pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,16 +20,16 @@ __all__ = ['RgpPolicyArgs', 'RgpPolicy']
19
20
  @pulumi.input_type
20
21
  class RgpPolicyArgs:
21
22
  def __init__(__self__, *,
22
- enforcement_level: pulumi.Input[str],
23
- policy: pulumi.Input[str],
24
- name: Optional[pulumi.Input[str]] = None,
25
- namespace: Optional[pulumi.Input[str]] = None):
23
+ enforcement_level: pulumi.Input[builtins.str],
24
+ policy: pulumi.Input[builtins.str],
25
+ name: Optional[pulumi.Input[builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
26
27
  """
27
28
  The set of arguments for constructing a RgpPolicy resource.
28
- :param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
29
- :param pulumi.Input[str] policy: String containing a Sentinel policy
30
- :param pulumi.Input[str] name: The name of the policy
31
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
+ :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
30
+ :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
31
+ :param pulumi.Input[builtins.str] name: The name of the policy
32
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
32
33
  The value should not contain leading or trailing forward slashes.
33
34
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
35
  *Available only for Vault Enterprise*.
@@ -42,43 +43,43 @@ class RgpPolicyArgs:
42
43
 
43
44
  @property
44
45
  @pulumi.getter(name="enforcementLevel")
45
- def enforcement_level(self) -> pulumi.Input[str]:
46
+ def enforcement_level(self) -> pulumi.Input[builtins.str]:
46
47
  """
47
48
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
48
49
  """
49
50
  return pulumi.get(self, "enforcement_level")
50
51
 
51
52
  @enforcement_level.setter
52
- def enforcement_level(self, value: pulumi.Input[str]):
53
+ def enforcement_level(self, value: pulumi.Input[builtins.str]):
53
54
  pulumi.set(self, "enforcement_level", value)
54
55
 
55
56
  @property
56
57
  @pulumi.getter
57
- def policy(self) -> pulumi.Input[str]:
58
+ def policy(self) -> pulumi.Input[builtins.str]:
58
59
  """
59
60
  String containing a Sentinel policy
60
61
  """
61
62
  return pulumi.get(self, "policy")
62
63
 
63
64
  @policy.setter
64
- def policy(self, value: pulumi.Input[str]):
65
+ def policy(self, value: pulumi.Input[builtins.str]):
65
66
  pulumi.set(self, "policy", value)
66
67
 
67
68
  @property
68
69
  @pulumi.getter
69
- def name(self) -> Optional[pulumi.Input[str]]:
70
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
70
71
  """
71
72
  The name of the policy
72
73
  """
73
74
  return pulumi.get(self, "name")
74
75
 
75
76
  @name.setter
76
- def name(self, value: Optional[pulumi.Input[str]]):
77
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
77
78
  pulumi.set(self, "name", value)
78
79
 
79
80
  @property
80
81
  @pulumi.getter
81
- def namespace(self) -> Optional[pulumi.Input[str]]:
82
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
82
83
  """
83
84
  The namespace to provision the resource in.
84
85
  The value should not contain leading or trailing forward slashes.
@@ -88,26 +89,26 @@ class RgpPolicyArgs:
88
89
  return pulumi.get(self, "namespace")
89
90
 
90
91
  @namespace.setter
91
- def namespace(self, value: Optional[pulumi.Input[str]]):
92
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
92
93
  pulumi.set(self, "namespace", value)
93
94
 
94
95
 
95
96
  @pulumi.input_type
96
97
  class _RgpPolicyState:
97
98
  def __init__(__self__, *,
98
- enforcement_level: Optional[pulumi.Input[str]] = None,
99
- name: Optional[pulumi.Input[str]] = None,
100
- namespace: Optional[pulumi.Input[str]] = None,
101
- policy: Optional[pulumi.Input[str]] = None):
99
+ enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
100
+ name: Optional[pulumi.Input[builtins.str]] = None,
101
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
102
+ policy: Optional[pulumi.Input[builtins.str]] = None):
102
103
  """
103
104
  Input properties used for looking up and filtering RgpPolicy resources.
104
- :param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
105
- :param pulumi.Input[str] name: The name of the policy
106
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
105
+ :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
106
+ :param pulumi.Input[builtins.str] name: The name of the policy
107
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
107
108
  The value should not contain leading or trailing forward slashes.
108
109
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
109
110
  *Available only for Vault Enterprise*.
110
- :param pulumi.Input[str] policy: String containing a Sentinel policy
111
+ :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
111
112
  """
112
113
  if enforcement_level is not None:
113
114
  pulumi.set(__self__, "enforcement_level", enforcement_level)
@@ -120,31 +121,31 @@ class _RgpPolicyState:
120
121
 
121
122
  @property
122
123
  @pulumi.getter(name="enforcementLevel")
123
- def enforcement_level(self) -> Optional[pulumi.Input[str]]:
124
+ def enforcement_level(self) -> Optional[pulumi.Input[builtins.str]]:
124
125
  """
125
126
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
126
127
  """
127
128
  return pulumi.get(self, "enforcement_level")
128
129
 
129
130
  @enforcement_level.setter
130
- def enforcement_level(self, value: Optional[pulumi.Input[str]]):
131
+ def enforcement_level(self, value: Optional[pulumi.Input[builtins.str]]):
131
132
  pulumi.set(self, "enforcement_level", value)
132
133
 
133
134
  @property
134
135
  @pulumi.getter
135
- def name(self) -> Optional[pulumi.Input[str]]:
136
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
136
137
  """
137
138
  The name of the policy
138
139
  """
139
140
  return pulumi.get(self, "name")
140
141
 
141
142
  @name.setter
142
- def name(self, value: Optional[pulumi.Input[str]]):
143
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
143
144
  pulumi.set(self, "name", value)
144
145
 
145
146
  @property
146
147
  @pulumi.getter
147
- def namespace(self) -> Optional[pulumi.Input[str]]:
148
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
148
149
  """
149
150
  The namespace to provision the resource in.
150
151
  The value should not contain leading or trailing forward slashes.
@@ -154,19 +155,19 @@ class _RgpPolicyState:
154
155
  return pulumi.get(self, "namespace")
155
156
 
156
157
  @namespace.setter
157
- def namespace(self, value: Optional[pulumi.Input[str]]):
158
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
158
159
  pulumi.set(self, "namespace", value)
159
160
 
160
161
  @property
161
162
  @pulumi.getter
162
- def policy(self) -> Optional[pulumi.Input[str]]:
163
+ def policy(self) -> Optional[pulumi.Input[builtins.str]]:
163
164
  """
164
165
  String containing a Sentinel policy
165
166
  """
166
167
  return pulumi.get(self, "policy")
167
168
 
168
169
  @policy.setter
169
- def policy(self, value: Optional[pulumi.Input[str]]):
170
+ def policy(self, value: Optional[pulumi.Input[builtins.str]]):
170
171
  pulumi.set(self, "policy", value)
171
172
 
172
173
 
@@ -175,10 +176,10 @@ class RgpPolicy(pulumi.CustomResource):
175
176
  def __init__(__self__,
176
177
  resource_name: str,
177
178
  opts: Optional[pulumi.ResourceOptions] = None,
178
- enforcement_level: Optional[pulumi.Input[str]] = None,
179
- name: Optional[pulumi.Input[str]] = None,
180
- namespace: Optional[pulumi.Input[str]] = None,
181
- policy: Optional[pulumi.Input[str]] = None,
179
+ enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
180
+ name: Optional[pulumi.Input[builtins.str]] = None,
181
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
182
+ policy: Optional[pulumi.Input[builtins.str]] = None,
182
183
  __props__=None):
183
184
  """
184
185
  Provides a resource to manage Role Governing Policy (RGP) via [Sentinel](https://www.vaultproject.io/docs/enterprise/sentinel/index.html).
@@ -202,13 +203,13 @@ class RgpPolicy(pulumi.CustomResource):
202
203
 
203
204
  :param str resource_name: The name of the resource.
204
205
  :param pulumi.ResourceOptions opts: Options for the resource.
205
- :param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
206
- :param pulumi.Input[str] name: The name of the policy
207
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
206
+ :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
207
+ :param pulumi.Input[builtins.str] name: The name of the policy
208
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
208
209
  The value should not contain leading or trailing forward slashes.
209
210
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
210
211
  *Available only for Vault Enterprise*.
211
- :param pulumi.Input[str] policy: String containing a Sentinel policy
212
+ :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
212
213
  """
213
214
  ...
214
215
  @overload
@@ -251,10 +252,10 @@ class RgpPolicy(pulumi.CustomResource):
251
252
  def _internal_init(__self__,
252
253
  resource_name: str,
253
254
  opts: Optional[pulumi.ResourceOptions] = None,
254
- enforcement_level: Optional[pulumi.Input[str]] = None,
255
- name: Optional[pulumi.Input[str]] = None,
256
- namespace: Optional[pulumi.Input[str]] = None,
257
- policy: Optional[pulumi.Input[str]] = None,
255
+ enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
256
+ name: Optional[pulumi.Input[builtins.str]] = None,
257
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
258
+ policy: Optional[pulumi.Input[builtins.str]] = None,
258
259
  __props__=None):
259
260
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
260
261
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -282,10 +283,10 @@ class RgpPolicy(pulumi.CustomResource):
282
283
  def get(resource_name: str,
283
284
  id: pulumi.Input[str],
284
285
  opts: Optional[pulumi.ResourceOptions] = None,
285
- enforcement_level: Optional[pulumi.Input[str]] = None,
286
- name: Optional[pulumi.Input[str]] = None,
287
- namespace: Optional[pulumi.Input[str]] = None,
288
- policy: Optional[pulumi.Input[str]] = None) -> 'RgpPolicy':
286
+ enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
287
+ name: Optional[pulumi.Input[builtins.str]] = None,
288
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
289
+ policy: Optional[pulumi.Input[builtins.str]] = None) -> 'RgpPolicy':
289
290
  """
290
291
  Get an existing RgpPolicy resource's state with the given name, id, and optional extra
291
292
  properties used to qualify the lookup.
@@ -293,13 +294,13 @@ class RgpPolicy(pulumi.CustomResource):
293
294
  :param str resource_name: The unique name of the resulting resource.
294
295
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
295
296
  :param pulumi.ResourceOptions opts: Options for the resource.
296
- :param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
297
- :param pulumi.Input[str] name: The name of the policy
298
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
297
+ :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
298
+ :param pulumi.Input[builtins.str] name: The name of the policy
299
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
299
300
  The value should not contain leading or trailing forward slashes.
300
301
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
301
302
  *Available only for Vault Enterprise*.
302
- :param pulumi.Input[str] policy: String containing a Sentinel policy
303
+ :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
303
304
  """
304
305
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
305
306
 
@@ -313,7 +314,7 @@ class RgpPolicy(pulumi.CustomResource):
313
314
 
314
315
  @property
315
316
  @pulumi.getter(name="enforcementLevel")
316
- def enforcement_level(self) -> pulumi.Output[str]:
317
+ def enforcement_level(self) -> pulumi.Output[builtins.str]:
317
318
  """
318
319
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
319
320
  """
@@ -321,7 +322,7 @@ class RgpPolicy(pulumi.CustomResource):
321
322
 
322
323
  @property
323
324
  @pulumi.getter
324
- def name(self) -> pulumi.Output[str]:
325
+ def name(self) -> pulumi.Output[builtins.str]:
325
326
  """
326
327
  The name of the policy
327
328
  """
@@ -329,7 +330,7 @@ class RgpPolicy(pulumi.CustomResource):
329
330
 
330
331
  @property
331
332
  @pulumi.getter
332
- def namespace(self) -> pulumi.Output[Optional[str]]:
333
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
333
334
  """
334
335
  The namespace to provision the resource in.
335
336
  The value should not contain leading or trailing forward slashes.
@@ -340,7 +341,7 @@ class RgpPolicy(pulumi.CustomResource):
340
341
 
341
342
  @property
342
343
  @pulumi.getter
343
- def policy(self) -> pulumi.Output[str]:
344
+ def policy(self) -> pulumi.Output[builtins.str]:
344
345
  """
345
346
  String containing a Sentinel policy
346
347
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members: