pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,23 +20,23 @@ __all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
19
20
  @pulumi.input_type
20
21
  class AuthBackendUserArgs:
21
22
  def __init__(__self__, *,
22
- username: pulumi.Input[str],
23
- backend: Optional[pulumi.Input[str]] = None,
24
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
- namespace: Optional[pulumi.Input[str]] = None,
26
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
23
+ username: pulumi.Input[builtins.str],
24
+ backend: Optional[pulumi.Input[builtins.str]] = None,
25
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
27
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
27
28
  """
28
29
  The set of arguments for constructing a AuthBackendUser resource.
29
- :param pulumi.Input[str] username: The LDAP username
30
- :param pulumi.Input[str] backend: Path to the authentication backend
30
+ :param pulumi.Input[builtins.str] username: The LDAP username
31
+ :param pulumi.Input[builtins.str] backend: Path to the authentication backend
31
32
 
32
33
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
33
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
34
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
34
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
35
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
35
36
  The value should not contain leading or trailing forward slashes.
36
37
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
37
38
  *Available only for Vault Enterprise*.
38
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
39
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
39
40
  """
40
41
  pulumi.set(__self__, "username", username)
41
42
  if backend is not None:
@@ -49,19 +50,19 @@ class AuthBackendUserArgs:
49
50
 
50
51
  @property
51
52
  @pulumi.getter
52
- def username(self) -> pulumi.Input[str]:
53
+ def username(self) -> pulumi.Input[builtins.str]:
53
54
  """
54
55
  The LDAP username
55
56
  """
56
57
  return pulumi.get(self, "username")
57
58
 
58
59
  @username.setter
59
- def username(self, value: pulumi.Input[str]):
60
+ def username(self, value: pulumi.Input[builtins.str]):
60
61
  pulumi.set(self, "username", value)
61
62
 
62
63
  @property
63
64
  @pulumi.getter
64
- def backend(self) -> Optional[pulumi.Input[str]]:
65
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
65
66
  """
66
67
  Path to the authentication backend
67
68
 
@@ -70,24 +71,24 @@ class AuthBackendUserArgs:
70
71
  return pulumi.get(self, "backend")
71
72
 
72
73
  @backend.setter
73
- def backend(self, value: Optional[pulumi.Input[str]]):
74
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
74
75
  pulumi.set(self, "backend", value)
75
76
 
76
77
  @property
77
78
  @pulumi.getter
78
- def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
79
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
79
80
  """
80
81
  Override LDAP groups which should be granted to user
81
82
  """
82
83
  return pulumi.get(self, "groups")
83
84
 
84
85
  @groups.setter
85
- def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
86
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
86
87
  pulumi.set(self, "groups", value)
87
88
 
88
89
  @property
89
90
  @pulumi.getter
90
- def namespace(self) -> Optional[pulumi.Input[str]]:
91
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
91
92
  """
92
93
  The namespace to provision the resource in.
93
94
  The value should not contain leading or trailing forward slashes.
@@ -97,42 +98,42 @@ class AuthBackendUserArgs:
97
98
  return pulumi.get(self, "namespace")
98
99
 
99
100
  @namespace.setter
100
- def namespace(self, value: Optional[pulumi.Input[str]]):
101
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
101
102
  pulumi.set(self, "namespace", value)
102
103
 
103
104
  @property
104
105
  @pulumi.getter
105
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
106
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
106
107
  """
107
108
  Policies which should be granted to user
108
109
  """
109
110
  return pulumi.get(self, "policies")
110
111
 
111
112
  @policies.setter
112
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
113
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
113
114
  pulumi.set(self, "policies", value)
114
115
 
115
116
 
116
117
  @pulumi.input_type
117
118
  class _AuthBackendUserState:
118
119
  def __init__(__self__, *,
119
- backend: Optional[pulumi.Input[str]] = None,
120
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
121
- namespace: Optional[pulumi.Input[str]] = None,
122
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
123
- username: Optional[pulumi.Input[str]] = None):
120
+ backend: Optional[pulumi.Input[builtins.str]] = None,
121
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
122
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
123
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
124
+ username: Optional[pulumi.Input[builtins.str]] = None):
124
125
  """
125
126
  Input properties used for looking up and filtering AuthBackendUser resources.
126
- :param pulumi.Input[str] backend: Path to the authentication backend
127
+ :param pulumi.Input[builtins.str] backend: Path to the authentication backend
127
128
 
128
129
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
129
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
130
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
130
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
131
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
131
132
  The value should not contain leading or trailing forward slashes.
132
133
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
133
134
  *Available only for Vault Enterprise*.
134
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
135
- :param pulumi.Input[str] username: The LDAP username
135
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
136
+ :param pulumi.Input[builtins.str] username: The LDAP username
136
137
  """
137
138
  if backend is not None:
138
139
  pulumi.set(__self__, "backend", backend)
@@ -147,7 +148,7 @@ class _AuthBackendUserState:
147
148
 
148
149
  @property
149
150
  @pulumi.getter
150
- def backend(self) -> Optional[pulumi.Input[str]]:
151
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
151
152
  """
152
153
  Path to the authentication backend
153
154
 
@@ -156,24 +157,24 @@ class _AuthBackendUserState:
156
157
  return pulumi.get(self, "backend")
157
158
 
158
159
  @backend.setter
159
- def backend(self, value: Optional[pulumi.Input[str]]):
160
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
160
161
  pulumi.set(self, "backend", value)
161
162
 
162
163
  @property
163
164
  @pulumi.getter
164
- def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
165
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
165
166
  """
166
167
  Override LDAP groups which should be granted to user
167
168
  """
168
169
  return pulumi.get(self, "groups")
169
170
 
170
171
  @groups.setter
171
- def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
172
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
172
173
  pulumi.set(self, "groups", value)
173
174
 
174
175
  @property
175
176
  @pulumi.getter
176
- def namespace(self) -> Optional[pulumi.Input[str]]:
177
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
177
178
  """
178
179
  The namespace to provision the resource in.
179
180
  The value should not contain leading or trailing forward slashes.
@@ -183,31 +184,31 @@ class _AuthBackendUserState:
183
184
  return pulumi.get(self, "namespace")
184
185
 
185
186
  @namespace.setter
186
- def namespace(self, value: Optional[pulumi.Input[str]]):
187
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
187
188
  pulumi.set(self, "namespace", value)
188
189
 
189
190
  @property
190
191
  @pulumi.getter
191
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
192
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
192
193
  """
193
194
  Policies which should be granted to user
194
195
  """
195
196
  return pulumi.get(self, "policies")
196
197
 
197
198
  @policies.setter
198
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
199
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
199
200
  pulumi.set(self, "policies", value)
200
201
 
201
202
  @property
202
203
  @pulumi.getter
203
- def username(self) -> Optional[pulumi.Input[str]]:
204
+ def username(self) -> Optional[pulumi.Input[builtins.str]]:
204
205
  """
205
206
  The LDAP username
206
207
  """
207
208
  return pulumi.get(self, "username")
208
209
 
209
210
  @username.setter
210
- def username(self, value: Optional[pulumi.Input[str]]):
211
+ def username(self, value: Optional[pulumi.Input[builtins.str]]):
211
212
  pulumi.set(self, "username", value)
212
213
 
213
214
 
@@ -216,11 +217,11 @@ class AuthBackendUser(pulumi.CustomResource):
216
217
  def __init__(__self__,
217
218
  resource_name: str,
218
219
  opts: Optional[pulumi.ResourceOptions] = None,
219
- backend: Optional[pulumi.Input[str]] = None,
220
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
221
- namespace: Optional[pulumi.Input[str]] = None,
222
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
223
- username: Optional[pulumi.Input[str]] = None,
220
+ backend: Optional[pulumi.Input[builtins.str]] = None,
221
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
222
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
223
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
224
+ username: Optional[pulumi.Input[builtins.str]] = None,
224
225
  __props__=None):
225
226
  """
226
227
  Provides a resource to create a user in an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
@@ -259,16 +260,16 @@ class AuthBackendUser(pulumi.CustomResource):
259
260
 
260
261
  :param str resource_name: The name of the resource.
261
262
  :param pulumi.ResourceOptions opts: Options for the resource.
262
- :param pulumi.Input[str] backend: Path to the authentication backend
263
+ :param pulumi.Input[builtins.str] backend: Path to the authentication backend
263
264
 
264
265
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
265
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
266
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
266
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
267
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
267
268
  The value should not contain leading or trailing forward slashes.
268
269
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
269
270
  *Available only for Vault Enterprise*.
270
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
271
- :param pulumi.Input[str] username: The LDAP username
271
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
272
+ :param pulumi.Input[builtins.str] username: The LDAP username
272
273
  """
273
274
  ...
274
275
  @overload
@@ -326,11 +327,11 @@ class AuthBackendUser(pulumi.CustomResource):
326
327
  def _internal_init(__self__,
327
328
  resource_name: str,
328
329
  opts: Optional[pulumi.ResourceOptions] = None,
329
- backend: Optional[pulumi.Input[str]] = None,
330
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
331
- namespace: Optional[pulumi.Input[str]] = None,
332
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
333
- username: Optional[pulumi.Input[str]] = None,
330
+ backend: Optional[pulumi.Input[builtins.str]] = None,
331
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
332
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
333
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
334
+ username: Optional[pulumi.Input[builtins.str]] = None,
334
335
  __props__=None):
335
336
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
336
337
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -357,11 +358,11 @@ class AuthBackendUser(pulumi.CustomResource):
357
358
  def get(resource_name: str,
358
359
  id: pulumi.Input[str],
359
360
  opts: Optional[pulumi.ResourceOptions] = None,
360
- backend: Optional[pulumi.Input[str]] = None,
361
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
362
- namespace: Optional[pulumi.Input[str]] = None,
363
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
364
- username: Optional[pulumi.Input[str]] = None) -> 'AuthBackendUser':
361
+ backend: Optional[pulumi.Input[builtins.str]] = None,
362
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
363
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
364
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
365
+ username: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendUser':
365
366
  """
366
367
  Get an existing AuthBackendUser resource's state with the given name, id, and optional extra
367
368
  properties used to qualify the lookup.
@@ -369,16 +370,16 @@ class AuthBackendUser(pulumi.CustomResource):
369
370
  :param str resource_name: The unique name of the resulting resource.
370
371
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
371
372
  :param pulumi.ResourceOptions opts: Options for the resource.
372
- :param pulumi.Input[str] backend: Path to the authentication backend
373
+ :param pulumi.Input[builtins.str] backend: Path to the authentication backend
373
374
 
374
375
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
375
- :param pulumi.Input[Sequence[pulumi.Input[str]]] groups: Override LDAP groups which should be granted to user
376
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
376
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
377
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
377
378
  The value should not contain leading or trailing forward slashes.
378
379
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
379
380
  *Available only for Vault Enterprise*.
380
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: Policies which should be granted to user
381
- :param pulumi.Input[str] username: The LDAP username
381
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
382
+ :param pulumi.Input[builtins.str] username: The LDAP username
382
383
  """
383
384
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
384
385
 
@@ -393,7 +394,7 @@ class AuthBackendUser(pulumi.CustomResource):
393
394
 
394
395
  @property
395
396
  @pulumi.getter
396
- def backend(self) -> pulumi.Output[Optional[str]]:
397
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
397
398
  """
398
399
  Path to the authentication backend
399
400
 
@@ -403,7 +404,7 @@ class AuthBackendUser(pulumi.CustomResource):
403
404
 
404
405
  @property
405
406
  @pulumi.getter
406
- def groups(self) -> pulumi.Output[Sequence[str]]:
407
+ def groups(self) -> pulumi.Output[Sequence[builtins.str]]:
407
408
  """
408
409
  Override LDAP groups which should be granted to user
409
410
  """
@@ -411,7 +412,7 @@ class AuthBackendUser(pulumi.CustomResource):
411
412
 
412
413
  @property
413
414
  @pulumi.getter
414
- def namespace(self) -> pulumi.Output[Optional[str]]:
415
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
415
416
  """
416
417
  The namespace to provision the resource in.
417
418
  The value should not contain leading or trailing forward slashes.
@@ -422,7 +423,7 @@ class AuthBackendUser(pulumi.CustomResource):
422
423
 
423
424
  @property
424
425
  @pulumi.getter
425
- def policies(self) -> pulumi.Output[Sequence[str]]:
426
+ def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
426
427
  """
427
428
  Policies which should be granted to user
428
429
  """
@@ -430,7 +431,7 @@ class AuthBackendUser(pulumi.CustomResource):
430
431
 
431
432
  @property
432
433
  @pulumi.getter
433
- def username(self) -> pulumi.Output[str]:
434
+ def username(self) -> pulumi.Output[builtins.str]:
434
435
  """
435
436
  The LDAP username
436
437
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -60,12 +61,12 @@ class GetDynamicCredentialsResult:
60
61
 
61
62
  @property
62
63
  @pulumi.getter(name="distinguishedNames")
63
- def distinguished_names(self) -> Sequence[str]:
64
+ def distinguished_names(self) -> Sequence[builtins.str]:
64
65
  return pulumi.get(self, "distinguished_names")
65
66
 
66
67
  @property
67
68
  @pulumi.getter
68
- def id(self) -> str:
69
+ def id(self) -> builtins.str:
69
70
  """
70
71
  The provider-assigned unique ID for this managed resource.
71
72
  """
@@ -73,42 +74,42 @@ class GetDynamicCredentialsResult:
73
74
 
74
75
  @property
75
76
  @pulumi.getter(name="leaseDuration")
76
- def lease_duration(self) -> int:
77
+ def lease_duration(self) -> builtins.int:
77
78
  return pulumi.get(self, "lease_duration")
78
79
 
79
80
  @property
80
81
  @pulumi.getter(name="leaseId")
81
- def lease_id(self) -> str:
82
+ def lease_id(self) -> builtins.str:
82
83
  return pulumi.get(self, "lease_id")
83
84
 
84
85
  @property
85
86
  @pulumi.getter(name="leaseRenewable")
86
- def lease_renewable(self) -> bool:
87
+ def lease_renewable(self) -> builtins.bool:
87
88
  return pulumi.get(self, "lease_renewable")
88
89
 
89
90
  @property
90
91
  @pulumi.getter
91
- def mount(self) -> str:
92
+ def mount(self) -> builtins.str:
92
93
  return pulumi.get(self, "mount")
93
94
 
94
95
  @property
95
96
  @pulumi.getter
96
- def namespace(self) -> Optional[str]:
97
+ def namespace(self) -> Optional[builtins.str]:
97
98
  return pulumi.get(self, "namespace")
98
99
 
99
100
  @property
100
101
  @pulumi.getter
101
- def password(self) -> str:
102
+ def password(self) -> builtins.str:
102
103
  return pulumi.get(self, "password")
103
104
 
104
105
  @property
105
106
  @pulumi.getter(name="roleName")
106
- def role_name(self) -> str:
107
+ def role_name(self) -> builtins.str:
107
108
  return pulumi.get(self, "role_name")
108
109
 
109
110
  @property
110
111
  @pulumi.getter
111
- def username(self) -> str:
112
+ def username(self) -> builtins.str:
112
113
  return pulumi.get(self, "username")
113
114
 
114
115
 
@@ -130,9 +131,9 @@ class AwaitableGetDynamicCredentialsResult(GetDynamicCredentialsResult):
130
131
  username=self.username)
131
132
 
132
133
 
133
- def get_dynamic_credentials(mount: Optional[str] = None,
134
- namespace: Optional[str] = None,
135
- role_name: Optional[str] = None,
134
+ def get_dynamic_credentials(mount: Optional[builtins.str] = None,
135
+ namespace: Optional[builtins.str] = None,
136
+ role_name: Optional[builtins.str] = None,
136
137
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetDynamicCredentialsResult:
137
138
  """
138
139
  Use this data source to access information about an existing resource.
@@ -155,9 +156,9 @@ def get_dynamic_credentials(mount: Optional[str] = None,
155
156
  password=pulumi.get(__ret__, 'password'),
156
157
  role_name=pulumi.get(__ret__, 'role_name'),
157
158
  username=pulumi.get(__ret__, 'username'))
158
- def get_dynamic_credentials_output(mount: Optional[pulumi.Input[str]] = None,
159
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
160
- role_name: Optional[pulumi.Input[str]] = None,
159
+ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[builtins.str]] = None,
160
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
161
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
161
162
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDynamicCredentialsResult]:
162
163
  """
163
164
  Use this data source to access information about an existing resource.
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -63,12 +64,12 @@ class GetStaticCredentialsResult:
63
64
 
64
65
  @property
65
66
  @pulumi.getter
66
- def dn(self) -> str:
67
+ def dn(self) -> builtins.str:
67
68
  return pulumi.get(self, "dn")
68
69
 
69
70
  @property
70
71
  @pulumi.getter
71
- def id(self) -> str:
72
+ def id(self) -> builtins.str:
72
73
  """
73
74
  The provider-assigned unique ID for this managed resource.
74
75
  """
@@ -76,47 +77,47 @@ class GetStaticCredentialsResult:
76
77
 
77
78
  @property
78
79
  @pulumi.getter(name="lastPassword")
79
- def last_password(self) -> str:
80
+ def last_password(self) -> builtins.str:
80
81
  return pulumi.get(self, "last_password")
81
82
 
82
83
  @property
83
84
  @pulumi.getter(name="lastVaultRotation")
84
- def last_vault_rotation(self) -> str:
85
+ def last_vault_rotation(self) -> builtins.str:
85
86
  return pulumi.get(self, "last_vault_rotation")
86
87
 
87
88
  @property
88
89
  @pulumi.getter
89
- def mount(self) -> str:
90
+ def mount(self) -> builtins.str:
90
91
  return pulumi.get(self, "mount")
91
92
 
92
93
  @property
93
94
  @pulumi.getter
94
- def namespace(self) -> Optional[str]:
95
+ def namespace(self) -> Optional[builtins.str]:
95
96
  return pulumi.get(self, "namespace")
96
97
 
97
98
  @property
98
99
  @pulumi.getter
99
- def password(self) -> str:
100
+ def password(self) -> builtins.str:
100
101
  return pulumi.get(self, "password")
101
102
 
102
103
  @property
103
104
  @pulumi.getter(name="roleName")
104
- def role_name(self) -> str:
105
+ def role_name(self) -> builtins.str:
105
106
  return pulumi.get(self, "role_name")
106
107
 
107
108
  @property
108
109
  @pulumi.getter(name="rotationPeriod")
109
- def rotation_period(self) -> int:
110
+ def rotation_period(self) -> builtins.int:
110
111
  return pulumi.get(self, "rotation_period")
111
112
 
112
113
  @property
113
114
  @pulumi.getter
114
- def ttl(self) -> int:
115
+ def ttl(self) -> builtins.int:
115
116
  return pulumi.get(self, "ttl")
116
117
 
117
118
  @property
118
119
  @pulumi.getter
119
- def username(self) -> str:
120
+ def username(self) -> builtins.str:
120
121
  return pulumi.get(self, "username")
121
122
 
122
123
 
@@ -139,9 +140,9 @@ class AwaitableGetStaticCredentialsResult(GetStaticCredentialsResult):
139
140
  username=self.username)
140
141
 
141
142
 
142
- def get_static_credentials(mount: Optional[str] = None,
143
- namespace: Optional[str] = None,
144
- role_name: Optional[str] = None,
143
+ def get_static_credentials(mount: Optional[builtins.str] = None,
144
+ namespace: Optional[builtins.str] = None,
145
+ role_name: Optional[builtins.str] = None,
145
146
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetStaticCredentialsResult:
146
147
  """
147
148
  Use this data source to access information about an existing resource.
@@ -165,9 +166,9 @@ def get_static_credentials(mount: Optional[str] = None,
165
166
  rotation_period=pulumi.get(__ret__, 'rotation_period'),
166
167
  ttl=pulumi.get(__ret__, 'ttl'),
167
168
  username=pulumi.get(__ret__, 'username'))
168
- def get_static_credentials_output(mount: Optional[pulumi.Input[str]] = None,
169
- namespace: Optional[pulumi.Input[Optional[str]]] = None,
170
- role_name: Optional[pulumi.Input[str]] = None,
169
+ def get_static_credentials_output(mount: Optional[pulumi.Input[builtins.str]] = None,
170
+ namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
171
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
171
172
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticCredentialsResult]:
172
173
  """
173
174
  Use this data source to access information about an existing resource.