pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,26 +19,26 @@ __all__ = ['NomadSecretRoleArgs', 'NomadSecretRole']
20
19
  @pulumi.input_type
21
20
  class NomadSecretRoleArgs:
22
21
  def __init__(__self__, *,
23
- backend: pulumi.Input[builtins.str],
24
- role: pulumi.Input[builtins.str],
25
- global_: Optional[pulumi.Input[builtins.bool]] = None,
26
- namespace: Optional[pulumi.Input[builtins.str]] = None,
27
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- type: Optional[pulumi.Input[builtins.str]] = None):
22
+ backend: pulumi.Input[_builtins.str],
23
+ role: pulumi.Input[_builtins.str],
24
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ type: Optional[pulumi.Input[_builtins.str]] = None):
29
28
  """
30
29
  The set of arguments for constructing a NomadSecretRole resource.
31
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
32
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
30
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
31
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
33
32
  Must be unique within the backend.
34
- :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
33
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
35
34
  false.
36
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
36
  The value should not contain leading or trailing forward slashes.
38
37
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
38
  *Available only for Vault Enterprise*.
40
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
39
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
41
40
  when `type` is 'client'.
42
- :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
41
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
43
42
  settings are 'client' and 'management'. Defaults to 'client'.
44
43
  """
45
44
  pulumi.set(__self__, "backend", backend)
@@ -53,21 +52,21 @@ class NomadSecretRoleArgs:
53
52
  if type is not None:
54
53
  pulumi.set(__self__, "type", type)
55
54
 
56
- @property
55
+ @_builtins.property
57
56
  @pulumi.getter
58
- def backend(self) -> pulumi.Input[builtins.str]:
57
+ def backend(self) -> pulumi.Input[_builtins.str]:
59
58
  """
60
59
  The unique path this backend should be mounted at.
61
60
  """
62
61
  return pulumi.get(self, "backend")
63
62
 
64
63
  @backend.setter
65
- def backend(self, value: pulumi.Input[builtins.str]):
64
+ def backend(self, value: pulumi.Input[_builtins.str]):
66
65
  pulumi.set(self, "backend", value)
67
66
 
68
- @property
67
+ @_builtins.property
69
68
  @pulumi.getter
70
- def role(self) -> pulumi.Input[builtins.str]:
69
+ def role(self) -> pulumi.Input[_builtins.str]:
71
70
  """
72
71
  The name to identify this role within the backend.
73
72
  Must be unique within the backend.
@@ -75,12 +74,12 @@ class NomadSecretRoleArgs:
75
74
  return pulumi.get(self, "role")
76
75
 
77
76
  @role.setter
78
- def role(self, value: pulumi.Input[builtins.str]):
77
+ def role(self, value: pulumi.Input[_builtins.str]):
79
78
  pulumi.set(self, "role", value)
80
79
 
81
- @property
80
+ @_builtins.property
82
81
  @pulumi.getter(name="global")
83
- def global_(self) -> Optional[pulumi.Input[builtins.bool]]:
82
+ def global_(self) -> Optional[pulumi.Input[_builtins.bool]]:
84
83
  """
85
84
  Specifies if the generated token should be global. Defaults to
86
85
  false.
@@ -88,12 +87,12 @@ class NomadSecretRoleArgs:
88
87
  return pulumi.get(self, "global_")
89
88
 
90
89
  @global_.setter
91
- def global_(self, value: Optional[pulumi.Input[builtins.bool]]):
90
+ def global_(self, value: Optional[pulumi.Input[_builtins.bool]]):
92
91
  pulumi.set(self, "global_", value)
93
92
 
94
- @property
93
+ @_builtins.property
95
94
  @pulumi.getter
96
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
95
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
97
96
  """
98
97
  The namespace to provision the resource in.
99
98
  The value should not contain leading or trailing forward slashes.
@@ -103,12 +102,12 @@ class NomadSecretRoleArgs:
103
102
  return pulumi.get(self, "namespace")
104
103
 
105
104
  @namespace.setter
106
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
105
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
107
106
  pulumi.set(self, "namespace", value)
108
107
 
109
- @property
108
+ @_builtins.property
110
109
  @pulumi.getter
111
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
110
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
112
111
  """
113
112
  List of policies attached to the generated token. This setting is only used
114
113
  when `type` is 'client'.
@@ -116,12 +115,12 @@ class NomadSecretRoleArgs:
116
115
  return pulumi.get(self, "policies")
117
116
 
118
117
  @policies.setter
119
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
118
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
120
119
  pulumi.set(self, "policies", value)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter
124
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
123
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
125
124
  """
126
125
  Specifies the type of token to create when using this role. Valid
127
126
  settings are 'client' and 'management'. Defaults to 'client'.
@@ -129,33 +128,33 @@ class NomadSecretRoleArgs:
129
128
  return pulumi.get(self, "type")
130
129
 
131
130
  @type.setter
132
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
131
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
133
132
  pulumi.set(self, "type", value)
134
133
 
135
134
 
136
135
  @pulumi.input_type
137
136
  class _NomadSecretRoleState:
138
137
  def __init__(__self__, *,
139
- backend: Optional[pulumi.Input[builtins.str]] = None,
140
- global_: Optional[pulumi.Input[builtins.bool]] = None,
141
- namespace: Optional[pulumi.Input[builtins.str]] = None,
142
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
143
- role: Optional[pulumi.Input[builtins.str]] = None,
144
- type: Optional[pulumi.Input[builtins.str]] = None):
138
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
139
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
140
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
141
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
142
+ role: Optional[pulumi.Input[_builtins.str]] = None,
143
+ type: Optional[pulumi.Input[_builtins.str]] = None):
145
144
  """
146
145
  Input properties used for looking up and filtering NomadSecretRole resources.
147
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
148
- :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
146
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
147
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
149
148
  false.
150
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
149
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
151
150
  The value should not contain leading or trailing forward slashes.
152
151
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
153
152
  *Available only for Vault Enterprise*.
154
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
153
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
155
154
  when `type` is 'client'.
156
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
155
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
157
156
  Must be unique within the backend.
158
- :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
157
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
159
158
  settings are 'client' and 'management'. Defaults to 'client'.
160
159
  """
161
160
  if backend is not None:
@@ -171,21 +170,21 @@ class _NomadSecretRoleState:
171
170
  if type is not None:
172
171
  pulumi.set(__self__, "type", type)
173
172
 
174
- @property
173
+ @_builtins.property
175
174
  @pulumi.getter
176
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
175
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
177
176
  """
178
177
  The unique path this backend should be mounted at.
179
178
  """
180
179
  return pulumi.get(self, "backend")
181
180
 
182
181
  @backend.setter
183
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
182
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
184
183
  pulumi.set(self, "backend", value)
185
184
 
186
- @property
185
+ @_builtins.property
187
186
  @pulumi.getter(name="global")
188
- def global_(self) -> Optional[pulumi.Input[builtins.bool]]:
187
+ def global_(self) -> Optional[pulumi.Input[_builtins.bool]]:
189
188
  """
190
189
  Specifies if the generated token should be global. Defaults to
191
190
  false.
@@ -193,12 +192,12 @@ class _NomadSecretRoleState:
193
192
  return pulumi.get(self, "global_")
194
193
 
195
194
  @global_.setter
196
- def global_(self, value: Optional[pulumi.Input[builtins.bool]]):
195
+ def global_(self, value: Optional[pulumi.Input[_builtins.bool]]):
197
196
  pulumi.set(self, "global_", value)
198
197
 
199
- @property
198
+ @_builtins.property
200
199
  @pulumi.getter
201
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
200
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
202
201
  """
203
202
  The namespace to provision the resource in.
204
203
  The value should not contain leading or trailing forward slashes.
@@ -208,12 +207,12 @@ class _NomadSecretRoleState:
208
207
  return pulumi.get(self, "namespace")
209
208
 
210
209
  @namespace.setter
211
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
210
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
212
211
  pulumi.set(self, "namespace", value)
213
212
 
214
- @property
213
+ @_builtins.property
215
214
  @pulumi.getter
216
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
215
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
217
216
  """
218
217
  List of policies attached to the generated token. This setting is only used
219
218
  when `type` is 'client'.
@@ -221,12 +220,12 @@ class _NomadSecretRoleState:
221
220
  return pulumi.get(self, "policies")
222
221
 
223
222
  @policies.setter
224
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
223
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
225
224
  pulumi.set(self, "policies", value)
226
225
 
227
- @property
226
+ @_builtins.property
228
227
  @pulumi.getter
229
- def role(self) -> Optional[pulumi.Input[builtins.str]]:
228
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
230
229
  """
231
230
  The name to identify this role within the backend.
232
231
  Must be unique within the backend.
@@ -234,12 +233,12 @@ class _NomadSecretRoleState:
234
233
  return pulumi.get(self, "role")
235
234
 
236
235
  @role.setter
237
- def role(self, value: Optional[pulumi.Input[builtins.str]]):
236
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
238
237
  pulumi.set(self, "role", value)
239
238
 
240
- @property
239
+ @_builtins.property
241
240
  @pulumi.getter
242
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
241
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
243
242
  """
244
243
  Specifies the type of token to create when using this role. Valid
245
244
  settings are 'client' and 'management'. Defaults to 'client'.
@@ -247,7 +246,7 @@ class _NomadSecretRoleState:
247
246
  return pulumi.get(self, "type")
248
247
 
249
248
  @type.setter
250
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
249
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
251
250
  pulumi.set(self, "type", value)
252
251
 
253
252
 
@@ -257,12 +256,12 @@ class NomadSecretRole(pulumi.CustomResource):
257
256
  def __init__(__self__,
258
257
  resource_name: str,
259
258
  opts: Optional[pulumi.ResourceOptions] = None,
260
- backend: Optional[pulumi.Input[builtins.str]] = None,
261
- global_: Optional[pulumi.Input[builtins.bool]] = None,
262
- namespace: Optional[pulumi.Input[builtins.str]] = None,
263
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
264
- role: Optional[pulumi.Input[builtins.str]] = None,
265
- type: Optional[pulumi.Input[builtins.str]] = None,
259
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
260
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
261
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
262
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
263
+ role: Optional[pulumi.Input[_builtins.str]] = None,
264
+ type: Optional[pulumi.Input[_builtins.str]] = None,
266
265
  __props__=None):
267
266
  """
268
267
  ## Example Usage
@@ -295,18 +294,18 @@ class NomadSecretRole(pulumi.CustomResource):
295
294
 
296
295
  :param str resource_name: The name of the resource.
297
296
  :param pulumi.ResourceOptions opts: Options for the resource.
298
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
299
- :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
297
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
298
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
300
299
  false.
301
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
300
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
302
301
  The value should not contain leading or trailing forward slashes.
303
302
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
304
303
  *Available only for Vault Enterprise*.
305
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
304
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
306
305
  when `type` is 'client'.
307
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
306
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
308
307
  Must be unique within the backend.
309
- :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
308
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
310
309
  settings are 'client' and 'management'. Defaults to 'client'.
311
310
  """
312
311
  ...
@@ -359,12 +358,12 @@ class NomadSecretRole(pulumi.CustomResource):
359
358
  def _internal_init(__self__,
360
359
  resource_name: str,
361
360
  opts: Optional[pulumi.ResourceOptions] = None,
362
- backend: Optional[pulumi.Input[builtins.str]] = None,
363
- global_: Optional[pulumi.Input[builtins.bool]] = None,
364
- namespace: Optional[pulumi.Input[builtins.str]] = None,
365
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
366
- role: Optional[pulumi.Input[builtins.str]] = None,
367
- type: Optional[pulumi.Input[builtins.str]] = None,
361
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
362
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
363
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
364
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
365
+ role: Optional[pulumi.Input[_builtins.str]] = None,
366
+ type: Optional[pulumi.Input[_builtins.str]] = None,
368
367
  __props__=None):
369
368
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
370
369
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -394,12 +393,12 @@ class NomadSecretRole(pulumi.CustomResource):
394
393
  def get(resource_name: str,
395
394
  id: pulumi.Input[str],
396
395
  opts: Optional[pulumi.ResourceOptions] = None,
397
- backend: Optional[pulumi.Input[builtins.str]] = None,
398
- global_: Optional[pulumi.Input[builtins.bool]] = None,
399
- namespace: Optional[pulumi.Input[builtins.str]] = None,
400
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
401
- role: Optional[pulumi.Input[builtins.str]] = None,
402
- type: Optional[pulumi.Input[builtins.str]] = None) -> 'NomadSecretRole':
396
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
397
+ global_: Optional[pulumi.Input[_builtins.bool]] = None,
398
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
399
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
400
+ role: Optional[pulumi.Input[_builtins.str]] = None,
401
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'NomadSecretRole':
403
402
  """
404
403
  Get an existing NomadSecretRole resource's state with the given name, id, and optional extra
405
404
  properties used to qualify the lookup.
@@ -407,18 +406,18 @@ class NomadSecretRole(pulumi.CustomResource):
407
406
  :param str resource_name: The unique name of the resulting resource.
408
407
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
409
408
  :param pulumi.ResourceOptions opts: Options for the resource.
410
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at.
411
- :param pulumi.Input[builtins.bool] global_: Specifies if the generated token should be global. Defaults to
409
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at.
410
+ :param pulumi.Input[_builtins.bool] global_: Specifies if the generated token should be global. Defaults to
412
411
  false.
413
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
412
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
414
413
  The value should not contain leading or trailing forward slashes.
415
414
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
416
415
  *Available only for Vault Enterprise*.
417
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
416
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: List of policies attached to the generated token. This setting is only used
418
417
  when `type` is 'client'.
419
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
418
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
420
419
  Must be unique within the backend.
421
- :param pulumi.Input[builtins.str] type: Specifies the type of token to create when using this role. Valid
420
+ :param pulumi.Input[_builtins.str] type: Specifies the type of token to create when using this role. Valid
422
421
  settings are 'client' and 'management'. Defaults to 'client'.
423
422
  """
424
423
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -433,26 +432,26 @@ class NomadSecretRole(pulumi.CustomResource):
433
432
  __props__.__dict__["type"] = type
434
433
  return NomadSecretRole(resource_name, opts=opts, __props__=__props__)
435
434
 
436
- @property
435
+ @_builtins.property
437
436
  @pulumi.getter
438
- def backend(self) -> pulumi.Output[builtins.str]:
437
+ def backend(self) -> pulumi.Output[_builtins.str]:
439
438
  """
440
439
  The unique path this backend should be mounted at.
441
440
  """
442
441
  return pulumi.get(self, "backend")
443
442
 
444
- @property
443
+ @_builtins.property
445
444
  @pulumi.getter(name="global")
446
- def global_(self) -> pulumi.Output[builtins.bool]:
445
+ def global_(self) -> pulumi.Output[_builtins.bool]:
447
446
  """
448
447
  Specifies if the generated token should be global. Defaults to
449
448
  false.
450
449
  """
451
450
  return pulumi.get(self, "global_")
452
451
 
453
- @property
452
+ @_builtins.property
454
453
  @pulumi.getter
455
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
454
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
456
455
  """
457
456
  The namespace to provision the resource in.
458
457
  The value should not contain leading or trailing forward slashes.
@@ -461,27 +460,27 @@ class NomadSecretRole(pulumi.CustomResource):
461
460
  """
462
461
  return pulumi.get(self, "namespace")
463
462
 
464
- @property
463
+ @_builtins.property
465
464
  @pulumi.getter
466
- def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
465
+ def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
467
466
  """
468
467
  List of policies attached to the generated token. This setting is only used
469
468
  when `type` is 'client'.
470
469
  """
471
470
  return pulumi.get(self, "policies")
472
471
 
473
- @property
472
+ @_builtins.property
474
473
  @pulumi.getter
475
- def role(self) -> pulumi.Output[builtins.str]:
474
+ def role(self) -> pulumi.Output[_builtins.str]:
476
475
  """
477
476
  The name to identify this role within the backend.
478
477
  Must be unique within the backend.
479
478
  """
480
479
  return pulumi.get(self, "role")
481
480
 
482
- @property
481
+ @_builtins.property
483
482
  @pulumi.getter
484
- def type(self) -> pulumi.Output[builtins.str]:
483
+ def type(self) -> pulumi.Output[_builtins.str]:
485
484
  """
486
485
  Specifies the type of token to create when using this role. Valid
487
486
  settings are 'client' and 'management'. Defaults to 'client'.