pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,24 +20,24 @@ __all__ = ['SecretRoleArgs', 'SecretRole']
19
20
  @pulumi.input_type
20
21
  class SecretRoleArgs:
21
22
  def __init__(__self__, *,
22
- backend: pulumi.Input[str],
23
- role: pulumi.Input[str],
24
- service_account_name: pulumi.Input[str],
25
- namespace: Optional[pulumi.Input[str]] = None,
26
- ttl: Optional[pulumi.Input[int]] = None):
23
+ backend: pulumi.Input[builtins.str],
24
+ role: pulumi.Input[builtins.str],
25
+ service_account_name: pulumi.Input[builtins.str],
26
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
27
+ ttl: Optional[pulumi.Input[builtins.int]] = None):
27
28
  """
28
29
  The set of arguments for constructing a SecretRole resource.
29
- :param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
30
+ :param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
30
31
  with no leading or trailing `/`s.
31
- :param pulumi.Input[str] role: The name to identify this role within the backend.
32
+ :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
32
33
  Must be unique within the backend.
33
- :param pulumi.Input[str] service_account_name: Specifies the name of the Active Directory service
34
+ :param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
34
35
  account mapped to this role.
35
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
36
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
36
37
  The value should not contain leading or trailing forward slashes.
37
38
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
39
  *Available only for Vault Enterprise*.
39
- :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
40
+ :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
40
41
  ttl if not provided.
41
42
  """
42
43
  pulumi.set(__self__, "backend", backend)
@@ -49,7 +50,7 @@ class SecretRoleArgs:
49
50
 
50
51
  @property
51
52
  @pulumi.getter
52
- def backend(self) -> pulumi.Input[str]:
53
+ def backend(self) -> pulumi.Input[builtins.str]:
53
54
  """
54
55
  The path the AD secret backend is mounted at,
55
56
  with no leading or trailing `/`s.
@@ -57,12 +58,12 @@ class SecretRoleArgs:
57
58
  return pulumi.get(self, "backend")
58
59
 
59
60
  @backend.setter
60
- def backend(self, value: pulumi.Input[str]):
61
+ def backend(self, value: pulumi.Input[builtins.str]):
61
62
  pulumi.set(self, "backend", value)
62
63
 
63
64
  @property
64
65
  @pulumi.getter
65
- def role(self) -> pulumi.Input[str]:
66
+ def role(self) -> pulumi.Input[builtins.str]:
66
67
  """
67
68
  The name to identify this role within the backend.
68
69
  Must be unique within the backend.
@@ -70,12 +71,12 @@ class SecretRoleArgs:
70
71
  return pulumi.get(self, "role")
71
72
 
72
73
  @role.setter
73
- def role(self, value: pulumi.Input[str]):
74
+ def role(self, value: pulumi.Input[builtins.str]):
74
75
  pulumi.set(self, "role", value)
75
76
 
76
77
  @property
77
78
  @pulumi.getter(name="serviceAccountName")
78
- def service_account_name(self) -> pulumi.Input[str]:
79
+ def service_account_name(self) -> pulumi.Input[builtins.str]:
79
80
  """
80
81
  Specifies the name of the Active Directory service
81
82
  account mapped to this role.
@@ -83,12 +84,12 @@ class SecretRoleArgs:
83
84
  return pulumi.get(self, "service_account_name")
84
85
 
85
86
  @service_account_name.setter
86
- def service_account_name(self, value: pulumi.Input[str]):
87
+ def service_account_name(self, value: pulumi.Input[builtins.str]):
87
88
  pulumi.set(self, "service_account_name", value)
88
89
 
89
90
  @property
90
91
  @pulumi.getter
91
- def namespace(self) -> Optional[pulumi.Input[str]]:
92
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
92
93
  """
93
94
  The namespace to provision the resource in.
94
95
  The value should not contain leading or trailing forward slashes.
@@ -98,12 +99,12 @@ class SecretRoleArgs:
98
99
  return pulumi.get(self, "namespace")
99
100
 
100
101
  @namespace.setter
101
- def namespace(self, value: Optional[pulumi.Input[str]]):
102
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
102
103
  pulumi.set(self, "namespace", value)
103
104
 
104
105
  @property
105
106
  @pulumi.getter
106
- def ttl(self) -> Optional[pulumi.Input[int]]:
107
+ def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
107
108
  """
108
109
  The password time-to-live in seconds. Defaults to the configuration
109
110
  ttl if not provided.
@@ -111,35 +112,35 @@ class SecretRoleArgs:
111
112
  return pulumi.get(self, "ttl")
112
113
 
113
114
  @ttl.setter
114
- def ttl(self, value: Optional[pulumi.Input[int]]):
115
+ def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
115
116
  pulumi.set(self, "ttl", value)
116
117
 
117
118
 
118
119
  @pulumi.input_type
119
120
  class _SecretRoleState:
120
121
  def __init__(__self__, *,
121
- backend: Optional[pulumi.Input[str]] = None,
122
- last_vault_rotation: Optional[pulumi.Input[str]] = None,
123
- namespace: Optional[pulumi.Input[str]] = None,
124
- password_last_set: Optional[pulumi.Input[str]] = None,
125
- role: Optional[pulumi.Input[str]] = None,
126
- service_account_name: Optional[pulumi.Input[str]] = None,
127
- ttl: Optional[pulumi.Input[int]] = None):
122
+ backend: Optional[pulumi.Input[builtins.str]] = None,
123
+ last_vault_rotation: Optional[pulumi.Input[builtins.str]] = None,
124
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
125
+ password_last_set: Optional[pulumi.Input[builtins.str]] = None,
126
+ role: Optional[pulumi.Input[builtins.str]] = None,
127
+ service_account_name: Optional[pulumi.Input[builtins.str]] = None,
128
+ ttl: Optional[pulumi.Input[builtins.int]] = None):
128
129
  """
129
130
  Input properties used for looking up and filtering SecretRole resources.
130
- :param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
131
+ :param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
131
132
  with no leading or trailing `/`s.
132
- :param pulumi.Input[str] last_vault_rotation: Timestamp of the last password rotation by Vault.
133
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
133
+ :param pulumi.Input[builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
134
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
134
135
  The value should not contain leading or trailing forward slashes.
135
136
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
136
137
  *Available only for Vault Enterprise*.
137
- :param pulumi.Input[str] password_last_set: Timestamp of the last password set by Vault.
138
- :param pulumi.Input[str] role: The name to identify this role within the backend.
138
+ :param pulumi.Input[builtins.str] password_last_set: Timestamp of the last password set by Vault.
139
+ :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
139
140
  Must be unique within the backend.
140
- :param pulumi.Input[str] service_account_name: Specifies the name of the Active Directory service
141
+ :param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
141
142
  account mapped to this role.
142
- :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
143
+ :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
143
144
  ttl if not provided.
144
145
  """
145
146
  if backend is not None:
@@ -159,7 +160,7 @@ class _SecretRoleState:
159
160
 
160
161
  @property
161
162
  @pulumi.getter
162
- def backend(self) -> Optional[pulumi.Input[str]]:
163
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
163
164
  """
164
165
  The path the AD secret backend is mounted at,
165
166
  with no leading or trailing `/`s.
@@ -167,24 +168,24 @@ class _SecretRoleState:
167
168
  return pulumi.get(self, "backend")
168
169
 
169
170
  @backend.setter
170
- def backend(self, value: Optional[pulumi.Input[str]]):
171
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
171
172
  pulumi.set(self, "backend", value)
172
173
 
173
174
  @property
174
175
  @pulumi.getter(name="lastVaultRotation")
175
- def last_vault_rotation(self) -> Optional[pulumi.Input[str]]:
176
+ def last_vault_rotation(self) -> Optional[pulumi.Input[builtins.str]]:
176
177
  """
177
178
  Timestamp of the last password rotation by Vault.
178
179
  """
179
180
  return pulumi.get(self, "last_vault_rotation")
180
181
 
181
182
  @last_vault_rotation.setter
182
- def last_vault_rotation(self, value: Optional[pulumi.Input[str]]):
183
+ def last_vault_rotation(self, value: Optional[pulumi.Input[builtins.str]]):
183
184
  pulumi.set(self, "last_vault_rotation", value)
184
185
 
185
186
  @property
186
187
  @pulumi.getter
187
- def namespace(self) -> Optional[pulumi.Input[str]]:
188
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
188
189
  """
189
190
  The namespace to provision the resource in.
190
191
  The value should not contain leading or trailing forward slashes.
@@ -194,24 +195,24 @@ class _SecretRoleState:
194
195
  return pulumi.get(self, "namespace")
195
196
 
196
197
  @namespace.setter
197
- def namespace(self, value: Optional[pulumi.Input[str]]):
198
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
198
199
  pulumi.set(self, "namespace", value)
199
200
 
200
201
  @property
201
202
  @pulumi.getter(name="passwordLastSet")
202
- def password_last_set(self) -> Optional[pulumi.Input[str]]:
203
+ def password_last_set(self) -> Optional[pulumi.Input[builtins.str]]:
203
204
  """
204
205
  Timestamp of the last password set by Vault.
205
206
  """
206
207
  return pulumi.get(self, "password_last_set")
207
208
 
208
209
  @password_last_set.setter
209
- def password_last_set(self, value: Optional[pulumi.Input[str]]):
210
+ def password_last_set(self, value: Optional[pulumi.Input[builtins.str]]):
210
211
  pulumi.set(self, "password_last_set", value)
211
212
 
212
213
  @property
213
214
  @pulumi.getter
214
- def role(self) -> Optional[pulumi.Input[str]]:
215
+ def role(self) -> Optional[pulumi.Input[builtins.str]]:
215
216
  """
216
217
  The name to identify this role within the backend.
217
218
  Must be unique within the backend.
@@ -219,12 +220,12 @@ class _SecretRoleState:
219
220
  return pulumi.get(self, "role")
220
221
 
221
222
  @role.setter
222
- def role(self, value: Optional[pulumi.Input[str]]):
223
+ def role(self, value: Optional[pulumi.Input[builtins.str]]):
223
224
  pulumi.set(self, "role", value)
224
225
 
225
226
  @property
226
227
  @pulumi.getter(name="serviceAccountName")
227
- def service_account_name(self) -> Optional[pulumi.Input[str]]:
228
+ def service_account_name(self) -> Optional[pulumi.Input[builtins.str]]:
228
229
  """
229
230
  Specifies the name of the Active Directory service
230
231
  account mapped to this role.
@@ -232,12 +233,12 @@ class _SecretRoleState:
232
233
  return pulumi.get(self, "service_account_name")
233
234
 
234
235
  @service_account_name.setter
235
- def service_account_name(self, value: Optional[pulumi.Input[str]]):
236
+ def service_account_name(self, value: Optional[pulumi.Input[builtins.str]]):
236
237
  pulumi.set(self, "service_account_name", value)
237
238
 
238
239
  @property
239
240
  @pulumi.getter
240
- def ttl(self) -> Optional[pulumi.Input[int]]:
241
+ def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
241
242
  """
242
243
  The password time-to-live in seconds. Defaults to the configuration
243
244
  ttl if not provided.
@@ -245,7 +246,7 @@ class _SecretRoleState:
245
246
  return pulumi.get(self, "ttl")
246
247
 
247
248
  @ttl.setter
248
- def ttl(self, value: Optional[pulumi.Input[int]]):
249
+ def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
249
250
  pulumi.set(self, "ttl", value)
250
251
 
251
252
 
@@ -254,11 +255,11 @@ class SecretRole(pulumi.CustomResource):
254
255
  def __init__(__self__,
255
256
  resource_name: str,
256
257
  opts: Optional[pulumi.ResourceOptions] = None,
257
- backend: Optional[pulumi.Input[str]] = None,
258
- namespace: Optional[pulumi.Input[str]] = None,
259
- role: Optional[pulumi.Input[str]] = None,
260
- service_account_name: Optional[pulumi.Input[str]] = None,
261
- ttl: Optional[pulumi.Input[int]] = None,
258
+ backend: Optional[pulumi.Input[builtins.str]] = None,
259
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
260
+ role: Optional[pulumi.Input[builtins.str]] = None,
261
+ service_account_name: Optional[pulumi.Input[builtins.str]] = None,
262
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
262
263
  __props__=None):
263
264
  """
264
265
  ## Example Usage
@@ -291,17 +292,17 @@ class SecretRole(pulumi.CustomResource):
291
292
 
292
293
  :param str resource_name: The name of the resource.
293
294
  :param pulumi.ResourceOptions opts: Options for the resource.
294
- :param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
295
+ :param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
295
296
  with no leading or trailing `/`s.
296
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
297
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
297
298
  The value should not contain leading or trailing forward slashes.
298
299
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
299
300
  *Available only for Vault Enterprise*.
300
- :param pulumi.Input[str] role: The name to identify this role within the backend.
301
+ :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
301
302
  Must be unique within the backend.
302
- :param pulumi.Input[str] service_account_name: Specifies the name of the Active Directory service
303
+ :param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
303
304
  account mapped to this role.
304
- :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
305
+ :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
305
306
  ttl if not provided.
306
307
  """
307
308
  ...
@@ -354,11 +355,11 @@ class SecretRole(pulumi.CustomResource):
354
355
  def _internal_init(__self__,
355
356
  resource_name: str,
356
357
  opts: Optional[pulumi.ResourceOptions] = None,
357
- backend: Optional[pulumi.Input[str]] = None,
358
- namespace: Optional[pulumi.Input[str]] = None,
359
- role: Optional[pulumi.Input[str]] = None,
360
- service_account_name: Optional[pulumi.Input[str]] = None,
361
- ttl: Optional[pulumi.Input[int]] = None,
358
+ backend: Optional[pulumi.Input[builtins.str]] = None,
359
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
360
+ role: Optional[pulumi.Input[builtins.str]] = None,
361
+ service_account_name: Optional[pulumi.Input[builtins.str]] = None,
362
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
362
363
  __props__=None):
363
364
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
364
365
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -391,13 +392,13 @@ class SecretRole(pulumi.CustomResource):
391
392
  def get(resource_name: str,
392
393
  id: pulumi.Input[str],
393
394
  opts: Optional[pulumi.ResourceOptions] = None,
394
- backend: Optional[pulumi.Input[str]] = None,
395
- last_vault_rotation: Optional[pulumi.Input[str]] = None,
396
- namespace: Optional[pulumi.Input[str]] = None,
397
- password_last_set: Optional[pulumi.Input[str]] = None,
398
- role: Optional[pulumi.Input[str]] = None,
399
- service_account_name: Optional[pulumi.Input[str]] = None,
400
- ttl: Optional[pulumi.Input[int]] = None) -> 'SecretRole':
395
+ backend: Optional[pulumi.Input[builtins.str]] = None,
396
+ last_vault_rotation: Optional[pulumi.Input[builtins.str]] = None,
397
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
398
+ password_last_set: Optional[pulumi.Input[builtins.str]] = None,
399
+ role: Optional[pulumi.Input[builtins.str]] = None,
400
+ service_account_name: Optional[pulumi.Input[builtins.str]] = None,
401
+ ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'SecretRole':
401
402
  """
402
403
  Get an existing SecretRole resource's state with the given name, id, and optional extra
403
404
  properties used to qualify the lookup.
@@ -405,19 +406,19 @@ class SecretRole(pulumi.CustomResource):
405
406
  :param str resource_name: The unique name of the resulting resource.
406
407
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
407
408
  :param pulumi.ResourceOptions opts: Options for the resource.
408
- :param pulumi.Input[str] backend: The path the AD secret backend is mounted at,
409
+ :param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
409
410
  with no leading or trailing `/`s.
410
- :param pulumi.Input[str] last_vault_rotation: Timestamp of the last password rotation by Vault.
411
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
411
+ :param pulumi.Input[builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
412
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
412
413
  The value should not contain leading or trailing forward slashes.
413
414
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
414
415
  *Available only for Vault Enterprise*.
415
- :param pulumi.Input[str] password_last_set: Timestamp of the last password set by Vault.
416
- :param pulumi.Input[str] role: The name to identify this role within the backend.
416
+ :param pulumi.Input[builtins.str] password_last_set: Timestamp of the last password set by Vault.
417
+ :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
417
418
  Must be unique within the backend.
418
- :param pulumi.Input[str] service_account_name: Specifies the name of the Active Directory service
419
+ :param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
419
420
  account mapped to this role.
420
- :param pulumi.Input[int] ttl: The password time-to-live in seconds. Defaults to the configuration
421
+ :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
421
422
  ttl if not provided.
422
423
  """
423
424
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -435,7 +436,7 @@ class SecretRole(pulumi.CustomResource):
435
436
 
436
437
  @property
437
438
  @pulumi.getter
438
- def backend(self) -> pulumi.Output[str]:
439
+ def backend(self) -> pulumi.Output[builtins.str]:
439
440
  """
440
441
  The path the AD secret backend is mounted at,
441
442
  with no leading or trailing `/`s.
@@ -444,7 +445,7 @@ class SecretRole(pulumi.CustomResource):
444
445
 
445
446
  @property
446
447
  @pulumi.getter(name="lastVaultRotation")
447
- def last_vault_rotation(self) -> pulumi.Output[str]:
448
+ def last_vault_rotation(self) -> pulumi.Output[builtins.str]:
448
449
  """
449
450
  Timestamp of the last password rotation by Vault.
450
451
  """
@@ -452,7 +453,7 @@ class SecretRole(pulumi.CustomResource):
452
453
 
453
454
  @property
454
455
  @pulumi.getter
455
- def namespace(self) -> pulumi.Output[Optional[str]]:
456
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
456
457
  """
457
458
  The namespace to provision the resource in.
458
459
  The value should not contain leading or trailing forward slashes.
@@ -463,7 +464,7 @@ class SecretRole(pulumi.CustomResource):
463
464
 
464
465
  @property
465
466
  @pulumi.getter(name="passwordLastSet")
466
- def password_last_set(self) -> pulumi.Output[str]:
467
+ def password_last_set(self) -> pulumi.Output[builtins.str]:
467
468
  """
468
469
  Timestamp of the last password set by Vault.
469
470
  """
@@ -471,7 +472,7 @@ class SecretRole(pulumi.CustomResource):
471
472
 
472
473
  @property
473
474
  @pulumi.getter
474
- def role(self) -> pulumi.Output[str]:
475
+ def role(self) -> pulumi.Output[builtins.str]:
475
476
  """
476
477
  The name to identify this role within the backend.
477
478
  Must be unique within the backend.
@@ -480,7 +481,7 @@ class SecretRole(pulumi.CustomResource):
480
481
 
481
482
  @property
482
483
  @pulumi.getter(name="serviceAccountName")
483
- def service_account_name(self) -> pulumi.Output[str]:
484
+ def service_account_name(self) -> pulumi.Output[builtins.str]:
484
485
  """
485
486
  Specifies the name of the Active Directory service
486
487
  account mapped to this role.
@@ -489,7 +490,7 @@ class SecretRole(pulumi.CustomResource):
489
490
 
490
491
  @property
491
492
  @pulumi.getter
492
- def ttl(self) -> pulumi.Output[Optional[int]]:
493
+ def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
493
494
  """
494
495
  The password time-to-live in seconds. Defaults to the configuration
495
496
  ttl if not provided.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members: