pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,17 +20,17 @@ __all__ = ['SecretScopeArgs', 'SecretScope']
19
20
  @pulumi.input_type
20
21
  class SecretScopeArgs:
21
22
  def __init__(__self__, *,
22
- path: pulumi.Input[str],
23
- scope: pulumi.Input[str],
24
- force: Optional[pulumi.Input[bool]] = None,
25
- namespace: Optional[pulumi.Input[str]] = None):
23
+ path: pulumi.Input[builtins.str],
24
+ scope: pulumi.Input[builtins.str],
25
+ force: Optional[pulumi.Input[builtins.bool]] = None,
26
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
26
27
  """
27
28
  The set of arguments for constructing a SecretScope resource.
28
- :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
29
+ :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
29
30
  not begin or end with a `/`. Defaults to `kmip`.
30
- :param pulumi.Input[str] scope: Name of the scope.
31
- :param pulumi.Input[bool] force: Boolean field to force deletion even if there are managed objects in the scope.
32
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
31
+ :param pulumi.Input[builtins.str] scope: Name of the scope.
32
+ :param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
33
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
33
34
  The value should not contain leading or trailing forward slashes.
34
35
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
36
  *Available only for Vault Enterprise*.
@@ -43,7 +44,7 @@ class SecretScopeArgs:
43
44
 
44
45
  @property
45
46
  @pulumi.getter
46
- def path(self) -> pulumi.Input[str]:
47
+ def path(self) -> pulumi.Input[builtins.str]:
47
48
  """
48
49
  The unique path this backend should be mounted at. Must
49
50
  not begin or end with a `/`. Defaults to `kmip`.
@@ -51,36 +52,36 @@ class SecretScopeArgs:
51
52
  return pulumi.get(self, "path")
52
53
 
53
54
  @path.setter
54
- def path(self, value: pulumi.Input[str]):
55
+ def path(self, value: pulumi.Input[builtins.str]):
55
56
  pulumi.set(self, "path", value)
56
57
 
57
58
  @property
58
59
  @pulumi.getter
59
- def scope(self) -> pulumi.Input[str]:
60
+ def scope(self) -> pulumi.Input[builtins.str]:
60
61
  """
61
62
  Name of the scope.
62
63
  """
63
64
  return pulumi.get(self, "scope")
64
65
 
65
66
  @scope.setter
66
- def scope(self, value: pulumi.Input[str]):
67
+ def scope(self, value: pulumi.Input[builtins.str]):
67
68
  pulumi.set(self, "scope", value)
68
69
 
69
70
  @property
70
71
  @pulumi.getter
71
- def force(self) -> Optional[pulumi.Input[bool]]:
72
+ def force(self) -> Optional[pulumi.Input[builtins.bool]]:
72
73
  """
73
74
  Boolean field to force deletion even if there are managed objects in the scope.
74
75
  """
75
76
  return pulumi.get(self, "force")
76
77
 
77
78
  @force.setter
78
- def force(self, value: Optional[pulumi.Input[bool]]):
79
+ def force(self, value: Optional[pulumi.Input[builtins.bool]]):
79
80
  pulumi.set(self, "force", value)
80
81
 
81
82
  @property
82
83
  @pulumi.getter
83
- def namespace(self) -> Optional[pulumi.Input[str]]:
84
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
84
85
  """
85
86
  The namespace to provision the resource in.
86
87
  The value should not contain leading or trailing forward slashes.
@@ -90,27 +91,27 @@ class SecretScopeArgs:
90
91
  return pulumi.get(self, "namespace")
91
92
 
92
93
  @namespace.setter
93
- def namespace(self, value: Optional[pulumi.Input[str]]):
94
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
94
95
  pulumi.set(self, "namespace", value)
95
96
 
96
97
 
97
98
  @pulumi.input_type
98
99
  class _SecretScopeState:
99
100
  def __init__(__self__, *,
100
- force: Optional[pulumi.Input[bool]] = None,
101
- namespace: Optional[pulumi.Input[str]] = None,
102
- path: Optional[pulumi.Input[str]] = None,
103
- scope: Optional[pulumi.Input[str]] = None):
101
+ force: Optional[pulumi.Input[builtins.bool]] = None,
102
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
103
+ path: Optional[pulumi.Input[builtins.str]] = None,
104
+ scope: Optional[pulumi.Input[builtins.str]] = None):
104
105
  """
105
106
  Input properties used for looking up and filtering SecretScope resources.
106
- :param pulumi.Input[bool] force: Boolean field to force deletion even if there are managed objects in the scope.
107
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
107
+ :param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
108
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
108
109
  The value should not contain leading or trailing forward slashes.
109
110
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
110
111
  *Available only for Vault Enterprise*.
111
- :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
112
+ :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
112
113
  not begin or end with a `/`. Defaults to `kmip`.
113
- :param pulumi.Input[str] scope: Name of the scope.
114
+ :param pulumi.Input[builtins.str] scope: Name of the scope.
114
115
  """
115
116
  if force is not None:
116
117
  pulumi.set(__self__, "force", force)
@@ -123,19 +124,19 @@ class _SecretScopeState:
123
124
 
124
125
  @property
125
126
  @pulumi.getter
126
- def force(self) -> Optional[pulumi.Input[bool]]:
127
+ def force(self) -> Optional[pulumi.Input[builtins.bool]]:
127
128
  """
128
129
  Boolean field to force deletion even if there are managed objects in the scope.
129
130
  """
130
131
  return pulumi.get(self, "force")
131
132
 
132
133
  @force.setter
133
- def force(self, value: Optional[pulumi.Input[bool]]):
134
+ def force(self, value: Optional[pulumi.Input[builtins.bool]]):
134
135
  pulumi.set(self, "force", value)
135
136
 
136
137
  @property
137
138
  @pulumi.getter
138
- def namespace(self) -> Optional[pulumi.Input[str]]:
139
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
139
140
  """
140
141
  The namespace to provision the resource in.
141
142
  The value should not contain leading or trailing forward slashes.
@@ -145,12 +146,12 @@ class _SecretScopeState:
145
146
  return pulumi.get(self, "namespace")
146
147
 
147
148
  @namespace.setter
148
- def namespace(self, value: Optional[pulumi.Input[str]]):
149
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
149
150
  pulumi.set(self, "namespace", value)
150
151
 
151
152
  @property
152
153
  @pulumi.getter
153
- def path(self) -> Optional[pulumi.Input[str]]:
154
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
154
155
  """
155
156
  The unique path this backend should be mounted at. Must
156
157
  not begin or end with a `/`. Defaults to `kmip`.
@@ -158,19 +159,19 @@ class _SecretScopeState:
158
159
  return pulumi.get(self, "path")
159
160
 
160
161
  @path.setter
161
- def path(self, value: Optional[pulumi.Input[str]]):
162
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
162
163
  pulumi.set(self, "path", value)
163
164
 
164
165
  @property
165
166
  @pulumi.getter
166
- def scope(self) -> Optional[pulumi.Input[str]]:
167
+ def scope(self) -> Optional[pulumi.Input[builtins.str]]:
167
168
  """
168
169
  Name of the scope.
169
170
  """
170
171
  return pulumi.get(self, "scope")
171
172
 
172
173
  @scope.setter
173
- def scope(self, value: Optional[pulumi.Input[str]]):
174
+ def scope(self, value: Optional[pulumi.Input[builtins.str]]):
174
175
  pulumi.set(self, "scope", value)
175
176
 
176
177
 
@@ -179,10 +180,10 @@ class SecretScope(pulumi.CustomResource):
179
180
  def __init__(__self__,
180
181
  resource_name: str,
181
182
  opts: Optional[pulumi.ResourceOptions] = None,
182
- force: Optional[pulumi.Input[bool]] = None,
183
- namespace: Optional[pulumi.Input[str]] = None,
184
- path: Optional[pulumi.Input[str]] = None,
185
- scope: Optional[pulumi.Input[str]] = None,
183
+ force: Optional[pulumi.Input[builtins.bool]] = None,
184
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
185
+ path: Optional[pulumi.Input[builtins.str]] = None,
186
+ scope: Optional[pulumi.Input[builtins.str]] = None,
186
187
  __props__=None):
187
188
  """
188
189
  Manages KMIP Secret Scopes in a Vault server. This feature requires
@@ -214,14 +215,14 @@ class SecretScope(pulumi.CustomResource):
214
215
 
215
216
  :param str resource_name: The name of the resource.
216
217
  :param pulumi.ResourceOptions opts: Options for the resource.
217
- :param pulumi.Input[bool] force: Boolean field to force deletion even if there are managed objects in the scope.
218
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
218
+ :param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
219
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
219
220
  The value should not contain leading or trailing forward slashes.
220
221
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
221
222
  *Available only for Vault Enterprise*.
222
- :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
223
+ :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
223
224
  not begin or end with a `/`. Defaults to `kmip`.
224
- :param pulumi.Input[str] scope: Name of the scope.
225
+ :param pulumi.Input[builtins.str] scope: Name of the scope.
225
226
  """
226
227
  ...
227
228
  @overload
@@ -272,10 +273,10 @@ class SecretScope(pulumi.CustomResource):
272
273
  def _internal_init(__self__,
273
274
  resource_name: str,
274
275
  opts: Optional[pulumi.ResourceOptions] = None,
275
- force: Optional[pulumi.Input[bool]] = None,
276
- namespace: Optional[pulumi.Input[str]] = None,
277
- path: Optional[pulumi.Input[str]] = None,
278
- scope: Optional[pulumi.Input[str]] = None,
276
+ force: Optional[pulumi.Input[builtins.bool]] = None,
277
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
278
+ path: Optional[pulumi.Input[builtins.str]] = None,
279
+ scope: Optional[pulumi.Input[builtins.str]] = None,
279
280
  __props__=None):
280
281
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
281
282
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -303,10 +304,10 @@ class SecretScope(pulumi.CustomResource):
303
304
  def get(resource_name: str,
304
305
  id: pulumi.Input[str],
305
306
  opts: Optional[pulumi.ResourceOptions] = None,
306
- force: Optional[pulumi.Input[bool]] = None,
307
- namespace: Optional[pulumi.Input[str]] = None,
308
- path: Optional[pulumi.Input[str]] = None,
309
- scope: Optional[pulumi.Input[str]] = None) -> 'SecretScope':
307
+ force: Optional[pulumi.Input[builtins.bool]] = None,
308
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
309
+ path: Optional[pulumi.Input[builtins.str]] = None,
310
+ scope: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretScope':
310
311
  """
311
312
  Get an existing SecretScope resource's state with the given name, id, and optional extra
312
313
  properties used to qualify the lookup.
@@ -314,14 +315,14 @@ class SecretScope(pulumi.CustomResource):
314
315
  :param str resource_name: The unique name of the resulting resource.
315
316
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
316
317
  :param pulumi.ResourceOptions opts: Options for the resource.
317
- :param pulumi.Input[bool] force: Boolean field to force deletion even if there are managed objects in the scope.
318
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
318
+ :param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
319
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
319
320
  The value should not contain leading or trailing forward slashes.
320
321
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
321
322
  *Available only for Vault Enterprise*.
322
- :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
323
+ :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
323
324
  not begin or end with a `/`. Defaults to `kmip`.
324
- :param pulumi.Input[str] scope: Name of the scope.
325
+ :param pulumi.Input[builtins.str] scope: Name of the scope.
325
326
  """
326
327
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
327
328
 
@@ -335,7 +336,7 @@ class SecretScope(pulumi.CustomResource):
335
336
 
336
337
  @property
337
338
  @pulumi.getter
338
- def force(self) -> pulumi.Output[Optional[bool]]:
339
+ def force(self) -> pulumi.Output[Optional[builtins.bool]]:
339
340
  """
340
341
  Boolean field to force deletion even if there are managed objects in the scope.
341
342
  """
@@ -343,7 +344,7 @@ class SecretScope(pulumi.CustomResource):
343
344
 
344
345
  @property
345
346
  @pulumi.getter
346
- def namespace(self) -> pulumi.Output[Optional[str]]:
347
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
347
348
  """
348
349
  The namespace to provision the resource in.
349
350
  The value should not contain leading or trailing forward slashes.
@@ -354,7 +355,7 @@ class SecretScope(pulumi.CustomResource):
354
355
 
355
356
  @property
356
357
  @pulumi.getter
357
- def path(self) -> pulumi.Output[str]:
358
+ def path(self) -> pulumi.Output[builtins.str]:
358
359
  """
359
360
  The unique path this backend should be mounted at. Must
360
361
  not begin or end with a `/`. Defaults to `kmip`.
@@ -363,7 +364,7 @@ class SecretScope(pulumi.CustomResource):
363
364
 
364
365
  @property
365
366
  @pulumi.getter
366
- def scope(self) -> pulumi.Output[str]:
367
+ def scope(self) -> pulumi.Output[builtins.str]:
367
368
  """
368
369
  Name of the scope.
369
370
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members: