pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members:
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -23,22 +24,22 @@ MYPY = False
23
24
 
24
25
  if not MYPY:
25
26
  class SecretV2CustomMetadataArgsDict(TypedDict):
26
- cas_required: NotRequired[pulumi.Input[bool]]
27
+ cas_required: NotRequired[pulumi.Input[builtins.bool]]
27
28
  """
28
29
  If true, all keys will require the cas parameter to be set on all write requests.
29
30
  """
30
- data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
31
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
31
32
  """
32
33
  A mapping whose keys are the top-level data keys returned from
33
34
  Vault and whose values are the corresponding values. This map can only
34
35
  represent string data, so any non-string values returned from Vault are
35
36
  serialized as JSON.
36
37
  """
37
- delete_version_after: NotRequired[pulumi.Input[int]]
38
+ delete_version_after: NotRequired[pulumi.Input[builtins.int]]
38
39
  """
39
40
  If set, specifies the length of time before a version is deleted.
40
41
  """
41
- max_versions: NotRequired[pulumi.Input[int]]
42
+ max_versions: NotRequired[pulumi.Input[builtins.int]]
42
43
  """
43
44
  The number of versions to keep per key.
44
45
  """
@@ -48,18 +49,18 @@ elif False:
48
49
  @pulumi.input_type
49
50
  class SecretV2CustomMetadataArgs:
50
51
  def __init__(__self__, *,
51
- cas_required: Optional[pulumi.Input[bool]] = None,
52
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
53
- delete_version_after: Optional[pulumi.Input[int]] = None,
54
- max_versions: Optional[pulumi.Input[int]] = None):
52
+ cas_required: Optional[pulumi.Input[builtins.bool]] = None,
53
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
54
+ delete_version_after: Optional[pulumi.Input[builtins.int]] = None,
55
+ max_versions: Optional[pulumi.Input[builtins.int]] = None):
55
56
  """
56
- :param pulumi.Input[bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
57
- :param pulumi.Input[Mapping[str, pulumi.Input[str]]] data: A mapping whose keys are the top-level data keys returned from
57
+ :param pulumi.Input[builtins.bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
58
+ :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
58
59
  Vault and whose values are the corresponding values. This map can only
59
60
  represent string data, so any non-string values returned from Vault are
60
61
  serialized as JSON.
61
- :param pulumi.Input[int] delete_version_after: If set, specifies the length of time before a version is deleted.
62
- :param pulumi.Input[int] max_versions: The number of versions to keep per key.
62
+ :param pulumi.Input[builtins.int] delete_version_after: If set, specifies the length of time before a version is deleted.
63
+ :param pulumi.Input[builtins.int] max_versions: The number of versions to keep per key.
63
64
  """
64
65
  if cas_required is not None:
65
66
  pulumi.set(__self__, "cas_required", cas_required)
@@ -72,19 +73,19 @@ class SecretV2CustomMetadataArgs:
72
73
 
73
74
  @property
74
75
  @pulumi.getter(name="casRequired")
75
- def cas_required(self) -> Optional[pulumi.Input[bool]]:
76
+ def cas_required(self) -> Optional[pulumi.Input[builtins.bool]]:
76
77
  """
77
78
  If true, all keys will require the cas parameter to be set on all write requests.
78
79
  """
79
80
  return pulumi.get(self, "cas_required")
80
81
 
81
82
  @cas_required.setter
82
- def cas_required(self, value: Optional[pulumi.Input[bool]]):
83
+ def cas_required(self, value: Optional[pulumi.Input[builtins.bool]]):
83
84
  pulumi.set(self, "cas_required", value)
84
85
 
85
86
  @property
86
87
  @pulumi.getter
87
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
88
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
88
89
  """
89
90
  A mapping whose keys are the top-level data keys returned from
90
91
  Vault and whose values are the corresponding values. This map can only
@@ -94,31 +95,31 @@ class SecretV2CustomMetadataArgs:
94
95
  return pulumi.get(self, "data")
95
96
 
96
97
  @data.setter
97
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
98
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
98
99
  pulumi.set(self, "data", value)
99
100
 
100
101
  @property
101
102
  @pulumi.getter(name="deleteVersionAfter")
102
- def delete_version_after(self) -> Optional[pulumi.Input[int]]:
103
+ def delete_version_after(self) -> Optional[pulumi.Input[builtins.int]]:
103
104
  """
104
105
  If set, specifies the length of time before a version is deleted.
105
106
  """
106
107
  return pulumi.get(self, "delete_version_after")
107
108
 
108
109
  @delete_version_after.setter
109
- def delete_version_after(self, value: Optional[pulumi.Input[int]]):
110
+ def delete_version_after(self, value: Optional[pulumi.Input[builtins.int]]):
110
111
  pulumi.set(self, "delete_version_after", value)
111
112
 
112
113
  @property
113
114
  @pulumi.getter(name="maxVersions")
114
- def max_versions(self) -> Optional[pulumi.Input[int]]:
115
+ def max_versions(self) -> Optional[pulumi.Input[builtins.int]]:
115
116
  """
116
117
  The number of versions to keep per key.
117
118
  """
118
119
  return pulumi.get(self, "max_versions")
119
120
 
120
121
  @max_versions.setter
121
- def max_versions(self, value: Optional[pulumi.Input[int]]):
122
+ def max_versions(self, value: Optional[pulumi.Input[builtins.int]]):
122
123
  pulumi.set(self, "max_versions", value)
123
124
 
124
125
 
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -54,7 +55,7 @@ class GetSecretResult:
54
55
 
55
56
  @property
56
57
  @pulumi.getter
57
- def data(self) -> Mapping[str, str]:
58
+ def data(self) -> Mapping[str, builtins.str]:
58
59
  """
59
60
  A mapping whose keys are the top-level data keys returned from
60
61
  Vault and whose values are the corresponding values. This map can only
@@ -65,7 +66,7 @@ class GetSecretResult:
65
66
 
66
67
  @property
67
68
  @pulumi.getter(name="dataJson")
68
- def data_json(self) -> str:
69
+ def data_json(self) -> builtins.str:
69
70
  """
70
71
  JSON-encoded string that that is
71
72
  read as the secret data at the given path.
@@ -74,7 +75,7 @@ class GetSecretResult:
74
75
 
75
76
  @property
76
77
  @pulumi.getter
77
- def id(self) -> str:
78
+ def id(self) -> builtins.str:
78
79
  """
79
80
  The provider-assigned unique ID for this managed resource.
80
81
  """
@@ -82,7 +83,7 @@ class GetSecretResult:
82
83
 
83
84
  @property
84
85
  @pulumi.getter(name="leaseDuration")
85
- def lease_duration(self) -> int:
86
+ def lease_duration(self) -> builtins.int:
86
87
  """
87
88
  The duration of the secret lease, in seconds. Once
88
89
  this time has passed any plan generated with this data may fail to apply.
@@ -91,7 +92,7 @@ class GetSecretResult:
91
92
 
92
93
  @property
93
94
  @pulumi.getter(name="leaseId")
94
- def lease_id(self) -> str:
95
+ def lease_id(self) -> builtins.str:
95
96
  """
96
97
  The lease identifier assigned by Vault, if any.
97
98
  """
@@ -99,7 +100,7 @@ class GetSecretResult:
99
100
 
100
101
  @property
101
102
  @pulumi.getter(name="leaseRenewable")
102
- def lease_renewable(self) -> bool:
103
+ def lease_renewable(self) -> builtins.bool:
103
104
  """
104
105
  True if the duration of this lease can be extended
105
106
  through renewal.
@@ -108,12 +109,12 @@ class GetSecretResult:
108
109
 
109
110
  @property
110
111
  @pulumi.getter
111
- def namespace(self) -> Optional[str]:
112
+ def namespace(self) -> Optional[builtins.str]:
112
113
  return pulumi.get(self, "namespace")
113
114
 
114
115
  @property
115
116
  @pulumi.getter
116
- def path(self) -> str:
117
+ def path(self) -> builtins.str:
117
118
  return pulumi.get(self, "path")
118
119
 
119
120
 
@@ -133,8 +134,8 @@ class AwaitableGetSecretResult(GetSecretResult):
133
134
  path=self.path)
134
135
 
135
136
 
136
- def get_secret(namespace: Optional[str] = None,
137
- path: Optional[str] = None,
137
+ def get_secret(namespace: Optional[builtins.str] = None,
138
+ path: Optional[builtins.str] = None,
138
139
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
139
140
  """
140
141
  ## Example Usage
@@ -165,11 +166,11 @@ def get_secret(namespace: Optional[str] = None,
165
166
  Use of this resource requires the `read` capability on the given path.
166
167
 
167
168
 
168
- :param str namespace: The namespace of the target resource.
169
+ :param builtins.str namespace: The namespace of the target resource.
169
170
  The value should not contain leading or trailing forward slashes.
170
171
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
171
172
  *Available only for Vault Enterprise*.
172
- :param str path: Full path of the KV-V1 secret.
173
+ :param builtins.str path: Full path of the KV-V1 secret.
173
174
  """
174
175
  __args__ = dict()
175
176
  __args__['namespace'] = namespace
@@ -186,8 +187,8 @@ def get_secret(namespace: Optional[str] = None,
186
187
  lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
187
188
  namespace=pulumi.get(__ret__, 'namespace'),
188
189
  path=pulumi.get(__ret__, 'path'))
189
- def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
190
- path: Optional[pulumi.Input[str]] = None,
190
+ def get_secret_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
191
+ path: Optional[pulumi.Input[builtins.str]] = None,
191
192
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
192
193
  """
193
194
  ## Example Usage
@@ -218,11 +219,11 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
218
219
  Use of this resource requires the `read` capability on the given path.
219
220
 
220
221
 
221
- :param str namespace: The namespace of the target resource.
222
+ :param builtins.str namespace: The namespace of the target resource.
222
223
  The value should not contain leading or trailing forward slashes.
223
224
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
224
225
  *Available only for Vault Enterprise*.
225
- :param str path: Full path of the KV-V1 secret.
226
+ :param builtins.str path: Full path of the KV-V1 secret.
226
227
  """
227
228
  __args__ = dict()
228
229
  __args__['namespace'] = namespace
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -57,7 +58,7 @@ class GetSecretSubkeysV2Result:
57
58
 
58
59
  @property
59
60
  @pulumi.getter
60
- def data(self) -> Mapping[str, str]:
61
+ def data(self) -> Mapping[str, builtins.str]:
61
62
  """
62
63
  Subkeys for the KV-V2 secret stored as a serialized map of strings.
63
64
  """
@@ -65,7 +66,7 @@ class GetSecretSubkeysV2Result:
65
66
 
66
67
  @property
67
68
  @pulumi.getter(name="dataJson")
68
- def data_json(self) -> str:
69
+ def data_json(self) -> builtins.str:
69
70
  """
70
71
  Subkeys for the KV-V2 secret read from Vault.
71
72
  """
@@ -73,12 +74,12 @@ class GetSecretSubkeysV2Result:
73
74
 
74
75
  @property
75
76
  @pulumi.getter
76
- def depth(self) -> Optional[int]:
77
+ def depth(self) -> Optional[builtins.int]:
77
78
  return pulumi.get(self, "depth")
78
79
 
79
80
  @property
80
81
  @pulumi.getter
81
- def id(self) -> str:
82
+ def id(self) -> builtins.str:
82
83
  """
83
84
  The provider-assigned unique ID for this managed resource.
84
85
  """
@@ -86,22 +87,22 @@ class GetSecretSubkeysV2Result:
86
87
 
87
88
  @property
88
89
  @pulumi.getter
89
- def mount(self) -> str:
90
+ def mount(self) -> builtins.str:
90
91
  return pulumi.get(self, "mount")
91
92
 
92
93
  @property
93
94
  @pulumi.getter
94
- def name(self) -> str:
95
+ def name(self) -> builtins.str:
95
96
  return pulumi.get(self, "name")
96
97
 
97
98
  @property
98
99
  @pulumi.getter
99
- def namespace(self) -> Optional[str]:
100
+ def namespace(self) -> Optional[builtins.str]:
100
101
  return pulumi.get(self, "namespace")
101
102
 
102
103
  @property
103
104
  @pulumi.getter
104
- def path(self) -> str:
105
+ def path(self) -> builtins.str:
105
106
  """
106
107
  Full path where the KV-V2 secrets are listed.
107
108
  """
@@ -109,7 +110,7 @@ class GetSecretSubkeysV2Result:
109
110
 
110
111
  @property
111
112
  @pulumi.getter
112
- def version(self) -> Optional[int]:
113
+ def version(self) -> Optional[builtins.int]:
113
114
  return pulumi.get(self, "version")
114
115
 
115
116
 
@@ -130,11 +131,11 @@ class AwaitableGetSecretSubkeysV2Result(GetSecretSubkeysV2Result):
130
131
  version=self.version)
131
132
 
132
133
 
133
- def get_secret_subkeys_v2(depth: Optional[int] = None,
134
- mount: Optional[str] = None,
135
- name: Optional[str] = None,
136
- namespace: Optional[str] = None,
137
- version: Optional[int] = None,
134
+ def get_secret_subkeys_v2(depth: Optional[builtins.int] = None,
135
+ mount: Optional[builtins.str] = None,
136
+ name: Optional[builtins.str] = None,
137
+ namespace: Optional[builtins.str] = None,
138
+ version: Optional[builtins.int] = None,
138
139
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretSubkeysV2Result:
139
140
  """
140
141
  ## Example Usage
@@ -167,20 +168,20 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
167
168
  Use of this resource requires the `read` capability on the given path.
168
169
 
169
170
 
170
- :param int depth: Specifies the deepest nesting level to provide in the output.
171
+ :param builtins.int depth: Specifies the deepest nesting level to provide in the output.
171
172
  If non-zero, keys that reside at the specified depth value will be
172
173
  artificially treated as leaves and will thus be `null` even if further
173
174
  underlying sub-keys exist.
174
- :param str mount: Path where KV-V2 engine is mounted.
175
- :param str name: Full name of the secret. For a nested secret
175
+ :param builtins.str mount: Path where KV-V2 engine is mounted.
176
+ :param builtins.str name: Full name of the secret. For a nested secret
176
177
  the name is the nested path excluding the mount and data
177
178
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
178
179
  the name is `foo/bar/baz`.
179
- :param str namespace: The namespace of the target resource.
180
+ :param builtins.str namespace: The namespace of the target resource.
180
181
  The value should not contain leading or trailing forward slashes.
181
182
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
182
183
  *Available only for Vault Enterprise*.
183
- :param int version: Specifies the version to return. If not
184
+ :param builtins.int version: Specifies the version to return. If not
184
185
  set the latest version is returned.
185
186
  """
186
187
  __args__ = dict()
@@ -202,11 +203,11 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
202
203
  namespace=pulumi.get(__ret__, 'namespace'),
203
204
  path=pulumi.get(__ret__, 'path'),
204
205
  version=pulumi.get(__ret__, 'version'))
205
- def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] = None,
206
- mount: Optional[pulumi.Input[str]] = None,
207
- name: Optional[pulumi.Input[str]] = None,
208
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
209
- version: Optional[pulumi.Input[Optional[int]]] = None,
206
+ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[builtins.int]]] = None,
207
+ mount: Optional[pulumi.Input[builtins.str]] = None,
208
+ name: Optional[pulumi.Input[builtins.str]] = None,
209
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
210
+ version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
210
211
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretSubkeysV2Result]:
211
212
  """
212
213
  ## Example Usage
@@ -239,20 +240,20 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
239
240
  Use of this resource requires the `read` capability on the given path.
240
241
 
241
242
 
242
- :param int depth: Specifies the deepest nesting level to provide in the output.
243
+ :param builtins.int depth: Specifies the deepest nesting level to provide in the output.
243
244
  If non-zero, keys that reside at the specified depth value will be
244
245
  artificially treated as leaves and will thus be `null` even if further
245
246
  underlying sub-keys exist.
246
- :param str mount: Path where KV-V2 engine is mounted.
247
- :param str name: Full name of the secret. For a nested secret
247
+ :param builtins.str mount: Path where KV-V2 engine is mounted.
248
+ :param builtins.str name: Full name of the secret. For a nested secret
248
249
  the name is the nested path excluding the mount and data
249
250
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
250
251
  the name is `foo/bar/baz`.
251
- :param str namespace: The namespace of the target resource.
252
+ :param builtins.str namespace: The namespace of the target resource.
252
253
  The value should not contain leading or trailing forward slashes.
253
254
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
254
255
  *Available only for Vault Enterprise*.
255
- :param int version: Specifies the version to return. If not
256
+ :param builtins.int version: Specifies the version to return. If not
256
257
  set the latest version is returned.
257
258
  """
258
259
  __args__ = dict()
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -66,7 +67,7 @@ class GetSecretV2Result:
66
67
 
67
68
  @property
68
69
  @pulumi.getter(name="createdTime")
69
- def created_time(self) -> str:
70
+ def created_time(self) -> builtins.str:
70
71
  """
71
72
  Time at which secret was created.
72
73
  """
@@ -74,7 +75,7 @@ class GetSecretV2Result:
74
75
 
75
76
  @property
76
77
  @pulumi.getter(name="customMetadata")
77
- def custom_metadata(self) -> Mapping[str, str]:
78
+ def custom_metadata(self) -> Mapping[str, builtins.str]:
78
79
  """
79
80
  Custom metadata for the secret.
80
81
  """
@@ -82,7 +83,7 @@ class GetSecretV2Result:
82
83
 
83
84
  @property
84
85
  @pulumi.getter
85
- def data(self) -> Mapping[str, str]:
86
+ def data(self) -> Mapping[str, builtins.str]:
86
87
  """
87
88
  A mapping whose keys are the top-level data keys returned from
88
89
  Vault and whose values are the corresponding values. This map can only
@@ -93,7 +94,7 @@ class GetSecretV2Result:
93
94
 
94
95
  @property
95
96
  @pulumi.getter(name="dataJson")
96
- def data_json(self) -> str:
97
+ def data_json(self) -> builtins.str:
97
98
  """
98
99
  JSON-encoded string that that is
99
100
  read as the secret data at the given path.
@@ -102,7 +103,7 @@ class GetSecretV2Result:
102
103
 
103
104
  @property
104
105
  @pulumi.getter(name="deletionTime")
105
- def deletion_time(self) -> str:
106
+ def deletion_time(self) -> builtins.str:
106
107
  """
107
108
  Deletion time for the secret.
108
109
  """
@@ -110,7 +111,7 @@ class GetSecretV2Result:
110
111
 
111
112
  @property
112
113
  @pulumi.getter
113
- def destroyed(self) -> bool:
114
+ def destroyed(self) -> builtins.bool:
114
115
  """
115
116
  Indicates whether the secret has been destroyed.
116
117
  """
@@ -118,7 +119,7 @@ class GetSecretV2Result:
118
119
 
119
120
  @property
120
121
  @pulumi.getter
121
- def id(self) -> str:
122
+ def id(self) -> builtins.str:
122
123
  """
123
124
  The provider-assigned unique ID for this managed resource.
124
125
  """
@@ -126,22 +127,22 @@ class GetSecretV2Result:
126
127
 
127
128
  @property
128
129
  @pulumi.getter
129
- def mount(self) -> str:
130
+ def mount(self) -> builtins.str:
130
131
  return pulumi.get(self, "mount")
131
132
 
132
133
  @property
133
134
  @pulumi.getter
134
- def name(self) -> str:
135
+ def name(self) -> builtins.str:
135
136
  return pulumi.get(self, "name")
136
137
 
137
138
  @property
138
139
  @pulumi.getter
139
- def namespace(self) -> Optional[str]:
140
+ def namespace(self) -> Optional[builtins.str]:
140
141
  return pulumi.get(self, "namespace")
141
142
 
142
143
  @property
143
144
  @pulumi.getter
144
- def path(self) -> str:
145
+ def path(self) -> builtins.str:
145
146
  """
146
147
  Full path where the KVV2 secret is written.
147
148
  """
@@ -149,7 +150,7 @@ class GetSecretV2Result:
149
150
 
150
151
  @property
151
152
  @pulumi.getter
152
- def version(self) -> Optional[int]:
153
+ def version(self) -> Optional[builtins.int]:
153
154
  """
154
155
  Version of the secret.
155
156
  """
@@ -176,10 +177,10 @@ class AwaitableGetSecretV2Result(GetSecretV2Result):
176
177
  version=self.version)
177
178
 
178
179
 
179
- def get_secret_v2(mount: Optional[str] = None,
180
- name: Optional[str] = None,
181
- namespace: Optional[str] = None,
182
- version: Optional[int] = None,
180
+ def get_secret_v2(mount: Optional[builtins.str] = None,
181
+ name: Optional[builtins.str] = None,
182
+ namespace: Optional[builtins.str] = None,
183
+ version: Optional[builtins.int] = None,
183
184
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretV2Result:
184
185
  """
185
186
  ## Example Usage
@@ -213,16 +214,16 @@ def get_secret_v2(mount: Optional[str] = None,
213
214
  Use of this resource requires the `read` capability on the given path.
214
215
 
215
216
 
216
- :param str mount: Path where KV-V2 engine is mounted.
217
- :param str name: Full name of the secret. For a nested secret
217
+ :param builtins.str mount: Path where KV-V2 engine is mounted.
218
+ :param builtins.str name: Full name of the secret. For a nested secret
218
219
  the name is the nested path excluding the mount and data
219
220
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
220
221
  the name is `foo/bar/baz`.
221
- :param str namespace: The namespace of the target resource.
222
+ :param builtins.str namespace: The namespace of the target resource.
222
223
  The value should not contain leading or trailing forward slashes.
223
224
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
224
225
  *Available only for Vault Enterprise*.
225
- :param int version: Version of the secret to retrieve.
226
+ :param builtins.int version: Version of the secret to retrieve.
226
227
  """
227
228
  __args__ = dict()
228
229
  __args__['mount'] = mount
@@ -245,10 +246,10 @@ def get_secret_v2(mount: Optional[str] = None,
245
246
  namespace=pulumi.get(__ret__, 'namespace'),
246
247
  path=pulumi.get(__ret__, 'path'),
247
248
  version=pulumi.get(__ret__, 'version'))
248
- def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
249
- name: Optional[pulumi.Input[str]] = None,
250
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
251
- version: Optional[pulumi.Input[Optional[int]]] = None,
249
+ def get_secret_v2_output(mount: Optional[pulumi.Input[builtins.str]] = None,
250
+ name: Optional[pulumi.Input[builtins.str]] = None,
251
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
252
+ version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
252
253
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretV2Result]:
253
254
  """
254
255
  ## Example Usage
@@ -282,16 +283,16 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
282
283
  Use of this resource requires the `read` capability on the given path.
283
284
 
284
285
 
285
- :param str mount: Path where KV-V2 engine is mounted.
286
- :param str name: Full name of the secret. For a nested secret
286
+ :param builtins.str mount: Path where KV-V2 engine is mounted.
287
+ :param builtins.str name: Full name of the secret. For a nested secret
287
288
  the name is the nested path excluding the mount and data
288
289
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
289
290
  the name is `foo/bar/baz`.
290
- :param str namespace: The namespace of the target resource.
291
+ :param builtins.str namespace: The namespace of the target resource.
291
292
  The value should not contain leading or trailing forward slashes.
292
293
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
293
294
  *Available only for Vault Enterprise*.
294
- :param int version: Version of the secret to retrieve.
295
+ :param builtins.int version: Version of the secret to retrieve.
295
296
  """
296
297
  __args__ = dict()
297
298
  __args__['mount'] = mount