pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -81,12 +82,12 @@ class GetAccessCredentialsResult:
81
82
 
82
83
  @property
83
84
  @pulumi.getter
84
- def backend(self) -> str:
85
+ def backend(self) -> builtins.str:
85
86
  return pulumi.get(self, "backend")
86
87
 
87
88
  @property
88
89
  @pulumi.getter(name="clientId")
89
- def client_id(self) -> str:
90
+ def client_id(self) -> builtins.str:
90
91
  """
91
92
  The client id for credentials to query the Azure APIs.
92
93
  """
@@ -94,7 +95,7 @@ class GetAccessCredentialsResult:
94
95
 
95
96
  @property
96
97
  @pulumi.getter(name="clientSecret")
97
- def client_secret(self) -> str:
98
+ def client_secret(self) -> builtins.str:
98
99
  """
99
100
  The client secret for credentials to query the Azure APIs.
100
101
  """
@@ -102,12 +103,12 @@ class GetAccessCredentialsResult:
102
103
 
103
104
  @property
104
105
  @pulumi.getter
105
- def environment(self) -> Optional[str]:
106
+ def environment(self) -> Optional[builtins.str]:
106
107
  return pulumi.get(self, "environment")
107
108
 
108
109
  @property
109
110
  @pulumi.getter
110
- def id(self) -> str:
111
+ def id(self) -> builtins.str:
111
112
  """
112
113
  The provider-assigned unique ID for this managed resource.
113
114
  """
@@ -115,7 +116,7 @@ class GetAccessCredentialsResult:
115
116
 
116
117
  @property
117
118
  @pulumi.getter(name="leaseDuration")
118
- def lease_duration(self) -> int:
119
+ def lease_duration(self) -> builtins.int:
119
120
  """
120
121
  The duration of the secret lease, in seconds relative
121
122
  to the time the data was requested. Once this time has passed any plan
@@ -125,7 +126,7 @@ class GetAccessCredentialsResult:
125
126
 
126
127
  @property
127
128
  @pulumi.getter(name="leaseId")
128
- def lease_id(self) -> str:
129
+ def lease_id(self) -> builtins.str:
129
130
  """
130
131
  The lease identifier assigned by Vault.
131
132
  """
@@ -133,52 +134,52 @@ class GetAccessCredentialsResult:
133
134
 
134
135
  @property
135
136
  @pulumi.getter(name="leaseRenewable")
136
- def lease_renewable(self) -> bool:
137
+ def lease_renewable(self) -> builtins.bool:
137
138
  return pulumi.get(self, "lease_renewable")
138
139
 
139
140
  @property
140
141
  @pulumi.getter(name="leaseStartTime")
141
- def lease_start_time(self) -> str:
142
+ def lease_start_time(self) -> builtins.str:
142
143
  return pulumi.get(self, "lease_start_time")
143
144
 
144
145
  @property
145
146
  @pulumi.getter(name="maxCredValidationSeconds")
146
- def max_cred_validation_seconds(self) -> Optional[int]:
147
+ def max_cred_validation_seconds(self) -> Optional[builtins.int]:
147
148
  return pulumi.get(self, "max_cred_validation_seconds")
148
149
 
149
150
  @property
150
151
  @pulumi.getter
151
- def namespace(self) -> Optional[str]:
152
+ def namespace(self) -> Optional[builtins.str]:
152
153
  return pulumi.get(self, "namespace")
153
154
 
154
155
  @property
155
156
  @pulumi.getter(name="numSecondsBetweenTests")
156
- def num_seconds_between_tests(self) -> Optional[int]:
157
+ def num_seconds_between_tests(self) -> Optional[builtins.int]:
157
158
  return pulumi.get(self, "num_seconds_between_tests")
158
159
 
159
160
  @property
160
161
  @pulumi.getter(name="numSequentialSuccesses")
161
- def num_sequential_successes(self) -> Optional[int]:
162
+ def num_sequential_successes(self) -> Optional[builtins.int]:
162
163
  return pulumi.get(self, "num_sequential_successes")
163
164
 
164
165
  @property
165
166
  @pulumi.getter
166
- def role(self) -> str:
167
+ def role(self) -> builtins.str:
167
168
  return pulumi.get(self, "role")
168
169
 
169
170
  @property
170
171
  @pulumi.getter(name="subscriptionId")
171
- def subscription_id(self) -> Optional[str]:
172
+ def subscription_id(self) -> Optional[builtins.str]:
172
173
  return pulumi.get(self, "subscription_id")
173
174
 
174
175
  @property
175
176
  @pulumi.getter(name="tenantId")
176
- def tenant_id(self) -> Optional[str]:
177
+ def tenant_id(self) -> Optional[builtins.str]:
177
178
  return pulumi.get(self, "tenant_id")
178
179
 
179
180
  @property
180
181
  @pulumi.getter(name="validateCreds")
181
- def validate_creds(self) -> Optional[bool]:
182
+ def validate_creds(self) -> Optional[builtins.bool]:
182
183
  return pulumi.get(self, "validate_creds")
183
184
 
184
185
 
@@ -207,16 +208,16 @@ class AwaitableGetAccessCredentialsResult(GetAccessCredentialsResult):
207
208
  validate_creds=self.validate_creds)
208
209
 
209
210
 
210
- def get_access_credentials(backend: Optional[str] = None,
211
- environment: Optional[str] = None,
212
- max_cred_validation_seconds: Optional[int] = None,
213
- namespace: Optional[str] = None,
214
- num_seconds_between_tests: Optional[int] = None,
215
- num_sequential_successes: Optional[int] = None,
216
- role: Optional[str] = None,
217
- subscription_id: Optional[str] = None,
218
- tenant_id: Optional[str] = None,
219
- validate_creds: Optional[bool] = None,
211
+ def get_access_credentials(backend: Optional[builtins.str] = None,
212
+ environment: Optional[builtins.str] = None,
213
+ max_cred_validation_seconds: Optional[builtins.int] = None,
214
+ namespace: Optional[builtins.str] = None,
215
+ num_seconds_between_tests: Optional[builtins.int] = None,
216
+ num_sequential_successes: Optional[builtins.int] = None,
217
+ role: Optional[builtins.str] = None,
218
+ subscription_id: Optional[builtins.str] = None,
219
+ tenant_id: Optional[builtins.str] = None,
220
+ validate_creds: Optional[builtins.bool] = None,
220
221
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
221
222
  """
222
223
  ## Example Usage
@@ -239,34 +240,34 @@ def get_access_credentials(backend: Optional[str] = None,
239
240
  are required to be set for: `subscription_id`, `tenant_id`, `environment`.
240
241
 
241
242
 
242
- :param str backend: The path to the Azure secret backend to
243
+ :param builtins.str backend: The path to the Azure secret backend to
243
244
  read credentials from, with no leading or trailing `/`s.
244
- :param str environment: The Azure environment to use during credential validation.
245
+ :param builtins.str environment: The Azure environment to use during credential validation.
245
246
  Defaults to the environment configured in the Vault backend.
246
247
  Some possible values: `AzurePublicCloud`, `AzureGovernmentCloud`
247
248
  *See the caveats section for more information on this field.*
248
- :param int max_cred_validation_seconds: If 'validate_creds' is true,
249
+ :param builtins.int max_cred_validation_seconds: If 'validate_creds' is true,
249
250
  the number of seconds after which to give up validating credentials. Defaults
250
251
  to 300.
251
- :param str namespace: The namespace of the target resource.
252
+ :param builtins.str namespace: The namespace of the target resource.
252
253
  The value should not contain leading or trailing forward slashes.
253
254
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
254
255
  *Available only for Vault Enterprise*.
255
- :param int num_seconds_between_tests: If 'validate_creds' is true,
256
+ :param builtins.int num_seconds_between_tests: If 'validate_creds' is true,
256
257
  the number of seconds to wait between each test of generated credentials.
257
258
  Defaults to 1.
258
- :param int num_sequential_successes: If 'validate_creds' is true,
259
+ :param builtins.int num_sequential_successes: If 'validate_creds' is true,
259
260
  the number of sequential successes required to validate generated
260
261
  credentials. Defaults to 8.
261
- :param str role: The name of the Azure secret backend role to read
262
+ :param builtins.str role: The name of the Azure secret backend role to read
262
263
  credentials from, with no leading or trailing `/`s.
263
- :param str subscription_id: The subscription ID to use during credential
264
+ :param builtins.str subscription_id: The subscription ID to use during credential
264
265
  validation. Defaults to the subscription ID configured in the Vault `backend`.
265
266
  *See the caveats section for more information on this field.*
266
- :param str tenant_id: The tenant ID to use during credential validation.
267
+ :param builtins.str tenant_id: The tenant ID to use during credential validation.
267
268
  Defaults to the tenant ID configured in the Vault `backend`.
268
269
  *See the caveats section for more information on this field.*
269
- :param bool validate_creds: Whether generated credentials should be
270
+ :param builtins.bool validate_creds: Whether generated credentials should be
270
271
  validated before being returned. Defaults to `false`, which returns
271
272
  credentials without checking whether they have fully propagated throughout
272
273
  Azure Active Directory. Designating `true` activates testing.
@@ -303,16 +304,16 @@ def get_access_credentials(backend: Optional[str] = None,
303
304
  subscription_id=pulumi.get(__ret__, 'subscription_id'),
304
305
  tenant_id=pulumi.get(__ret__, 'tenant_id'),
305
306
  validate_creds=pulumi.get(__ret__, 'validate_creds'))
306
- def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
307
- environment: Optional[pulumi.Input[Optional[str]]] = None,
308
- max_cred_validation_seconds: Optional[pulumi.Input[Optional[int]]] = None,
309
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
310
- num_seconds_between_tests: Optional[pulumi.Input[Optional[int]]] = None,
311
- num_sequential_successes: Optional[pulumi.Input[Optional[int]]] = None,
312
- role: Optional[pulumi.Input[str]] = None,
313
- subscription_id: Optional[pulumi.Input[Optional[str]]] = None,
314
- tenant_id: Optional[pulumi.Input[Optional[str]]] = None,
315
- validate_creds: Optional[pulumi.Input[Optional[bool]]] = None,
307
+ def get_access_credentials_output(backend: Optional[pulumi.Input[builtins.str]] = None,
308
+ environment: Optional[pulumi.Input[Optional[builtins.str]]] = None,
309
+ max_cred_validation_seconds: Optional[pulumi.Input[Optional[builtins.int]]] = None,
310
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
311
+ num_seconds_between_tests: Optional[pulumi.Input[Optional[builtins.int]]] = None,
312
+ num_sequential_successes: Optional[pulumi.Input[Optional[builtins.int]]] = None,
313
+ role: Optional[pulumi.Input[builtins.str]] = None,
314
+ subscription_id: Optional[pulumi.Input[Optional[builtins.str]]] = None,
315
+ tenant_id: Optional[pulumi.Input[Optional[builtins.str]]] = None,
316
+ validate_creds: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
316
317
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
317
318
  """
318
319
  ## Example Usage
@@ -335,34 +336,34 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[str]] = None,
335
336
  are required to be set for: `subscription_id`, `tenant_id`, `environment`.
336
337
 
337
338
 
338
- :param str backend: The path to the Azure secret backend to
339
+ :param builtins.str backend: The path to the Azure secret backend to
339
340
  read credentials from, with no leading or trailing `/`s.
340
- :param str environment: The Azure environment to use during credential validation.
341
+ :param builtins.str environment: The Azure environment to use during credential validation.
341
342
  Defaults to the environment configured in the Vault backend.
342
343
  Some possible values: `AzurePublicCloud`, `AzureGovernmentCloud`
343
344
  *See the caveats section for more information on this field.*
344
- :param int max_cred_validation_seconds: If 'validate_creds' is true,
345
+ :param builtins.int max_cred_validation_seconds: If 'validate_creds' is true,
345
346
  the number of seconds after which to give up validating credentials. Defaults
346
347
  to 300.
347
- :param str namespace: The namespace of the target resource.
348
+ :param builtins.str namespace: The namespace of the target resource.
348
349
  The value should not contain leading or trailing forward slashes.
349
350
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
350
351
  *Available only for Vault Enterprise*.
351
- :param int num_seconds_between_tests: If 'validate_creds' is true,
352
+ :param builtins.int num_seconds_between_tests: If 'validate_creds' is true,
352
353
  the number of seconds to wait between each test of generated credentials.
353
354
  Defaults to 1.
354
- :param int num_sequential_successes: If 'validate_creds' is true,
355
+ :param builtins.int num_sequential_successes: If 'validate_creds' is true,
355
356
  the number of sequential successes required to validate generated
356
357
  credentials. Defaults to 8.
357
- :param str role: The name of the Azure secret backend role to read
358
+ :param builtins.str role: The name of the Azure secret backend role to read
358
359
  credentials from, with no leading or trailing `/`s.
359
- :param str subscription_id: The subscription ID to use during credential
360
+ :param builtins.str subscription_id: The subscription ID to use during credential
360
361
  validation. Defaults to the subscription ID configured in the Vault `backend`.
361
362
  *See the caveats section for more information on this field.*
362
- :param str tenant_id: The tenant ID to use during credential validation.
363
+ :param builtins.str tenant_id: The tenant ID to use during credential validation.
363
364
  Defaults to the tenant ID configured in the Vault `backend`.
364
365
  *See the caveats section for more information on this field.*
365
- :param bool validate_creds: Whether generated credentials should be
366
+ :param builtins.bool validate_creds: Whether generated credentials should be
366
367
  validated before being returned. Defaults to `false`, which returns
367
368
  credentials without checking whether they have fully propagated throughout
368
369
  Azure Active Directory. Designating `true` activates testing.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -41,20 +42,20 @@ class BackendRoleAzureGroup(dict):
41
42
  return super().get(key, default)
42
43
 
43
44
  def __init__(__self__, *,
44
- group_name: str,
45
- object_id: Optional[str] = None):
45
+ group_name: builtins.str,
46
+ object_id: Optional[builtins.str] = None):
46
47
  pulumi.set(__self__, "group_name", group_name)
47
48
  if object_id is not None:
48
49
  pulumi.set(__self__, "object_id", object_id)
49
50
 
50
51
  @property
51
52
  @pulumi.getter(name="groupName")
52
- def group_name(self) -> str:
53
+ def group_name(self) -> builtins.str:
53
54
  return pulumi.get(self, "group_name")
54
55
 
55
56
  @property
56
57
  @pulumi.getter(name="objectId")
57
- def object_id(self) -> Optional[str]:
58
+ def object_id(self) -> Optional[builtins.str]:
58
59
  return pulumi.get(self, "object_id")
59
60
 
60
61
 
@@ -80,9 +81,9 @@ class BackendRoleAzureRole(dict):
80
81
  return super().get(key, default)
81
82
 
82
83
  def __init__(__self__, *,
83
- scope: str,
84
- role_id: Optional[str] = None,
85
- role_name: Optional[str] = None):
84
+ scope: builtins.str,
85
+ role_id: Optional[builtins.str] = None,
86
+ role_name: Optional[builtins.str] = None):
86
87
  pulumi.set(__self__, "scope", scope)
87
88
  if role_id is not None:
88
89
  pulumi.set(__self__, "role_id", role_id)
@@ -91,17 +92,17 @@ class BackendRoleAzureRole(dict):
91
92
 
92
93
  @property
93
94
  @pulumi.getter
94
- def scope(self) -> str:
95
+ def scope(self) -> builtins.str:
95
96
  return pulumi.get(self, "scope")
96
97
 
97
98
  @property
98
99
  @pulumi.getter(name="roleId")
99
- def role_id(self) -> Optional[str]:
100
+ def role_id(self) -> Optional[builtins.str]:
100
101
  return pulumi.get(self, "role_id")
101
102
 
102
103
  @property
103
104
  @pulumi.getter(name="roleName")
104
- def role_name(self) -> Optional[str]:
105
+ def role_name(self) -> Optional[builtins.str]:
105
106
  return pulumi.get(self, "role_name")
106
107
 
107
108