pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members:
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,19 +20,19 @@ __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
19
20
  @pulumi.input_type
20
21
  class AuthBackendLoginArgs:
21
22
  def __init__(__self__, *,
22
- role_id: pulumi.Input[str],
23
- backend: Optional[pulumi.Input[str]] = None,
24
- namespace: Optional[pulumi.Input[str]] = None,
25
- secret_id: Optional[pulumi.Input[str]] = None):
23
+ role_id: pulumi.Input[builtins.str],
24
+ backend: Optional[pulumi.Input[builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
26
+ secret_id: Optional[pulumi.Input[builtins.str]] = None):
26
27
  """
27
28
  The set of arguments for constructing a AuthBackendLogin resource.
28
- :param pulumi.Input[str] role_id: The ID of the role to log in with.
29
- :param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
30
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
29
+ :param pulumi.Input[builtins.str] role_id: The ID of the role to log in with.
30
+ :param pulumi.Input[builtins.str] backend: The unique path of the Vault backend to log in with.
31
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
31
32
  The value should not contain leading or trailing forward slashes.
32
33
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
34
  *Available only for Vault Enterprise*.
34
- :param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
35
+ :param pulumi.Input[builtins.str] secret_id: The secret ID of the role to log in with. Required
35
36
  unless `bind_secret_id` is set to false on the role.
36
37
  """
37
38
  pulumi.set(__self__, "role_id", role_id)
@@ -44,31 +45,31 @@ class AuthBackendLoginArgs:
44
45
 
45
46
  @property
46
47
  @pulumi.getter(name="roleId")
47
- def role_id(self) -> pulumi.Input[str]:
48
+ def role_id(self) -> pulumi.Input[builtins.str]:
48
49
  """
49
50
  The ID of the role to log in with.
50
51
  """
51
52
  return pulumi.get(self, "role_id")
52
53
 
53
54
  @role_id.setter
54
- def role_id(self, value: pulumi.Input[str]):
55
+ def role_id(self, value: pulumi.Input[builtins.str]):
55
56
  pulumi.set(self, "role_id", value)
56
57
 
57
58
  @property
58
59
  @pulumi.getter
59
- def backend(self) -> Optional[pulumi.Input[str]]:
60
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
60
61
  """
61
62
  The unique path of the Vault backend to log in with.
62
63
  """
63
64
  return pulumi.get(self, "backend")
64
65
 
65
66
  @backend.setter
66
- def backend(self, value: Optional[pulumi.Input[str]]):
67
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
67
68
  pulumi.set(self, "backend", value)
68
69
 
69
70
  @property
70
71
  @pulumi.getter
71
- def namespace(self) -> Optional[pulumi.Input[str]]:
72
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
72
73
  """
73
74
  The namespace to provision the resource in.
74
75
  The value should not contain leading or trailing forward slashes.
@@ -78,12 +79,12 @@ class AuthBackendLoginArgs:
78
79
  return pulumi.get(self, "namespace")
79
80
 
80
81
  @namespace.setter
81
- def namespace(self, value: Optional[pulumi.Input[str]]):
82
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
82
83
  pulumi.set(self, "namespace", value)
83
84
 
84
85
  @property
85
86
  @pulumi.getter(name="secretId")
86
- def secret_id(self) -> Optional[pulumi.Input[str]]:
87
+ def secret_id(self) -> Optional[pulumi.Input[builtins.str]]:
87
88
  """
88
89
  The secret ID of the role to log in with. Required
89
90
  unless `bind_secret_id` is set to false on the role.
@@ -91,40 +92,40 @@ class AuthBackendLoginArgs:
91
92
  return pulumi.get(self, "secret_id")
92
93
 
93
94
  @secret_id.setter
94
- def secret_id(self, value: Optional[pulumi.Input[str]]):
95
+ def secret_id(self, value: Optional[pulumi.Input[builtins.str]]):
95
96
  pulumi.set(self, "secret_id", value)
96
97
 
97
98
 
98
99
  @pulumi.input_type
99
100
  class _AuthBackendLoginState:
100
101
  def __init__(__self__, *,
101
- accessor: Optional[pulumi.Input[str]] = None,
102
- backend: Optional[pulumi.Input[str]] = None,
103
- client_token: Optional[pulumi.Input[str]] = None,
104
- lease_duration: Optional[pulumi.Input[int]] = None,
105
- lease_started: Optional[pulumi.Input[str]] = None,
106
- metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
107
- namespace: Optional[pulumi.Input[str]] = None,
108
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
109
- renewable: Optional[pulumi.Input[bool]] = None,
110
- role_id: Optional[pulumi.Input[str]] = None,
111
- secret_id: Optional[pulumi.Input[str]] = None):
102
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
103
+ backend: Optional[pulumi.Input[builtins.str]] = None,
104
+ client_token: Optional[pulumi.Input[builtins.str]] = None,
105
+ lease_duration: Optional[pulumi.Input[builtins.int]] = None,
106
+ lease_started: Optional[pulumi.Input[builtins.str]] = None,
107
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
108
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
109
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
110
+ renewable: Optional[pulumi.Input[builtins.bool]] = None,
111
+ role_id: Optional[pulumi.Input[builtins.str]] = None,
112
+ secret_id: Optional[pulumi.Input[builtins.str]] = None):
112
113
  """
113
114
  Input properties used for looking up and filtering AuthBackendLogin resources.
114
- :param pulumi.Input[str] accessor: The accessor for the token.
115
- :param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
116
- :param pulumi.Input[str] client_token: The Vault token created.
117
- :param pulumi.Input[int] lease_duration: How long the token is valid for, in seconds.
118
- :param pulumi.Input[str] lease_started: The date and time the lease started, in RFC 3339 format.
119
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: The metadata associated with the token.
120
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
115
+ :param pulumi.Input[builtins.str] accessor: The accessor for the token.
116
+ :param pulumi.Input[builtins.str] backend: The unique path of the Vault backend to log in with.
117
+ :param pulumi.Input[builtins.str] client_token: The Vault token created.
118
+ :param pulumi.Input[builtins.int] lease_duration: How long the token is valid for, in seconds.
119
+ :param pulumi.Input[builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
120
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] metadata: The metadata associated with the token.
121
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
121
122
  The value should not contain leading or trailing forward slashes.
122
123
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
123
124
  *Available only for Vault Enterprise*.
124
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies applied to the token.
125
- :param pulumi.Input[bool] renewable: Whether the token is renewable or not.
126
- :param pulumi.Input[str] role_id: The ID of the role to log in with.
127
- :param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
125
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: A list of policies applied to the token.
126
+ :param pulumi.Input[builtins.bool] renewable: Whether the token is renewable or not.
127
+ :param pulumi.Input[builtins.str] role_id: The ID of the role to log in with.
128
+ :param pulumi.Input[builtins.str] secret_id: The secret ID of the role to log in with. Required
128
129
  unless `bind_secret_id` is set to false on the role.
129
130
  """
130
131
  if accessor is not None:
@@ -152,79 +153,79 @@ class _AuthBackendLoginState:
152
153
 
153
154
  @property
154
155
  @pulumi.getter
155
- def accessor(self) -> Optional[pulumi.Input[str]]:
156
+ def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
156
157
  """
157
158
  The accessor for the token.
158
159
  """
159
160
  return pulumi.get(self, "accessor")
160
161
 
161
162
  @accessor.setter
162
- def accessor(self, value: Optional[pulumi.Input[str]]):
163
+ def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
163
164
  pulumi.set(self, "accessor", value)
164
165
 
165
166
  @property
166
167
  @pulumi.getter
167
- def backend(self) -> Optional[pulumi.Input[str]]:
168
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
168
169
  """
169
170
  The unique path of the Vault backend to log in with.
170
171
  """
171
172
  return pulumi.get(self, "backend")
172
173
 
173
174
  @backend.setter
174
- def backend(self, value: Optional[pulumi.Input[str]]):
175
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
175
176
  pulumi.set(self, "backend", value)
176
177
 
177
178
  @property
178
179
  @pulumi.getter(name="clientToken")
179
- def client_token(self) -> Optional[pulumi.Input[str]]:
180
+ def client_token(self) -> Optional[pulumi.Input[builtins.str]]:
180
181
  """
181
182
  The Vault token created.
182
183
  """
183
184
  return pulumi.get(self, "client_token")
184
185
 
185
186
  @client_token.setter
186
- def client_token(self, value: Optional[pulumi.Input[str]]):
187
+ def client_token(self, value: Optional[pulumi.Input[builtins.str]]):
187
188
  pulumi.set(self, "client_token", value)
188
189
 
189
190
  @property
190
191
  @pulumi.getter(name="leaseDuration")
191
- def lease_duration(self) -> Optional[pulumi.Input[int]]:
192
+ def lease_duration(self) -> Optional[pulumi.Input[builtins.int]]:
192
193
  """
193
194
  How long the token is valid for, in seconds.
194
195
  """
195
196
  return pulumi.get(self, "lease_duration")
196
197
 
197
198
  @lease_duration.setter
198
- def lease_duration(self, value: Optional[pulumi.Input[int]]):
199
+ def lease_duration(self, value: Optional[pulumi.Input[builtins.int]]):
199
200
  pulumi.set(self, "lease_duration", value)
200
201
 
201
202
  @property
202
203
  @pulumi.getter(name="leaseStarted")
203
- def lease_started(self) -> Optional[pulumi.Input[str]]:
204
+ def lease_started(self) -> Optional[pulumi.Input[builtins.str]]:
204
205
  """
205
206
  The date and time the lease started, in RFC 3339 format.
206
207
  """
207
208
  return pulumi.get(self, "lease_started")
208
209
 
209
210
  @lease_started.setter
210
- def lease_started(self, value: Optional[pulumi.Input[str]]):
211
+ def lease_started(self, value: Optional[pulumi.Input[builtins.str]]):
211
212
  pulumi.set(self, "lease_started", value)
212
213
 
213
214
  @property
214
215
  @pulumi.getter
215
- def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
216
+ def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
216
217
  """
217
218
  The metadata associated with the token.
218
219
  """
219
220
  return pulumi.get(self, "metadata")
220
221
 
221
222
  @metadata.setter
222
- def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
223
+ def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
223
224
  pulumi.set(self, "metadata", value)
224
225
 
225
226
  @property
226
227
  @pulumi.getter
227
- def namespace(self) -> Optional[pulumi.Input[str]]:
228
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
228
229
  """
229
230
  The namespace to provision the resource in.
230
231
  The value should not contain leading or trailing forward slashes.
@@ -234,48 +235,48 @@ class _AuthBackendLoginState:
234
235
  return pulumi.get(self, "namespace")
235
236
 
236
237
  @namespace.setter
237
- def namespace(self, value: Optional[pulumi.Input[str]]):
238
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
238
239
  pulumi.set(self, "namespace", value)
239
240
 
240
241
  @property
241
242
  @pulumi.getter
242
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
243
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
243
244
  """
244
245
  A list of policies applied to the token.
245
246
  """
246
247
  return pulumi.get(self, "policies")
247
248
 
248
249
  @policies.setter
249
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
250
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
250
251
  pulumi.set(self, "policies", value)
251
252
 
252
253
  @property
253
254
  @pulumi.getter
254
- def renewable(self) -> Optional[pulumi.Input[bool]]:
255
+ def renewable(self) -> Optional[pulumi.Input[builtins.bool]]:
255
256
  """
256
257
  Whether the token is renewable or not.
257
258
  """
258
259
  return pulumi.get(self, "renewable")
259
260
 
260
261
  @renewable.setter
261
- def renewable(self, value: Optional[pulumi.Input[bool]]):
262
+ def renewable(self, value: Optional[pulumi.Input[builtins.bool]]):
262
263
  pulumi.set(self, "renewable", value)
263
264
 
264
265
  @property
265
266
  @pulumi.getter(name="roleId")
266
- def role_id(self) -> Optional[pulumi.Input[str]]:
267
+ def role_id(self) -> Optional[pulumi.Input[builtins.str]]:
267
268
  """
268
269
  The ID of the role to log in with.
269
270
  """
270
271
  return pulumi.get(self, "role_id")
271
272
 
272
273
  @role_id.setter
273
- def role_id(self, value: Optional[pulumi.Input[str]]):
274
+ def role_id(self, value: Optional[pulumi.Input[builtins.str]]):
274
275
  pulumi.set(self, "role_id", value)
275
276
 
276
277
  @property
277
278
  @pulumi.getter(name="secretId")
278
- def secret_id(self) -> Optional[pulumi.Input[str]]:
279
+ def secret_id(self) -> Optional[pulumi.Input[builtins.str]]:
279
280
  """
280
281
  The secret ID of the role to log in with. Required
281
282
  unless `bind_secret_id` is set to false on the role.
@@ -283,7 +284,7 @@ class _AuthBackendLoginState:
283
284
  return pulumi.get(self, "secret_id")
284
285
 
285
286
  @secret_id.setter
286
- def secret_id(self, value: Optional[pulumi.Input[str]]):
287
+ def secret_id(self, value: Optional[pulumi.Input[builtins.str]]):
287
288
  pulumi.set(self, "secret_id", value)
288
289
 
289
290
 
@@ -292,10 +293,10 @@ class AuthBackendLogin(pulumi.CustomResource):
292
293
  def __init__(__self__,
293
294
  resource_name: str,
294
295
  opts: Optional[pulumi.ResourceOptions] = None,
295
- backend: Optional[pulumi.Input[str]] = None,
296
- namespace: Optional[pulumi.Input[str]] = None,
297
- role_id: Optional[pulumi.Input[str]] = None,
298
- secret_id: Optional[pulumi.Input[str]] = None,
296
+ backend: Optional[pulumi.Input[builtins.str]] = None,
297
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
298
+ role_id: Optional[pulumi.Input[builtins.str]] = None,
299
+ secret_id: Optional[pulumi.Input[builtins.str]] = None,
299
300
  __props__=None):
300
301
  """
301
302
  Logs into Vault using the AppRole auth backend. See the [Vault
@@ -328,13 +329,13 @@ class AuthBackendLogin(pulumi.CustomResource):
328
329
 
329
330
  :param str resource_name: The name of the resource.
330
331
  :param pulumi.ResourceOptions opts: Options for the resource.
331
- :param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
332
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
332
+ :param pulumi.Input[builtins.str] backend: The unique path of the Vault backend to log in with.
333
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
333
334
  The value should not contain leading or trailing forward slashes.
334
335
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
335
336
  *Available only for Vault Enterprise*.
336
- :param pulumi.Input[str] role_id: The ID of the role to log in with.
337
- :param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
337
+ :param pulumi.Input[builtins.str] role_id: The ID of the role to log in with.
338
+ :param pulumi.Input[builtins.str] secret_id: The secret ID of the role to log in with. Required
338
339
  unless `bind_secret_id` is set to false on the role.
339
340
  """
340
341
  ...
@@ -387,10 +388,10 @@ class AuthBackendLogin(pulumi.CustomResource):
387
388
  def _internal_init(__self__,
388
389
  resource_name: str,
389
390
  opts: Optional[pulumi.ResourceOptions] = None,
390
- backend: Optional[pulumi.Input[str]] = None,
391
- namespace: Optional[pulumi.Input[str]] = None,
392
- role_id: Optional[pulumi.Input[str]] = None,
393
- secret_id: Optional[pulumi.Input[str]] = None,
391
+ backend: Optional[pulumi.Input[builtins.str]] = None,
392
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
393
+ role_id: Optional[pulumi.Input[builtins.str]] = None,
394
+ secret_id: Optional[pulumi.Input[builtins.str]] = None,
394
395
  __props__=None):
395
396
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
396
397
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -425,17 +426,17 @@ class AuthBackendLogin(pulumi.CustomResource):
425
426
  def get(resource_name: str,
426
427
  id: pulumi.Input[str],
427
428
  opts: Optional[pulumi.ResourceOptions] = None,
428
- accessor: Optional[pulumi.Input[str]] = None,
429
- backend: Optional[pulumi.Input[str]] = None,
430
- client_token: Optional[pulumi.Input[str]] = None,
431
- lease_duration: Optional[pulumi.Input[int]] = None,
432
- lease_started: Optional[pulumi.Input[str]] = None,
433
- metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
434
- namespace: Optional[pulumi.Input[str]] = None,
435
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
436
- renewable: Optional[pulumi.Input[bool]] = None,
437
- role_id: Optional[pulumi.Input[str]] = None,
438
- secret_id: Optional[pulumi.Input[str]] = None) -> 'AuthBackendLogin':
429
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
430
+ backend: Optional[pulumi.Input[builtins.str]] = None,
431
+ client_token: Optional[pulumi.Input[builtins.str]] = None,
432
+ lease_duration: Optional[pulumi.Input[builtins.int]] = None,
433
+ lease_started: Optional[pulumi.Input[builtins.str]] = None,
434
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
435
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
436
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
437
+ renewable: Optional[pulumi.Input[builtins.bool]] = None,
438
+ role_id: Optional[pulumi.Input[builtins.str]] = None,
439
+ secret_id: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendLogin':
439
440
  """
440
441
  Get an existing AuthBackendLogin resource's state with the given name, id, and optional extra
441
442
  properties used to qualify the lookup.
@@ -443,20 +444,20 @@ class AuthBackendLogin(pulumi.CustomResource):
443
444
  :param str resource_name: The unique name of the resulting resource.
444
445
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
445
446
  :param pulumi.ResourceOptions opts: Options for the resource.
446
- :param pulumi.Input[str] accessor: The accessor for the token.
447
- :param pulumi.Input[str] backend: The unique path of the Vault backend to log in with.
448
- :param pulumi.Input[str] client_token: The Vault token created.
449
- :param pulumi.Input[int] lease_duration: How long the token is valid for, in seconds.
450
- :param pulumi.Input[str] lease_started: The date and time the lease started, in RFC 3339 format.
451
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] metadata: The metadata associated with the token.
452
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
447
+ :param pulumi.Input[builtins.str] accessor: The accessor for the token.
448
+ :param pulumi.Input[builtins.str] backend: The unique path of the Vault backend to log in with.
449
+ :param pulumi.Input[builtins.str] client_token: The Vault token created.
450
+ :param pulumi.Input[builtins.int] lease_duration: How long the token is valid for, in seconds.
451
+ :param pulumi.Input[builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
452
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] metadata: The metadata associated with the token.
453
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
453
454
  The value should not contain leading or trailing forward slashes.
454
455
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
455
456
  *Available only for Vault Enterprise*.
456
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: A list of policies applied to the token.
457
- :param pulumi.Input[bool] renewable: Whether the token is renewable or not.
458
- :param pulumi.Input[str] role_id: The ID of the role to log in with.
459
- :param pulumi.Input[str] secret_id: The secret ID of the role to log in with. Required
457
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: A list of policies applied to the token.
458
+ :param pulumi.Input[builtins.bool] renewable: Whether the token is renewable or not.
459
+ :param pulumi.Input[builtins.str] role_id: The ID of the role to log in with.
460
+ :param pulumi.Input[builtins.str] secret_id: The secret ID of the role to log in with. Required
460
461
  unless `bind_secret_id` is set to false on the role.
461
462
  """
462
463
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -478,7 +479,7 @@ class AuthBackendLogin(pulumi.CustomResource):
478
479
 
479
480
  @property
480
481
  @pulumi.getter
481
- def accessor(self) -> pulumi.Output[str]:
482
+ def accessor(self) -> pulumi.Output[builtins.str]:
482
483
  """
483
484
  The accessor for the token.
484
485
  """
@@ -486,7 +487,7 @@ class AuthBackendLogin(pulumi.CustomResource):
486
487
 
487
488
  @property
488
489
  @pulumi.getter
489
- def backend(self) -> pulumi.Output[Optional[str]]:
490
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
490
491
  """
491
492
  The unique path of the Vault backend to log in with.
492
493
  """
@@ -494,7 +495,7 @@ class AuthBackendLogin(pulumi.CustomResource):
494
495
 
495
496
  @property
496
497
  @pulumi.getter(name="clientToken")
497
- def client_token(self) -> pulumi.Output[str]:
498
+ def client_token(self) -> pulumi.Output[builtins.str]:
498
499
  """
499
500
  The Vault token created.
500
501
  """
@@ -502,7 +503,7 @@ class AuthBackendLogin(pulumi.CustomResource):
502
503
 
503
504
  @property
504
505
  @pulumi.getter(name="leaseDuration")
505
- def lease_duration(self) -> pulumi.Output[int]:
506
+ def lease_duration(self) -> pulumi.Output[builtins.int]:
506
507
  """
507
508
  How long the token is valid for, in seconds.
508
509
  """
@@ -510,7 +511,7 @@ class AuthBackendLogin(pulumi.CustomResource):
510
511
 
511
512
  @property
512
513
  @pulumi.getter(name="leaseStarted")
513
- def lease_started(self) -> pulumi.Output[str]:
514
+ def lease_started(self) -> pulumi.Output[builtins.str]:
514
515
  """
515
516
  The date and time the lease started, in RFC 3339 format.
516
517
  """
@@ -518,7 +519,7 @@ class AuthBackendLogin(pulumi.CustomResource):
518
519
 
519
520
  @property
520
521
  @pulumi.getter
521
- def metadata(self) -> pulumi.Output[Mapping[str, str]]:
522
+ def metadata(self) -> pulumi.Output[Mapping[str, builtins.str]]:
522
523
  """
523
524
  The metadata associated with the token.
524
525
  """
@@ -526,7 +527,7 @@ class AuthBackendLogin(pulumi.CustomResource):
526
527
 
527
528
  @property
528
529
  @pulumi.getter
529
- def namespace(self) -> pulumi.Output[Optional[str]]:
530
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
530
531
  """
531
532
  The namespace to provision the resource in.
532
533
  The value should not contain leading or trailing forward slashes.
@@ -537,7 +538,7 @@ class AuthBackendLogin(pulumi.CustomResource):
537
538
 
538
539
  @property
539
540
  @pulumi.getter
540
- def policies(self) -> pulumi.Output[Sequence[str]]:
541
+ def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
541
542
  """
542
543
  A list of policies applied to the token.
543
544
  """
@@ -545,7 +546,7 @@ class AuthBackendLogin(pulumi.CustomResource):
545
546
 
546
547
  @property
547
548
  @pulumi.getter
548
- def renewable(self) -> pulumi.Output[bool]:
549
+ def renewable(self) -> pulumi.Output[builtins.bool]:
549
550
  """
550
551
  Whether the token is renewable or not.
551
552
  """
@@ -553,7 +554,7 @@ class AuthBackendLogin(pulumi.CustomResource):
553
554
 
554
555
  @property
555
556
  @pulumi.getter(name="roleId")
556
- def role_id(self) -> pulumi.Output[str]:
557
+ def role_id(self) -> pulumi.Output[builtins.str]:
557
558
  """
558
559
  The ID of the role to log in with.
559
560
  """
@@ -561,7 +562,7 @@ class AuthBackendLogin(pulumi.CustomResource):
561
562
 
562
563
  @property
563
564
  @pulumi.getter(name="secretId")
564
- def secret_id(self) -> pulumi.Output[Optional[str]]:
565
+ def secret_id(self) -> pulumi.Output[Optional[builtins.str]]:
565
566
  """
566
567
  The secret ID of the role to log in with. Required
567
568
  unless `bind_secret_id` is set to false on the role.