document which can be verified using the given certificate. Defaults to
42
43
  "pkcs7".
43
44
  """
@@ -52,7 +53,7 @@ class AuthBackendCertArgs:
52
53
 
53
54
  @property
54
55
  @pulumi.getter(name="awsPublicCert")
55
- def aws_public_cert(self) -> pulumi.Input[str]:
56
+ def aws_public_cert(self) -> pulumi.Input[builtins.str]:
56
57
  """
57
58
  The Base64 encoded AWS Public key required to
58
59
  verify PKCS7 signature of the EC2 instance metadata. You can find this key in
@@ -62,24 +63,24 @@ class AuthBackendCertArgs:
62
63
  return pulumi.get(self, "aws_public_cert")
63
64
 
64
65
  @aws_public_cert.setter
65
- def aws_public_cert(self, value: pulumi.Input[str]):
66
+ def aws_public_cert(self, value: pulumi.Input[builtins.str]):
66
67
  pulumi.set(self, "aws_public_cert", value)
67
68
 
68
69
  @property
69
70
  @pulumi.getter(name="certName")
70
- def cert_name(self) -> pulumi.Input[str]:
71
+ def cert_name(self) -> pulumi.Input[builtins.str]:
71
72
  """
72
73
  The name of the certificate.
73
74
  """
74
75
  return pulumi.get(self, "cert_name")
75
76
 
76
77
  @cert_name.setter
77
- def cert_name(self, value: pulumi.Input[str]):
78
+ def cert_name(self, value: pulumi.Input[builtins.str]):
78
79
  pulumi.set(self, "cert_name", value)
79
80
 
80
81
  @property
81
82
  @pulumi.getter
82
- def backend(self) -> Optional[pulumi.Input[str]]:
83
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
83
84
  """
84
85
  The path the AWS auth backend being configured was
85
86
  mounted at. Defaults to `aws`.
@@ -87,12 +88,12 @@ class AuthBackendCertArgs:
87
88
  return pulumi.get(self, "backend")
88
89
 
89
90
  @backend.setter
90
- def backend(self, value: Optional[pulumi.Input[str]]):
91
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
91
92
  pulumi.set(self, "backend", value)
92
93
 
93
94
  @property
94
95
  @pulumi.getter
95
- def namespace(self) -> Optional[pulumi.Input[str]]:
96
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
96
97
  """
97
98
  The namespace to provision the resource in.
98
99
  The value should not contain leading or trailing forward slashes.
@@ -102,12 +103,12 @@ class AuthBackendCertArgs:
102
103
  return pulumi.get(self, "namespace")
103
104
 
104
105
  @namespace.setter
105
- def namespace(self, value: Optional[pulumi.Input[str]]):
106
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
106
107
  pulumi.set(self, "namespace", value)
107
108
 
108
109
  @property
109
110
  @pulumi.getter
110
- def type(self) -> Optional[pulumi.Input[str]]:
111
+ def type(self) -> Optional[pulumi.Input[builtins.str]]:
111
112
  """
112
113
  Either "pkcs7" or "identity", indicating the type of
113
114
  document which can be verified using the given certificate. Defaults to
@@ -116,32 +117,32 @@ class AuthBackendCertArgs:
116
117
  return pulumi.get(self, "type")
117
118
 
118
119
  @type.setter
119
- def type(self, value: Optional[pulumi.Input[str]]):
120
+ def type(self, value: Optional[pulumi.Input[builtins.str]]):
120
121
  pulumi.set(self, "type", value)
121
122
 
122
123
 
123
124
  @pulumi.input_type
124
125
  class _AuthBackendCertState:
125
126
  def __init__(__self__, *,
126
- aws_public_cert: Optional[pulumi.Input[str]] = None,
127
- backend: Optional[pulumi.Input[str]] = None,
128
- cert_name: Optional[pulumi.Input[str]] = None,
129
- namespace: Optional[pulumi.Input[str]] = None,
130
- type: Optional[pulumi.Input[str]] = None):
127
+ aws_public_cert: Optional[pulumi.Input[builtins.str]] = None,
128
+ backend: Optional[pulumi.Input[builtins.str]] = None,
129
+ cert_name: Optional[pulumi.Input[builtins.str]] = None,
130
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
131
+ type: Optional[pulumi.Input[builtins.str]] = None):
131
132
  """
132
133
  Input properties used for looking up and filtering AuthBackendCert resources.
133
- :param pulumi.Input[str] aws_public_cert: The Base64 encoded AWS Public key required to
134
+ :param pulumi.Input[builtins.str] aws_public_cert: The Base64 encoded AWS Public key required to
134
135
  verify PKCS7 signature of the EC2 instance metadata. You can find this key in
135
136
  the [AWS
136
137
  documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html).
137
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
138
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
138
139
  mounted at. Defaults to `aws`.
139
- :param pulumi.Input[str] cert_name: The name of the certificate.
140
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
140
+ :param pulumi.Input[builtins.str] cert_name: The name of the certificate.
141
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
141
142
  The value should not contain leading or trailing forward slashes.
142
143
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
143
144
  *Available only for Vault Enterprise*.
144
- :param pulumi.Input[str] type: Either "pkcs7" or "identity", indicating the type of
145
+ :param pulumi.Input[builtins.str] type: Either "pkcs7" or "identity", indicating the type of
145
146
  document which can be verified using the given certificate. Defaults to
146
147
  "pkcs7".
147
148
  """
@@ -158,7 +159,7 @@ class _AuthBackendCertState:
158
159
 
159
160
  @property
160
161
  @pulumi.getter(name="awsPublicCert")
161
- def aws_public_cert(self) -> Optional[pulumi.Input[str]]:
162
+ def aws_public_cert(self) -> Optional[pulumi.Input[builtins.str]]:
162
163
  """
163
164
  The Base64 encoded AWS Public key required to
164
165
  verify PKCS7 signature of the EC2 instance metadata. You can find this key in
@@ -168,12 +169,12 @@ class _AuthBackendCertState:
168
169
  return pulumi.get(self, "aws_public_cert")
169
170
 
170
171
  @aws_public_cert.setter
171
- def aws_public_cert(self, value: Optional[pulumi.Input[str]]):
172
+ def aws_public_cert(self, value: Optional[pulumi.Input[builtins.str]]):
172
173
  pulumi.set(self, "aws_public_cert", value)
173
174
 
174
175
  @property
175
176
  @pulumi.getter
176
- def backend(self) -> Optional[pulumi.Input[str]]:
177
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
177
178
  """
178
179
  The path the AWS auth backend being configured was
179
180
  mounted at. Defaults to `aws`.
@@ -181,24 +182,24 @@ class _AuthBackendCertState:
181
182
  return pulumi.get(self, "backend")
182
183
 
183
184
  @backend.setter
184
- def backend(self, value: Optional[pulumi.Input[str]]):
185
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
185
186
  pulumi.set(self, "backend", value)
186
187
 
187
188
  @property
188
189
  @pulumi.getter(name="certName")
189
- def cert_name(self) -> Optional[pulumi.Input[str]]:
190
+ def cert_name(self) -> Optional[pulumi.Input[builtins.str]]:
190
191
  """
191
192
  The name of the certificate.
192
193
  """
193
194
  return pulumi.get(self, "cert_name")
194
195
 
195
196
  @cert_name.setter
196
- def cert_name(self, value: Optional[pulumi.Input[str]]):
197
+ def cert_name(self, value: Optional[pulumi.Input[builtins.str]]):
197
198
  pulumi.set(self, "cert_name", value)
198
199
 
199
200
  @property
200
201
  @pulumi.getter
201
- def namespace(self) -> Optional[pulumi.Input[str]]:
202
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
202
203
  """
203
204
  The namespace to provision the resource in.
204
205
  The value should not contain leading or trailing forward slashes.
@@ -208,12 +209,12 @@ class _AuthBackendCertState:
208
209
  return pulumi.get(self, "namespace")
209
210
 
210
211
  @namespace.setter
211
- def namespace(self, value: Optional[pulumi.Input[str]]):
212
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
212
213
  pulumi.set(self, "namespace", value)
213
214
 
214
215
  @property
215
216
  @pulumi.getter
216
- def type(self) -> Optional[pulumi.Input[str]]:
217
+ def type(self) -> Optional[pulumi.Input[builtins.str]]:
217
218
  """
218
219
  Either "pkcs7" or "identity", indicating the type of
219
220
  document which can be verified using the given certificate. Defaults to
@@ -222,7 +223,7 @@ class _AuthBackendCertState:
222
223
  return pulumi.get(self, "type")
223
224
 
224
225
  @type.setter
225
- def type(self, value: Optional[pulumi.Input[str]]):
226
+ def type(self, value: Optional[pulumi.Input[builtins.str]]):
226
227
  pulumi.set(self, "type", value)
227
228
 
228
229
 
@@ -231,11 +232,11 @@ class AuthBackendCert(pulumi.CustomResource):
231
232
  def __init__(__self__,
232
233
  resource_name: str,
233
234
  opts: Optional[pulumi.ResourceOptions] = None,
234
- aws_public_cert: Optional[pulumi.Input[str]] = None,
235
- backend: Optional[pulumi.Input[str]] = None,
236
- cert_name: Optional[pulumi.Input[str]] = None,
237
- namespace: Optional[pulumi.Input[str]] = None,
238
- type: Optional[pulumi.Input[str]] = None,
235
+ aws_public_cert: Optional[pulumi.Input[builtins.str]] = None,
236
+ backend: Optional[pulumi.Input[builtins.str]] = None,
237
+ cert_name: Optional[pulumi.Input[builtins.str]] = None,
238
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
239
+ type: Optional[pulumi.Input[builtins.str]] = None,
239
240
  __props__=None):
240
241
  """
241
242
  ## Example Usage
@@ -250,18 +251,18 @@ class AuthBackendCert(pulumi.CustomResource):
250
251
 
251
252
  :param str resource_name: The name of the resource.
252
253
  :param pulumi.ResourceOptions opts: Options for the resource.
253
- :param pulumi.Input[str] aws_public_cert: The Base64 encoded AWS Public key required to
254
+ :param pulumi.Input[builtins.str] aws_public_cert: The Base64 encoded AWS Public key required to
254
255
  verify PKCS7 signature of the EC2 instance metadata. You can find this key in
255
256
  the [AWS
256
257
  documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html).
257
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
258
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
258
259
  mounted at. Defaults to `aws`.
259
- :param pulumi.Input[str] cert_name: The name of the certificate.
260
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
260
+ :param pulumi.Input[builtins.str] cert_name: The name of the certificate.
261
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
261
262
  The value should not contain leading or trailing forward slashes.
262
263
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
263
264
  *Available only for Vault Enterprise*.
264
- :param pulumi.Input[str] type: Either "pkcs7" or "identity", indicating the type of
265
+ :param pulumi.Input[builtins.str] type: Either "pkcs7" or "identity", indicating the type of
265
266
  document which can be verified using the given certificate. Defaults to
266
267
  "pkcs7".
267
268
  """
@@ -297,11 +298,11 @@ class AuthBackendCert(pulumi.CustomResource):
297
298
  def _internal_init(__self__,
298
299
  resource_name: str,
299
300
  opts: Optional[pulumi.ResourceOptions] = None,
300
- aws_public_cert: Optional[pulumi.Input[str]] = None,
301
- backend: Optional[pulumi.Input[str]] = None,
302
- cert_name: Optional[pulumi.Input[str]] = None,
303
- namespace: Optional[pulumi.Input[str]] = None,
304
- type: Optional[pulumi.Input[str]] = None,
301
+ aws_public_cert: Optional[pulumi.Input[builtins.str]] = None,
302
+ backend: Optional[pulumi.Input[builtins.str]] = None,
303
+ cert_name: Optional[pulumi.Input[builtins.str]] = None,
304
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
305
+ type: Optional[pulumi.Input[builtins.str]] = None,
305
306
  __props__=None):
306
307
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
307
308
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -330,11 +331,11 @@ class AuthBackendCert(pulumi.CustomResource):
330
331
  def get(resource_name: str,
331
332
  id: pulumi.Input[str],
332
333
  opts: Optional[pulumi.ResourceOptions] = None,
333
- aws_public_cert: Optional[pulumi.Input[str]] = None,
334
- backend: Optional[pulumi.Input[str]] = None,
335
- cert_name: Optional[pulumi.Input[str]] = None,
336
- namespace: Optional[pulumi.Input[str]] = None,
337
- type: Optional[pulumi.Input[str]] = None) -> 'AuthBackendCert':
334
+ aws_public_cert: Optional[pulumi.Input[builtins.str]] = None,
335
+ backend: Optional[pulumi.Input[builtins.str]] = None,
336
+ cert_name: Optional[pulumi.Input[builtins.str]] = None,
337
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
338
+ type: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendCert':
338
339
  """
339
340
  Get an existing AuthBackendCert resource's state with the given name, id, and optional extra
340
341
  properties used to qualify the lookup.
@@ -342,18 +343,18 @@ class AuthBackendCert(pulumi.CustomResource):
342
343
  :param str resource_name: The unique name of the resulting resource.
343
344
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
344
345
  :param pulumi.ResourceOptions opts: Options for the resource.
345
- :param pulumi.Input[str] aws_public_cert: The Base64 encoded AWS Public key required to
346
+ :param pulumi.Input[builtins.str] aws_public_cert: The Base64 encoded AWS Public key required to
346
347
  verify PKCS7 signature of the EC2 instance metadata. You can find this key in
347
348
  the [AWS
348
349
  documentation](http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-identity-documents.html).
349
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
350
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
350
351
  mounted at. Defaults to `aws`.
351
- :param pulumi.Input[str] cert_name: The name of the certificate.
352
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
352
+ :param pulumi.Input[builtins.str] cert_name: The name of the certificate.
353
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
353
354
  The value should not contain leading or trailing forward slashes.
354
355
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
355
356
  *Available only for Vault Enterprise*.
356
- :param pulumi.Input[str] type: Either "pkcs7" or "identity", indicating the type of
357
+ :param pulumi.Input[builtins.str] type: Either "pkcs7" or "identity", indicating the type of
357
358
  document which can be verified using the given certificate. Defaults to
358
359
  "pkcs7".
359
360
  """
@@ -370,7 +371,7 @@ class AuthBackendCert(pulumi.CustomResource):
370
371
 
371
372
  @property
372
373
  @pulumi.getter(name="awsPublicCert")
373
- def aws_public_cert(self) -> pulumi.Output[str]:
374
+ def aws_public_cert(self) -> pulumi.Output[builtins.str]:
374
375
  """
375
376
  The Base64 encoded AWS Public key required to
376
377
  verify PKCS7 signature of the EC2 instance metadata. You can find this key in
@@ -381,7 +382,7 @@ class AuthBackendCert(pulumi.CustomResource):
381
382
 
382
383
  @property
383
384
  @pulumi.getter
384
- def backend(self) -> pulumi.Output[Optional[str]]:
385
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
385
386
  """
386
387
  The path the AWS auth backend being configured was
387
388
  mounted at. Defaults to `aws`.
@@ -390,7 +391,7 @@ class AuthBackendCert(pulumi.CustomResource):
390
391
 
391
392
  @property
392
393
  @pulumi.getter(name="certName")
393
- def cert_name(self) -> pulumi.Output[str]:
394
+ def cert_name(self) -> pulumi.Output[builtins.str]:
394
395
  """
395
396
  The name of the certificate.
396
397
  """
@@ -398,7 +399,7 @@ class AuthBackendCert(pulumi.CustomResource):
398
399
 
399
400
  @property
400
401
  @pulumi.getter
401
- def namespace(self) -> pulumi.Output[Optional[str]]:
402
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
402
403
  """
403
404
  The namespace to provision the resource in.
404
405
  The value should not contain leading or trailing forward slashes.
@@ -409,7 +410,7 @@ class AuthBackendCert(pulumi.CustomResource):
409
410
 
410
411
  @property
411
412
  @pulumi.getter
412
- def type(self) -> pulumi.Output[Optional[str]]:
413
+ def type(self) -> pulumi.Output[Optional[builtins.str]]:
413
414
  """
414
415
  Either "pkcs7" or "identity", indicating the type of
415
416
  document which can be verified using the given certificate. Defaults to