pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,20 +20,20 @@ __all__ = ['AuthBackendStsRoleArgs', 'AuthBackendStsRole']
19
20
  @pulumi.input_type
20
21
  class AuthBackendStsRoleArgs:
21
22
  def __init__(__self__, *,
22
- account_id: pulumi.Input[str],
23
- sts_role: pulumi.Input[str],
24
- backend: Optional[pulumi.Input[str]] = None,
25
- external_id: Optional[pulumi.Input[str]] = None,
26
- namespace: Optional[pulumi.Input[str]] = None):
23
+ account_id: pulumi.Input[builtins.str],
24
+ sts_role: pulumi.Input[builtins.str],
25
+ backend: Optional[pulumi.Input[builtins.str]] = None,
26
+ external_id: Optional[pulumi.Input[builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
27
28
  """
28
29
  The set of arguments for constructing a AuthBackendStsRole resource.
29
- :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
30
- :param pulumi.Input[str] sts_role: The STS role to assume when verifying requests made
30
+ :param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
31
+ :param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
31
32
  by EC2 instances in the account specified by `account_id`.
32
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
33
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
33
34
  mounted at. Defaults to `aws`.
34
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
35
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
35
+ :param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
36
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
36
37
  The value should not contain leading or trailing forward slashes.
37
38
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
39
  *Available only for Vault Enterprise*.
@@ -48,19 +49,19 @@ class AuthBackendStsRoleArgs:
48
49
 
49
50
  @property
50
51
  @pulumi.getter(name="accountId")
51
- def account_id(self) -> pulumi.Input[str]:
52
+ def account_id(self) -> pulumi.Input[builtins.str]:
52
53
  """
53
54
  The AWS account ID to configure the STS role for.
54
55
  """
55
56
  return pulumi.get(self, "account_id")
56
57
 
57
58
  @account_id.setter
58
- def account_id(self, value: pulumi.Input[str]):
59
+ def account_id(self, value: pulumi.Input[builtins.str]):
59
60
  pulumi.set(self, "account_id", value)
60
61
 
61
62
  @property
62
63
  @pulumi.getter(name="stsRole")
63
- def sts_role(self) -> pulumi.Input[str]:
64
+ def sts_role(self) -> pulumi.Input[builtins.str]:
64
65
  """
65
66
  The STS role to assume when verifying requests made
66
67
  by EC2 instances in the account specified by `account_id`.
@@ -68,12 +69,12 @@ class AuthBackendStsRoleArgs:
68
69
  return pulumi.get(self, "sts_role")
69
70
 
70
71
  @sts_role.setter
71
- def sts_role(self, value: pulumi.Input[str]):
72
+ def sts_role(self, value: pulumi.Input[builtins.str]):
72
73
  pulumi.set(self, "sts_role", value)
73
74
 
74
75
  @property
75
76
  @pulumi.getter
76
- def backend(self) -> Optional[pulumi.Input[str]]:
77
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
77
78
  """
78
79
  The path the AWS auth backend being configured was
79
80
  mounted at. Defaults to `aws`.
@@ -81,24 +82,24 @@ class AuthBackendStsRoleArgs:
81
82
  return pulumi.get(self, "backend")
82
83
 
83
84
  @backend.setter
84
- def backend(self, value: Optional[pulumi.Input[str]]):
85
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
85
86
  pulumi.set(self, "backend", value)
86
87
 
87
88
  @property
88
89
  @pulumi.getter(name="externalId")
89
- def external_id(self) -> Optional[pulumi.Input[str]]:
90
+ def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
90
91
  """
91
92
  External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
92
93
  """
93
94
  return pulumi.get(self, "external_id")
94
95
 
95
96
  @external_id.setter
96
- def external_id(self, value: Optional[pulumi.Input[str]]):
97
+ def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
97
98
  pulumi.set(self, "external_id", value)
98
99
 
99
100
  @property
100
101
  @pulumi.getter
101
- def namespace(self) -> Optional[pulumi.Input[str]]:
102
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
102
103
  """
103
104
  The namespace to provision the resource in.
104
105
  The value should not contain leading or trailing forward slashes.
@@ -108,29 +109,29 @@ class AuthBackendStsRoleArgs:
108
109
  return pulumi.get(self, "namespace")
109
110
 
110
111
  @namespace.setter
111
- def namespace(self, value: Optional[pulumi.Input[str]]):
112
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
112
113
  pulumi.set(self, "namespace", value)
113
114
 
114
115
 
115
116
  @pulumi.input_type
116
117
  class _AuthBackendStsRoleState:
117
118
  def __init__(__self__, *,
118
- account_id: Optional[pulumi.Input[str]] = None,
119
- backend: Optional[pulumi.Input[str]] = None,
120
- external_id: Optional[pulumi.Input[str]] = None,
121
- namespace: Optional[pulumi.Input[str]] = None,
122
- sts_role: Optional[pulumi.Input[str]] = None):
119
+ account_id: Optional[pulumi.Input[builtins.str]] = None,
120
+ backend: Optional[pulumi.Input[builtins.str]] = None,
121
+ external_id: Optional[pulumi.Input[builtins.str]] = None,
122
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
123
+ sts_role: Optional[pulumi.Input[builtins.str]] = None):
123
124
  """
124
125
  Input properties used for looking up and filtering AuthBackendStsRole resources.
125
- :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
126
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
126
+ :param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
127
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
127
128
  mounted at. Defaults to `aws`.
128
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
129
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
129
+ :param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
130
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
130
131
  The value should not contain leading or trailing forward slashes.
131
132
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
132
133
  *Available only for Vault Enterprise*.
133
- :param pulumi.Input[str] sts_role: The STS role to assume when verifying requests made
134
+ :param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
134
135
  by EC2 instances in the account specified by `account_id`.
135
136
  """
136
137
  if account_id is not None:
@@ -146,19 +147,19 @@ class _AuthBackendStsRoleState:
146
147
 
147
148
  @property
148
149
  @pulumi.getter(name="accountId")
149
- def account_id(self) -> Optional[pulumi.Input[str]]:
150
+ def account_id(self) -> Optional[pulumi.Input[builtins.str]]:
150
151
  """
151
152
  The AWS account ID to configure the STS role for.
152
153
  """
153
154
  return pulumi.get(self, "account_id")
154
155
 
155
156
  @account_id.setter
156
- def account_id(self, value: Optional[pulumi.Input[str]]):
157
+ def account_id(self, value: Optional[pulumi.Input[builtins.str]]):
157
158
  pulumi.set(self, "account_id", value)
158
159
 
159
160
  @property
160
161
  @pulumi.getter
161
- def backend(self) -> Optional[pulumi.Input[str]]:
162
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
162
163
  """
163
164
  The path the AWS auth backend being configured was
164
165
  mounted at. Defaults to `aws`.
@@ -166,24 +167,24 @@ class _AuthBackendStsRoleState:
166
167
  return pulumi.get(self, "backend")
167
168
 
168
169
  @backend.setter
169
- def backend(self, value: Optional[pulumi.Input[str]]):
170
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
170
171
  pulumi.set(self, "backend", value)
171
172
 
172
173
  @property
173
174
  @pulumi.getter(name="externalId")
174
- def external_id(self) -> Optional[pulumi.Input[str]]:
175
+ def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
175
176
  """
176
177
  External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
177
178
  """
178
179
  return pulumi.get(self, "external_id")
179
180
 
180
181
  @external_id.setter
181
- def external_id(self, value: Optional[pulumi.Input[str]]):
182
+ def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
182
183
  pulumi.set(self, "external_id", value)
183
184
 
184
185
  @property
185
186
  @pulumi.getter
186
- def namespace(self) -> Optional[pulumi.Input[str]]:
187
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
187
188
  """
188
189
  The namespace to provision the resource in.
189
190
  The value should not contain leading or trailing forward slashes.
@@ -193,12 +194,12 @@ class _AuthBackendStsRoleState:
193
194
  return pulumi.get(self, "namespace")
194
195
 
195
196
  @namespace.setter
196
- def namespace(self, value: Optional[pulumi.Input[str]]):
197
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
197
198
  pulumi.set(self, "namespace", value)
198
199
 
199
200
  @property
200
201
  @pulumi.getter(name="stsRole")
201
- def sts_role(self) -> Optional[pulumi.Input[str]]:
202
+ def sts_role(self) -> Optional[pulumi.Input[builtins.str]]:
202
203
  """
203
204
  The STS role to assume when verifying requests made
204
205
  by EC2 instances in the account specified by `account_id`.
@@ -206,7 +207,7 @@ class _AuthBackendStsRoleState:
206
207
  return pulumi.get(self, "sts_role")
207
208
 
208
209
  @sts_role.setter
209
- def sts_role(self, value: Optional[pulumi.Input[str]]):
210
+ def sts_role(self, value: Optional[pulumi.Input[builtins.str]]):
210
211
  pulumi.set(self, "sts_role", value)
211
212
 
212
213
 
@@ -215,11 +216,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
215
216
  def __init__(__self__,
216
217
  resource_name: str,
217
218
  opts: Optional[pulumi.ResourceOptions] = None,
218
- account_id: Optional[pulumi.Input[str]] = None,
219
- backend: Optional[pulumi.Input[str]] = None,
220
- external_id: Optional[pulumi.Input[str]] = None,
221
- namespace: Optional[pulumi.Input[str]] = None,
222
- sts_role: Optional[pulumi.Input[str]] = None,
219
+ account_id: Optional[pulumi.Input[builtins.str]] = None,
220
+ backend: Optional[pulumi.Input[builtins.str]] = None,
221
+ external_id: Optional[pulumi.Input[builtins.str]] = None,
222
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
223
+ sts_role: Optional[pulumi.Input[builtins.str]] = None,
223
224
  __props__=None):
224
225
  """
225
226
  ## Example Usage
@@ -245,15 +246,15 @@ class AuthBackendStsRole(pulumi.CustomResource):
245
246
 
246
247
  :param str resource_name: The name of the resource.
247
248
  :param pulumi.ResourceOptions opts: Options for the resource.
248
- :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
249
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
249
+ :param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
250
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
250
251
  mounted at. Defaults to `aws`.
251
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
252
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
252
+ :param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
253
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
253
254
  The value should not contain leading or trailing forward slashes.
254
255
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
255
256
  *Available only for Vault Enterprise*.
256
- :param pulumi.Input[str] sts_role: The STS role to assume when verifying requests made
257
+ :param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
257
258
  by EC2 instances in the account specified by `account_id`.
258
259
  """
259
260
  ...
@@ -299,11 +300,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
299
300
  def _internal_init(__self__,
300
301
  resource_name: str,
301
302
  opts: Optional[pulumi.ResourceOptions] = None,
302
- account_id: Optional[pulumi.Input[str]] = None,
303
- backend: Optional[pulumi.Input[str]] = None,
304
- external_id: Optional[pulumi.Input[str]] = None,
305
- namespace: Optional[pulumi.Input[str]] = None,
306
- sts_role: Optional[pulumi.Input[str]] = None,
303
+ account_id: Optional[pulumi.Input[builtins.str]] = None,
304
+ backend: Optional[pulumi.Input[builtins.str]] = None,
305
+ external_id: Optional[pulumi.Input[builtins.str]] = None,
306
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
307
+ sts_role: Optional[pulumi.Input[builtins.str]] = None,
307
308
  __props__=None):
308
309
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
309
310
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -332,11 +333,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
332
333
  def get(resource_name: str,
333
334
  id: pulumi.Input[str],
334
335
  opts: Optional[pulumi.ResourceOptions] = None,
335
- account_id: Optional[pulumi.Input[str]] = None,
336
- backend: Optional[pulumi.Input[str]] = None,
337
- external_id: Optional[pulumi.Input[str]] = None,
338
- namespace: Optional[pulumi.Input[str]] = None,
339
- sts_role: Optional[pulumi.Input[str]] = None) -> 'AuthBackendStsRole':
336
+ account_id: Optional[pulumi.Input[builtins.str]] = None,
337
+ backend: Optional[pulumi.Input[builtins.str]] = None,
338
+ external_id: Optional[pulumi.Input[builtins.str]] = None,
339
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
340
+ sts_role: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendStsRole':
340
341
  """
341
342
  Get an existing AuthBackendStsRole resource's state with the given name, id, and optional extra
342
343
  properties used to qualify the lookup.
@@ -344,15 +345,15 @@ class AuthBackendStsRole(pulumi.CustomResource):
344
345
  :param str resource_name: The unique name of the resulting resource.
345
346
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
346
347
  :param pulumi.ResourceOptions opts: Options for the resource.
347
- :param pulumi.Input[str] account_id: The AWS account ID to configure the STS role for.
348
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
348
+ :param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
349
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
349
350
  mounted at. Defaults to `aws`.
350
- :param pulumi.Input[str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
351
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
351
+ :param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
352
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
352
353
  The value should not contain leading or trailing forward slashes.
353
354
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
354
355
  *Available only for Vault Enterprise*.
355
- :param pulumi.Input[str] sts_role: The STS role to assume when verifying requests made
356
+ :param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
356
357
  by EC2 instances in the account specified by `account_id`.
357
358
  """
358
359
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -368,7 +369,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
368
369
 
369
370
  @property
370
371
  @pulumi.getter(name="accountId")
371
- def account_id(self) -> pulumi.Output[str]:
372
+ def account_id(self) -> pulumi.Output[builtins.str]:
372
373
  """
373
374
  The AWS account ID to configure the STS role for.
374
375
  """
@@ -376,7 +377,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
376
377
 
377
378
  @property
378
379
  @pulumi.getter
379
- def backend(self) -> pulumi.Output[Optional[str]]:
380
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
380
381
  """
381
382
  The path the AWS auth backend being configured was
382
383
  mounted at. Defaults to `aws`.
@@ -385,7 +386,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
385
386
 
386
387
  @property
387
388
  @pulumi.getter(name="externalId")
388
- def external_id(self) -> pulumi.Output[Optional[str]]:
389
+ def external_id(self) -> pulumi.Output[Optional[builtins.str]]:
389
390
  """
390
391
  External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
391
392
  """
@@ -393,7 +394,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
393
394
 
394
395
  @property
395
396
  @pulumi.getter
396
- def namespace(self) -> pulumi.Output[Optional[str]]:
397
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
397
398
  """
398
399
  The namespace to provision the resource in.
399
400
  The value should not contain leading or trailing forward slashes.
@@ -404,7 +405,7 @@ class AuthBackendStsRole(pulumi.CustomResource):
404
405
 
405
406
  @property
406
407
  @pulumi.getter(name="stsRole")
407
- def sts_role(self) -> pulumi.Output[str]:
408
+ def sts_role(self) -> pulumi.Output[builtins.str]:
408
409
  """
409
410
  The STS role to assume when verifying requests made
410
411
  by EC2 instances in the account specified by `account_id`.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -75,7 +76,7 @@ class GetAccessCredentialsResult:
75
76
 
76
77
  @property
77
78
  @pulumi.getter(name="accessKey")
78
- def access_key(self) -> str:
79
+ def access_key(self) -> builtins.str:
79
80
  """
80
81
  The AWS Access Key ID returned by Vault.
81
82
  """
@@ -83,12 +84,12 @@ class GetAccessCredentialsResult:
83
84
 
84
85
  @property
85
86
  @pulumi.getter
86
- def backend(self) -> str:
87
+ def backend(self) -> builtins.str:
87
88
  return pulumi.get(self, "backend")
88
89
 
89
90
  @property
90
91
  @pulumi.getter
91
- def id(self) -> str:
92
+ def id(self) -> builtins.str:
92
93
  """
93
94
  The provider-assigned unique ID for this managed resource.
94
95
  """
@@ -96,7 +97,7 @@ class GetAccessCredentialsResult:
96
97
 
97
98
  @property
98
99
  @pulumi.getter(name="leaseDuration")
99
- def lease_duration(self) -> int:
100
+ def lease_duration(self) -> builtins.int:
100
101
  """
101
102
  The duration of the secret lease, in seconds relative
102
103
  to the time the data was requested. Once this time has passed any plan
@@ -106,7 +107,7 @@ class GetAccessCredentialsResult:
106
107
 
107
108
  @property
108
109
  @pulumi.getter(name="leaseId")
109
- def lease_id(self) -> str:
110
+ def lease_id(self) -> builtins.str:
110
111
  """
111
112
  The lease identifier assigned by Vault.
112
113
  """
@@ -114,37 +115,37 @@ class GetAccessCredentialsResult:
114
115
 
115
116
  @property
116
117
  @pulumi.getter(name="leaseRenewable")
117
- def lease_renewable(self) -> bool:
118
+ def lease_renewable(self) -> builtins.bool:
118
119
  return pulumi.get(self, "lease_renewable")
119
120
 
120
121
  @property
121
122
  @pulumi.getter(name="leaseStartTime")
122
- def lease_start_time(self) -> str:
123
+ def lease_start_time(self) -> builtins.str:
123
124
  return pulumi.get(self, "lease_start_time")
124
125
 
125
126
  @property
126
127
  @pulumi.getter
127
- def namespace(self) -> Optional[str]:
128
+ def namespace(self) -> Optional[builtins.str]:
128
129
  return pulumi.get(self, "namespace")
129
130
 
130
131
  @property
131
132
  @pulumi.getter
132
- def region(self) -> Optional[str]:
133
+ def region(self) -> Optional[builtins.str]:
133
134
  return pulumi.get(self, "region")
134
135
 
135
136
  @property
136
137
  @pulumi.getter
137
- def role(self) -> str:
138
+ def role(self) -> builtins.str:
138
139
  return pulumi.get(self, "role")
139
140
 
140
141
  @property
141
142
  @pulumi.getter(name="roleArn")
142
- def role_arn(self) -> Optional[str]:
143
+ def role_arn(self) -> Optional[builtins.str]:
143
144
  return pulumi.get(self, "role_arn")
144
145
 
145
146
  @property
146
147
  @pulumi.getter(name="secretKey")
147
- def secret_key(self) -> str:
148
+ def secret_key(self) -> builtins.str:
148
149
  """
149
150
  The AWS Secret Key returned by Vault.
150
151
  """
@@ -152,7 +153,7 @@ class GetAccessCredentialsResult:
152
153
 
153
154
  @property
154
155
  @pulumi.getter(name="securityToken")
155
- def security_token(self) -> str:
156
+ def security_token(self) -> builtins.str:
156
157
  """
157
158
  The STS token returned by Vault, if any.
158
159
  """
@@ -160,12 +161,12 @@ class GetAccessCredentialsResult:
160
161
 
161
162
  @property
162
163
  @pulumi.getter
163
- def ttl(self) -> Optional[str]:
164
+ def ttl(self) -> Optional[builtins.str]:
164
165
  return pulumi.get(self, "ttl")
165
166
 
166
167
  @property
167
168
  @pulumi.getter
168
- def type(self) -> Optional[str]:
169
+ def type(self) -> Optional[builtins.str]:
169
170
  return pulumi.get(self, "type")
170
171
 
171
172
 
@@ -192,34 +193,34 @@ class AwaitableGetAccessCredentialsResult(GetAccessCredentialsResult):
192
193
  type=self.type)
193
194
 
194
195
 
195
- def get_access_credentials(backend: Optional[str] = None,
196
- namespace: Optional[str] = None,
197
- region: Optional[str] = None,
198
- role: Optional[str] = None,
199
- role_arn: Optional[str] = None,
200
- ttl: Optional[str] = None,
201
- type: Optional[str] = None,
196
+ def get_access_credentials(backend: Optional[builtins.str] = None,
197
+ namespace: Optional[builtins.str] = None,
198
+ region: Optional[builtins.str] = None,
199
+ role: Optional[builtins.str] = None,
200
+ role_arn: Optional[builtins.str] = None,
201
+ ttl: Optional[builtins.str] = None,
202
+ type: Optional[builtins.str] = None,
202
203
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
203
204
  """
204
205
  ## Example Usage
205
206
 
206
207
 
207
- :param str backend: The path to the AWS secret backend to
208
+ :param builtins.str backend: The path to the AWS secret backend to
208
209
  read credentials from, with no leading or trailing `/`s.
209
- :param str namespace: The namespace of the target resource.
210
+ :param builtins.str namespace: The namespace of the target resource.
210
211
  The value should not contain leading or trailing forward slashes.
211
212
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
212
213
  *Available only for Vault Enterprise*.
213
- :param str region: The region the read credentials belong to.
214
- :param str role: The name of the AWS secret backend role to read
214
+ :param builtins.str region: The region the read credentials belong to.
215
+ :param builtins.str role: The name of the AWS secret backend role to read
215
216
  credentials from, with no leading or trailing `/`s.
216
- :param str role_arn: The specific AWS ARN to use
217
+ :param builtins.str role_arn: The specific AWS ARN to use
217
218
  from the configured role. If the role does not have multiple ARNs, this does
218
219
  not need to be specified.
219
- :param str ttl: Specifies the TTL for the use of the STS token. This
220
+ :param builtins.str ttl: Specifies the TTL for the use of the STS token. This
220
221
  is specified as a string with a duration suffix. Valid only when
221
222
  `credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
222
- :param str type: The type of credentials to read. Defaults
223
+ :param builtins.str type: The type of credentials to read. Defaults
223
224
  to `"creds"`, which just returns an AWS Access Key ID and Secret
224
225
  Key. Can also be set to `"sts"`, which will return a security token
225
226
  in addition to the keys.
@@ -251,34 +252,34 @@ def get_access_credentials(backend: Optional[str] = None,
251
252
  security_token=pulumi.get(__ret__, 'security_token'),
252
253
  ttl=pulumi.get(__ret__, 'ttl'),
253
254
  type=pulumi.get(__ret__, 'type'))
254
- def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
255
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
256
- region: Optional[pulumi.Input[Optional[str]]] = None,
257
- role: Optional[pulumi.Input[str]] = None,
258
- role_arn: Optional[pulumi.Input[Optional[str]]] = None,
259
- ttl: Optional[pulumi.Input[Optional[str]]] = None,
260
- type: Optional[pulumi.Input[Optional[str]]] = None,
255
+ def get_access_credentials_output(backend: Optional[pulumi.Input[builtins.str]] = None,
256
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
257
+ region: Optional[pulumi.Input[Optional[builtins.str]]] = None,
258
+ role: Optional[pulumi.Input[builtins.str]] = None,
259
+ role_arn: Optional[pulumi.Input[Optional[builtins.str]]] = None,
260
+ ttl: Optional[pulumi.Input[Optional[builtins.str]]] = None,
261
+ type: Optional[pulumi.Input[Optional[builtins.str]]] = None,
261
262
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
262
263
  """
263
264
  ## Example Usage
264
265
 
265
266
 
266
- :param str backend: The path to the AWS secret backend to
267
+ :param builtins.str backend: The path to the AWS secret backend to
267
268
  read credentials from, with no leading or trailing `/`s.
268
- :param str namespace: The namespace of the target resource.
269
+ :param builtins.str namespace: The namespace of the target resource.
269
270
  The value should not contain leading or trailing forward slashes.
270
271
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
271
272
  *Available only for Vault Enterprise*.
272
- :param str region: The region the read credentials belong to.
273
- :param str role: The name of the AWS secret backend role to read
273
+ :param builtins.str region: The region the read credentials belong to.
274
+ :param builtins.str role: The name of the AWS secret backend role to read
274
275
  credentials from, with no leading or trailing `/`s.
275
- :param str role_arn: The specific AWS ARN to use
276
+ :param builtins.str role_arn: The specific AWS ARN to use
276
277
  from the configured role. If the role does not have multiple ARNs, this does
277
278
  not need to be specified.
278
- :param str ttl: Specifies the TTL for the use of the STS token. This
279
+ :param builtins.str ttl: Specifies the TTL for the use of the STS token. This
279
280
  is specified as a string with a duration suffix. Valid only when
280
281
  `credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
281
- :param str type: The type of credentials to read. Defaults
282
+ :param builtins.str type: The type of credentials to read. Defaults
282
283
  to `"creds"`, which just returns an AWS Access Key ID and Secret
283
284
  Key. Can also be set to `"sts"`, which will return a security token
284
285
  in addition to the keys.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -48,17 +49,17 @@ class GetStaticAccessCredentialsResult:
48
49
 
49
50
  @property
50
51
  @pulumi.getter(name="accessKey")
51
- def access_key(self) -> str:
52
+ def access_key(self) -> builtins.str:
52
53
  return pulumi.get(self, "access_key")
53
54
 
54
55
  @property
55
56
  @pulumi.getter
56
- def backend(self) -> str:
57
+ def backend(self) -> builtins.str:
57
58
  return pulumi.get(self, "backend")
58
59
 
59
60
  @property
60
61
  @pulumi.getter
61
- def id(self) -> str:
62
+ def id(self) -> builtins.str:
62
63
  """
63
64
  The provider-assigned unique ID for this managed resource.
64
65
  """
@@ -66,17 +67,17 @@ class GetStaticAccessCredentialsResult:
66
67
 
67
68
  @property
68
69
  @pulumi.getter
69
- def name(self) -> str:
70
+ def name(self) -> builtins.str:
70
71
  return pulumi.get(self, "name")
71
72
 
72
73
  @property
73
74
  @pulumi.getter
74
- def namespace(self) -> Optional[str]:
75
+ def namespace(self) -> Optional[builtins.str]:
75
76
  return pulumi.get(self, "namespace")
76
77
 
77
78
  @property
78
79
  @pulumi.getter(name="secretKey")
79
- def secret_key(self) -> str:
80
+ def secret_key(self) -> builtins.str:
80
81
  return pulumi.get(self, "secret_key")
81
82
 
82
83
 
@@ -94,9 +95,9 @@ class AwaitableGetStaticAccessCredentialsResult(GetStaticAccessCredentialsResult
94
95
  secret_key=self.secret_key)
95
96
 
96
97
 
97
- def get_static_access_credentials(backend: Optional[str] = None,
98
- name: Optional[str] = None,
99
- namespace: Optional[str] = None,
98
+ def get_static_access_credentials(backend: Optional[builtins.str] = None,
99
+ name: Optional[builtins.str] = None,
100
+ namespace: Optional[builtins.str] = None,
100
101
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetStaticAccessCredentialsResult:
101
102
  """
102
103
  Use this data source to access information about an existing resource.
@@ -115,9 +116,9 @@ def get_static_access_credentials(backend: Optional[str] = None,
115
116
  name=pulumi.get(__ret__, 'name'),
116
117
  namespace=pulumi.get(__ret__, 'namespace'),
117
118
  secret_key=pulumi.get(__ret__, 'secret_key'))
118
- def get_static_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
119
- name: Optional[pulumi.Input[str]] = None,
120
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
119
+ def get_static_access_credentials_output(backend: Optional[pulumi.Input[builtins.str]] = None,
120
+ name: Optional[pulumi.Input[builtins.str]] = None,
121
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
121
122
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticAccessCredentialsResult]:
122
123
  """
123
124
  Use this data source to access information about an existing resource.