pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -21,23 +22,23 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
21
22
  @pulumi.input_type
22
23
  class SecretBackendRoleArgs:
23
24
  def __init__(__self__, *,
24
- backend: pulumi.Input[str],
25
- name: Optional[pulumi.Input[str]] = None,
26
- namespace: Optional[pulumi.Input[str]] = None,
27
- tags: Optional[pulumi.Input[str]] = None,
25
+ backend: pulumi.Input[builtins.str],
26
+ name: Optional[pulumi.Input[builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
28
+ tags: Optional[pulumi.Input[builtins.str]] = None,
28
29
  vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]] = None,
29
30
  vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]] = None):
30
31
  """
31
32
  The set of arguments for constructing a SecretBackendRole resource.
32
- :param pulumi.Input[str] backend: The path the RabbitMQ secret backend is mounted at,
33
+ :param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
33
34
  with no leading or trailing `/`s.
34
- :param pulumi.Input[str] name: The name to identify this role within the backend.
35
+ :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
35
36
  Must be unique within the backend.
36
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
37
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
37
38
  The value should not contain leading or trailing forward slashes.
38
39
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
40
  *Available only for Vault Enterprise*.
40
- :param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
41
+ :param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
41
42
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
42
43
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
43
44
  """
@@ -55,7 +56,7 @@ class SecretBackendRoleArgs:
55
56
 
56
57
  @property
57
58
  @pulumi.getter
58
- def backend(self) -> pulumi.Input[str]:
59
+ def backend(self) -> pulumi.Input[builtins.str]:
59
60
  """
60
61
  The path the RabbitMQ secret backend is mounted at,
61
62
  with no leading or trailing `/`s.
@@ -63,12 +64,12 @@ class SecretBackendRoleArgs:
63
64
  return pulumi.get(self, "backend")
64
65
 
65
66
  @backend.setter
66
- def backend(self, value: pulumi.Input[str]):
67
+ def backend(self, value: pulumi.Input[builtins.str]):
67
68
  pulumi.set(self, "backend", value)
68
69
 
69
70
  @property
70
71
  @pulumi.getter
71
- def name(self) -> Optional[pulumi.Input[str]]:
72
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
72
73
  """
73
74
  The name to identify this role within the backend.
74
75
  Must be unique within the backend.
@@ -76,12 +77,12 @@ class SecretBackendRoleArgs:
76
77
  return pulumi.get(self, "name")
77
78
 
78
79
  @name.setter
79
- def name(self, value: Optional[pulumi.Input[str]]):
80
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
80
81
  pulumi.set(self, "name", value)
81
82
 
82
83
  @property
83
84
  @pulumi.getter
84
- def namespace(self) -> Optional[pulumi.Input[str]]:
85
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
85
86
  """
86
87
  The namespace to provision the resource in.
87
88
  The value should not contain leading or trailing forward slashes.
@@ -91,19 +92,19 @@ class SecretBackendRoleArgs:
91
92
  return pulumi.get(self, "namespace")
92
93
 
93
94
  @namespace.setter
94
- def namespace(self, value: Optional[pulumi.Input[str]]):
95
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
95
96
  pulumi.set(self, "namespace", value)
96
97
 
97
98
  @property
98
99
  @pulumi.getter
99
- def tags(self) -> Optional[pulumi.Input[str]]:
100
+ def tags(self) -> Optional[pulumi.Input[builtins.str]]:
100
101
  """
101
102
  Specifies a comma-separated RabbitMQ management tags.
102
103
  """
103
104
  return pulumi.get(self, "tags")
104
105
 
105
106
  @tags.setter
106
- def tags(self, value: Optional[pulumi.Input[str]]):
107
+ def tags(self, value: Optional[pulumi.Input[builtins.str]]):
107
108
  pulumi.set(self, "tags", value)
108
109
 
109
110
  @property
@@ -134,23 +135,23 @@ class SecretBackendRoleArgs:
134
135
  @pulumi.input_type
135
136
  class _SecretBackendRoleState:
136
137
  def __init__(__self__, *,
137
- backend: Optional[pulumi.Input[str]] = None,
138
- name: Optional[pulumi.Input[str]] = None,
139
- namespace: Optional[pulumi.Input[str]] = None,
140
- tags: Optional[pulumi.Input[str]] = None,
138
+ backend: Optional[pulumi.Input[builtins.str]] = None,
139
+ name: Optional[pulumi.Input[builtins.str]] = None,
140
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
141
+ tags: Optional[pulumi.Input[builtins.str]] = None,
141
142
  vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]] = None,
142
143
  vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]] = None):
143
144
  """
144
145
  Input properties used for looking up and filtering SecretBackendRole resources.
145
- :param pulumi.Input[str] backend: The path the RabbitMQ secret backend is mounted at,
146
+ :param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
146
147
  with no leading or trailing `/`s.
147
- :param pulumi.Input[str] name: The name to identify this role within the backend.
148
+ :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
148
149
  Must be unique within the backend.
149
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
150
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
150
151
  The value should not contain leading or trailing forward slashes.
151
152
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
152
153
  *Available only for Vault Enterprise*.
153
- :param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
154
+ :param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
154
155
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
155
156
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
156
157
  """
@@ -169,7 +170,7 @@ class _SecretBackendRoleState:
169
170
 
170
171
  @property
171
172
  @pulumi.getter
172
- def backend(self) -> Optional[pulumi.Input[str]]:
173
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
173
174
  """
174
175
  The path the RabbitMQ secret backend is mounted at,
175
176
  with no leading or trailing `/`s.
@@ -177,12 +178,12 @@ class _SecretBackendRoleState:
177
178
  return pulumi.get(self, "backend")
178
179
 
179
180
  @backend.setter
180
- def backend(self, value: Optional[pulumi.Input[str]]):
181
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
181
182
  pulumi.set(self, "backend", value)
182
183
 
183
184
  @property
184
185
  @pulumi.getter
185
- def name(self) -> Optional[pulumi.Input[str]]:
186
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
186
187
  """
187
188
  The name to identify this role within the backend.
188
189
  Must be unique within the backend.
@@ -190,12 +191,12 @@ class _SecretBackendRoleState:
190
191
  return pulumi.get(self, "name")
191
192
 
192
193
  @name.setter
193
- def name(self, value: Optional[pulumi.Input[str]]):
194
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
194
195
  pulumi.set(self, "name", value)
195
196
 
196
197
  @property
197
198
  @pulumi.getter
198
- def namespace(self) -> Optional[pulumi.Input[str]]:
199
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
199
200
  """
200
201
  The namespace to provision the resource in.
201
202
  The value should not contain leading or trailing forward slashes.
@@ -205,19 +206,19 @@ class _SecretBackendRoleState:
205
206
  return pulumi.get(self, "namespace")
206
207
 
207
208
  @namespace.setter
208
- def namespace(self, value: Optional[pulumi.Input[str]]):
209
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
209
210
  pulumi.set(self, "namespace", value)
210
211
 
211
212
  @property
212
213
  @pulumi.getter
213
- def tags(self) -> Optional[pulumi.Input[str]]:
214
+ def tags(self) -> Optional[pulumi.Input[builtins.str]]:
214
215
  """
215
216
  Specifies a comma-separated RabbitMQ management tags.
216
217
  """
217
218
  return pulumi.get(self, "tags")
218
219
 
219
220
  @tags.setter
220
- def tags(self, value: Optional[pulumi.Input[str]]):
221
+ def tags(self, value: Optional[pulumi.Input[builtins.str]]):
221
222
  pulumi.set(self, "tags", value)
222
223
 
223
224
  @property
@@ -250,10 +251,10 @@ class SecretBackendRole(pulumi.CustomResource):
250
251
  def __init__(__self__,
251
252
  resource_name: str,
252
253
  opts: Optional[pulumi.ResourceOptions] = None,
253
- backend: Optional[pulumi.Input[str]] = None,
254
- name: Optional[pulumi.Input[str]] = None,
255
- namespace: Optional[pulumi.Input[str]] = None,
256
- tags: Optional[pulumi.Input[str]] = None,
254
+ backend: Optional[pulumi.Input[builtins.str]] = None,
255
+ name: Optional[pulumi.Input[builtins.str]] = None,
256
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
257
+ tags: Optional[pulumi.Input[builtins.str]] = None,
257
258
  vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
258
259
  vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
259
260
  __props__=None):
@@ -298,15 +299,15 @@ class SecretBackendRole(pulumi.CustomResource):
298
299
 
299
300
  :param str resource_name: The name of the resource.
300
301
  :param pulumi.ResourceOptions opts: Options for the resource.
301
- :param pulumi.Input[str] backend: The path the RabbitMQ secret backend is mounted at,
302
+ :param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
302
303
  with no leading or trailing `/`s.
303
- :param pulumi.Input[str] name: The name to identify this role within the backend.
304
+ :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
304
305
  Must be unique within the backend.
305
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
306
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
306
307
  The value should not contain leading or trailing forward slashes.
307
308
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
308
309
  *Available only for Vault Enterprise*.
309
- :param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
310
+ :param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
310
311
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
311
312
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
312
313
  """
@@ -370,10 +371,10 @@ class SecretBackendRole(pulumi.CustomResource):
370
371
  def _internal_init(__self__,
371
372
  resource_name: str,
372
373
  opts: Optional[pulumi.ResourceOptions] = None,
373
- backend: Optional[pulumi.Input[str]] = None,
374
- name: Optional[pulumi.Input[str]] = None,
375
- namespace: Optional[pulumi.Input[str]] = None,
376
- tags: Optional[pulumi.Input[str]] = None,
374
+ backend: Optional[pulumi.Input[builtins.str]] = None,
375
+ name: Optional[pulumi.Input[builtins.str]] = None,
376
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
377
+ tags: Optional[pulumi.Input[builtins.str]] = None,
377
378
  vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
378
379
  vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
379
380
  __props__=None):
@@ -403,10 +404,10 @@ class SecretBackendRole(pulumi.CustomResource):
403
404
  def get(resource_name: str,
404
405
  id: pulumi.Input[str],
405
406
  opts: Optional[pulumi.ResourceOptions] = None,
406
- backend: Optional[pulumi.Input[str]] = None,
407
- name: Optional[pulumi.Input[str]] = None,
408
- namespace: Optional[pulumi.Input[str]] = None,
409
- tags: Optional[pulumi.Input[str]] = None,
407
+ backend: Optional[pulumi.Input[builtins.str]] = None,
408
+ name: Optional[pulumi.Input[builtins.str]] = None,
409
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
410
+ tags: Optional[pulumi.Input[builtins.str]] = None,
410
411
  vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
411
412
  vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None) -> 'SecretBackendRole':
412
413
  """
@@ -416,15 +417,15 @@ class SecretBackendRole(pulumi.CustomResource):
416
417
  :param str resource_name: The unique name of the resulting resource.
417
418
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
418
419
  :param pulumi.ResourceOptions opts: Options for the resource.
419
- :param pulumi.Input[str] backend: The path the RabbitMQ secret backend is mounted at,
420
+ :param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
420
421
  with no leading or trailing `/`s.
421
- :param pulumi.Input[str] name: The name to identify this role within the backend.
422
+ :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
422
423
  Must be unique within the backend.
423
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
424
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
424
425
  The value should not contain leading or trailing forward slashes.
425
426
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
426
427
  *Available only for Vault Enterprise*.
427
- :param pulumi.Input[str] tags: Specifies a comma-separated RabbitMQ management tags.
428
+ :param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
428
429
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
429
430
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
430
431
  """
@@ -442,7 +443,7 @@ class SecretBackendRole(pulumi.CustomResource):
442
443
 
443
444
  @property
444
445
  @pulumi.getter
445
- def backend(self) -> pulumi.Output[str]:
446
+ def backend(self) -> pulumi.Output[builtins.str]:
446
447
  """
447
448
  The path the RabbitMQ secret backend is mounted at,
448
449
  with no leading or trailing `/`s.
@@ -451,7 +452,7 @@ class SecretBackendRole(pulumi.CustomResource):
451
452
 
452
453
  @property
453
454
  @pulumi.getter
454
- def name(self) -> pulumi.Output[str]:
455
+ def name(self) -> pulumi.Output[builtins.str]:
455
456
  """
456
457
  The name to identify this role within the backend.
457
458
  Must be unique within the backend.
@@ -460,7 +461,7 @@ class SecretBackendRole(pulumi.CustomResource):
460
461
 
461
462
  @property
462
463
  @pulumi.getter
463
- def namespace(self) -> pulumi.Output[Optional[str]]:
464
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
464
465
  """
465
466
  The namespace to provision the resource in.
466
467
  The value should not contain leading or trailing forward slashes.
@@ -471,7 +472,7 @@ class SecretBackendRole(pulumi.CustomResource):
471
472
 
472
473
  @property
473
474
  @pulumi.getter
474
- def tags(self) -> pulumi.Output[Optional[str]]:
475
+ def tags(self) -> pulumi.Output[Optional[builtins.str]]:
475
476
  """
476
477
  Specifies a comma-separated RabbitMQ management tags.
477
478
  """