pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,18 +20,18 @@ __all__ = ['EgpPolicyArgs', 'EgpPolicy']
19
20
  @pulumi.input_type
20
21
  class EgpPolicyArgs:
21
22
  def __init__(__self__, *,
22
- enforcement_level: pulumi.Input[str],
23
- paths: pulumi.Input[Sequence[pulumi.Input[str]]],
24
- policy: pulumi.Input[str],
25
- name: Optional[pulumi.Input[str]] = None,
26
- namespace: Optional[pulumi.Input[str]] = None):
23
+ enforcement_level: pulumi.Input[builtins.str],
24
+ paths: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
25
+ policy: pulumi.Input[builtins.str],
26
+ name: Optional[pulumi.Input[builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
27
28
  """
28
29
  The set of arguments for constructing a EgpPolicy resource.
29
- :param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
30
- :param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
31
- :param pulumi.Input[str] policy: String containing a Sentinel policy
32
- :param pulumi.Input[str] name: The name of the policy
33
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
30
+ :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
31
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
32
+ :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
33
+ :param pulumi.Input[builtins.str] name: The name of the policy
34
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
34
35
  The value should not contain leading or trailing forward slashes.
35
36
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
36
37
  *Available only for Vault Enterprise*.
@@ -45,55 +46,55 @@ class EgpPolicyArgs:
45
46
 
46
47
  @property
47
48
  @pulumi.getter(name="enforcementLevel")
48
- def enforcement_level(self) -> pulumi.Input[str]:
49
+ def enforcement_level(self) -> pulumi.Input[builtins.str]:
49
50
  """
50
51
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
51
52
  """
52
53
  return pulumi.get(self, "enforcement_level")
53
54
 
54
55
  @enforcement_level.setter
55
- def enforcement_level(self, value: pulumi.Input[str]):
56
+ def enforcement_level(self, value: pulumi.Input[builtins.str]):
56
57
  pulumi.set(self, "enforcement_level", value)
57
58
 
58
59
  @property
59
60
  @pulumi.getter
60
- def paths(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
61
+ def paths(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
61
62
  """
62
63
  List of paths to which the policy will be applied to
63
64
  """
64
65
  return pulumi.get(self, "paths")
65
66
 
66
67
  @paths.setter
67
- def paths(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
68
+ def paths(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
68
69
  pulumi.set(self, "paths", value)
69
70
 
70
71
  @property
71
72
  @pulumi.getter
72
- def policy(self) -> pulumi.Input[str]:
73
+ def policy(self) -> pulumi.Input[builtins.str]:
73
74
  """
74
75
  String containing a Sentinel policy
75
76
  """
76
77
  return pulumi.get(self, "policy")
77
78
 
78
79
  @policy.setter
79
- def policy(self, value: pulumi.Input[str]):
80
+ def policy(self, value: pulumi.Input[builtins.str]):
80
81
  pulumi.set(self, "policy", value)
81
82
 
82
83
  @property
83
84
  @pulumi.getter
84
- def name(self) -> Optional[pulumi.Input[str]]:
85
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
85
86
  """
86
87
  The name of the policy
87
88
  """
88
89
  return pulumi.get(self, "name")
89
90
 
90
91
  @name.setter
91
- def name(self, value: Optional[pulumi.Input[str]]):
92
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
92
93
  pulumi.set(self, "name", value)
93
94
 
94
95
  @property
95
96
  @pulumi.getter
96
- def namespace(self) -> Optional[pulumi.Input[str]]:
97
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
97
98
  """
98
99
  The namespace to provision the resource in.
99
100
  The value should not contain leading or trailing forward slashes.
@@ -103,28 +104,28 @@ class EgpPolicyArgs:
103
104
  return pulumi.get(self, "namespace")
104
105
 
105
106
  @namespace.setter
106
- def namespace(self, value: Optional[pulumi.Input[str]]):
107
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
107
108
  pulumi.set(self, "namespace", value)
108
109
 
109
110
 
110
111
  @pulumi.input_type
111
112
  class _EgpPolicyState:
112
113
  def __init__(__self__, *,
113
- enforcement_level: Optional[pulumi.Input[str]] = None,
114
- name: Optional[pulumi.Input[str]] = None,
115
- namespace: Optional[pulumi.Input[str]] = None,
116
- paths: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
117
- policy: Optional[pulumi.Input[str]] = None):
114
+ enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
115
+ name: Optional[pulumi.Input[builtins.str]] = None,
116
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
117
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
118
+ policy: Optional[pulumi.Input[builtins.str]] = None):
118
119
  """
119
120
  Input properties used for looking up and filtering EgpPolicy resources.
120
- :param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
121
- :param pulumi.Input[str] name: The name of the policy
122
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
121
+ :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
122
+ :param pulumi.Input[builtins.str] name: The name of the policy
123
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
123
124
  The value should not contain leading or trailing forward slashes.
124
125
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
125
126
  *Available only for Vault Enterprise*.
126
- :param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
127
- :param pulumi.Input[str] policy: String containing a Sentinel policy
127
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
128
+ :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
128
129
  """
129
130
  if enforcement_level is not None:
130
131
  pulumi.set(__self__, "enforcement_level", enforcement_level)
@@ -139,31 +140,31 @@ class _EgpPolicyState:
139
140
 
140
141
  @property
141
142
  @pulumi.getter(name="enforcementLevel")
142
- def enforcement_level(self) -> Optional[pulumi.Input[str]]:
143
+ def enforcement_level(self) -> Optional[pulumi.Input[builtins.str]]:
143
144
  """
144
145
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
145
146
  """
146
147
  return pulumi.get(self, "enforcement_level")
147
148
 
148
149
  @enforcement_level.setter
149
- def enforcement_level(self, value: Optional[pulumi.Input[str]]):
150
+ def enforcement_level(self, value: Optional[pulumi.Input[builtins.str]]):
150
151
  pulumi.set(self, "enforcement_level", value)
151
152
 
152
153
  @property
153
154
  @pulumi.getter
154
- def name(self) -> Optional[pulumi.Input[str]]:
155
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
155
156
  """
156
157
  The name of the policy
157
158
  """
158
159
  return pulumi.get(self, "name")
159
160
 
160
161
  @name.setter
161
- def name(self, value: Optional[pulumi.Input[str]]):
162
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
162
163
  pulumi.set(self, "name", value)
163
164
 
164
165
  @property
165
166
  @pulumi.getter
166
- def namespace(self) -> Optional[pulumi.Input[str]]:
167
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
167
168
  """
168
169
  The namespace to provision the resource in.
169
170
  The value should not contain leading or trailing forward slashes.
@@ -173,31 +174,31 @@ class _EgpPolicyState:
173
174
  return pulumi.get(self, "namespace")
174
175
 
175
176
  @namespace.setter
176
- def namespace(self, value: Optional[pulumi.Input[str]]):
177
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
177
178
  pulumi.set(self, "namespace", value)
178
179
 
179
180
  @property
180
181
  @pulumi.getter
181
- def paths(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
182
+ def paths(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
182
183
  """
183
184
  List of paths to which the policy will be applied to
184
185
  """
185
186
  return pulumi.get(self, "paths")
186
187
 
187
188
  @paths.setter
188
- def paths(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
189
+ def paths(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
189
190
  pulumi.set(self, "paths", value)
190
191
 
191
192
  @property
192
193
  @pulumi.getter
193
- def policy(self) -> Optional[pulumi.Input[str]]:
194
+ def policy(self) -> Optional[pulumi.Input[builtins.str]]:
194
195
  """
195
196
  String containing a Sentinel policy
196
197
  """
197
198
  return pulumi.get(self, "policy")
198
199
 
199
200
  @policy.setter
200
- def policy(self, value: Optional[pulumi.Input[str]]):
201
+ def policy(self, value: Optional[pulumi.Input[builtins.str]]):
201
202
  pulumi.set(self, "policy", value)
202
203
 
203
204
 
@@ -206,11 +207,11 @@ class EgpPolicy(pulumi.CustomResource):
206
207
  def __init__(__self__,
207
208
  resource_name: str,
208
209
  opts: Optional[pulumi.ResourceOptions] = None,
209
- enforcement_level: Optional[pulumi.Input[str]] = None,
210
- name: Optional[pulumi.Input[str]] = None,
211
- namespace: Optional[pulumi.Input[str]] = None,
212
- paths: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
213
- policy: Optional[pulumi.Input[str]] = None,
210
+ enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
211
+ name: Optional[pulumi.Input[builtins.str]] = None,
212
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
213
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
214
+ policy: Optional[pulumi.Input[builtins.str]] = None,
214
215
  __props__=None):
215
216
  """
216
217
  Provides a resource to manage Endpoint Governing Policy (EGP) via [Sentinel](https://www.vaultproject.io/docs/enterprise/sentinel/index.html).
@@ -235,14 +236,14 @@ class EgpPolicy(pulumi.CustomResource):
235
236
 
236
237
  :param str resource_name: The name of the resource.
237
238
  :param pulumi.ResourceOptions opts: Options for the resource.
238
- :param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
239
- :param pulumi.Input[str] name: The name of the policy
240
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
239
+ :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
240
+ :param pulumi.Input[builtins.str] name: The name of the policy
241
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
241
242
  The value should not contain leading or trailing forward slashes.
242
243
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
243
244
  *Available only for Vault Enterprise*.
244
- :param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
245
- :param pulumi.Input[str] policy: String containing a Sentinel policy
245
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
246
+ :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
246
247
  """
247
248
  ...
248
249
  @overload
@@ -286,11 +287,11 @@ class EgpPolicy(pulumi.CustomResource):
286
287
  def _internal_init(__self__,
287
288
  resource_name: str,
288
289
  opts: Optional[pulumi.ResourceOptions] = None,
289
- enforcement_level: Optional[pulumi.Input[str]] = None,
290
- name: Optional[pulumi.Input[str]] = None,
291
- namespace: Optional[pulumi.Input[str]] = None,
292
- paths: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
293
- policy: Optional[pulumi.Input[str]] = None,
290
+ enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
291
+ name: Optional[pulumi.Input[builtins.str]] = None,
292
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
293
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
294
+ policy: Optional[pulumi.Input[builtins.str]] = None,
294
295
  __props__=None):
295
296
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
296
297
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -321,11 +322,11 @@ class EgpPolicy(pulumi.CustomResource):
321
322
  def get(resource_name: str,
322
323
  id: pulumi.Input[str],
323
324
  opts: Optional[pulumi.ResourceOptions] = None,
324
- enforcement_level: Optional[pulumi.Input[str]] = None,
325
- name: Optional[pulumi.Input[str]] = None,
326
- namespace: Optional[pulumi.Input[str]] = None,
327
- paths: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
328
- policy: Optional[pulumi.Input[str]] = None) -> 'EgpPolicy':
325
+ enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
326
+ name: Optional[pulumi.Input[builtins.str]] = None,
327
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
328
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
329
+ policy: Optional[pulumi.Input[builtins.str]] = None) -> 'EgpPolicy':
329
330
  """
330
331
  Get an existing EgpPolicy resource's state with the given name, id, and optional extra
331
332
  properties used to qualify the lookup.
@@ -333,14 +334,14 @@ class EgpPolicy(pulumi.CustomResource):
333
334
  :param str resource_name: The unique name of the resulting resource.
334
335
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
335
336
  :param pulumi.ResourceOptions opts: Options for the resource.
336
- :param pulumi.Input[str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
337
- :param pulumi.Input[str] name: The name of the policy
338
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
337
+ :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
338
+ :param pulumi.Input[builtins.str] name: The name of the policy
339
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
339
340
  The value should not contain leading or trailing forward slashes.
340
341
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
341
342
  *Available only for Vault Enterprise*.
342
- :param pulumi.Input[Sequence[pulumi.Input[str]]] paths: List of paths to which the policy will be applied to
343
- :param pulumi.Input[str] policy: String containing a Sentinel policy
343
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
344
+ :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
344
345
  """
345
346
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
346
347
 
@@ -355,7 +356,7 @@ class EgpPolicy(pulumi.CustomResource):
355
356
 
356
357
  @property
357
358
  @pulumi.getter(name="enforcementLevel")
358
- def enforcement_level(self) -> pulumi.Output[str]:
359
+ def enforcement_level(self) -> pulumi.Output[builtins.str]:
359
360
  """
360
361
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
361
362
  """
@@ -363,7 +364,7 @@ class EgpPolicy(pulumi.CustomResource):
363
364
 
364
365
  @property
365
366
  @pulumi.getter
366
- def name(self) -> pulumi.Output[str]:
367
+ def name(self) -> pulumi.Output[builtins.str]:
367
368
  """
368
369
  The name of the policy
369
370
  """
@@ -371,7 +372,7 @@ class EgpPolicy(pulumi.CustomResource):
371
372
 
372
373
  @property
373
374
  @pulumi.getter
374
- def namespace(self) -> pulumi.Output[Optional[str]]:
375
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
375
376
  """
376
377
  The namespace to provision the resource in.
377
378
  The value should not contain leading or trailing forward slashes.
@@ -382,7 +383,7 @@ class EgpPolicy(pulumi.CustomResource):
382
383
 
383
384
  @property
384
385
  @pulumi.getter
385
- def paths(self) -> pulumi.Output[Sequence[str]]:
386
+ def paths(self) -> pulumi.Output[Sequence[builtins.str]]:
386
387
  """
387
388
  List of paths to which the policy will be applied to
388
389
  """
@@ -390,7 +391,7 @@ class EgpPolicy(pulumi.CustomResource):
390
391
 
391
392
  @property
392
393
  @pulumi.getter
393
- def policy(self) -> pulumi.Output[str]:
394
+ def policy(self) -> pulumi.Output[builtins.str]:
394
395
  """
395
396
  String containing a Sentinel policy
396
397
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members: