pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -32,7 +31,7 @@ MYPY = False
32
31
 
33
32
  if not MYPY:
34
33
  class BackendConfigCmpv2AuthenticatorsArgsDict(TypedDict):
35
- cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
34
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
36
35
  """
37
36
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
38
37
  """
@@ -42,33 +41,33 @@ elif False:
42
41
  @pulumi.input_type
43
42
  class BackendConfigCmpv2AuthenticatorsArgs:
44
43
  def __init__(__self__, *,
45
- cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
44
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
46
45
  """
47
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
46
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
48
47
  """
49
48
  if cert is not None:
50
49
  pulumi.set(__self__, "cert", cert)
51
50
 
52
- @property
51
+ @_builtins.property
53
52
  @pulumi.getter
54
- def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
53
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
55
54
  """
56
55
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
57
56
  """
58
57
  return pulumi.get(self, "cert")
59
58
 
60
59
  @cert.setter
61
- def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
60
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
62
61
  pulumi.set(self, "cert", value)
63
62
 
64
63
 
65
64
  if not MYPY:
66
65
  class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
67
- cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
66
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
68
67
  """
69
68
  The accessor (required) and cert_role (optional) properties for cert auth backends.
70
69
  """
71
- userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
70
+ userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
72
71
  """
73
72
  The accessor (required) property for user pass auth backends.
74
73
  """
@@ -78,49 +77,49 @@ elif False:
78
77
  @pulumi.input_type
79
78
  class BackendConfigEstAuthenticatorsArgs:
80
79
  def __init__(__self__, *,
81
- cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
82
- userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
80
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
81
+ userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
83
82
  """
84
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
85
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] userpass: The accessor (required) property for user pass auth backends.
83
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
84
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] userpass: The accessor (required) property for user pass auth backends.
86
85
  """
87
86
  if cert is not None:
88
87
  pulumi.set(__self__, "cert", cert)
89
88
  if userpass is not None:
90
89
  pulumi.set(__self__, "userpass", userpass)
91
90
 
92
- @property
91
+ @_builtins.property
93
92
  @pulumi.getter
94
- def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
93
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
95
94
  """
96
95
  The accessor (required) and cert_role (optional) properties for cert auth backends.
97
96
  """
98
97
  return pulumi.get(self, "cert")
99
98
 
100
99
  @cert.setter
101
- def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
100
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
102
101
  pulumi.set(self, "cert", value)
103
102
 
104
- @property
103
+ @_builtins.property
105
104
  @pulumi.getter
106
- def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
105
+ def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
107
106
  """
108
107
  The accessor (required) property for user pass auth backends.
109
108
  """
110
109
  return pulumi.get(self, "userpass")
111
110
 
112
111
  @userpass.setter
113
- def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
112
+ def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
114
113
  pulumi.set(self, "userpass", value)
115
114
 
116
115
 
117
116
  if not MYPY:
118
117
  class BackendConfigScepAuthenticatorsArgsDict(TypedDict):
119
- cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
118
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
120
119
  """
121
120
  The accessor and cert_role properties for cert auth backends
122
121
  """
123
- scep: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
122
+ scep: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
124
123
  """
125
124
  The accessor property for SCEP auth backends
126
125
  """
@@ -130,45 +129,45 @@ elif False:
130
129
  @pulumi.input_type
131
130
  class BackendConfigScepAuthenticatorsArgs:
132
131
  def __init__(__self__, *,
133
- cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
134
- scep: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
132
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
133
+ scep: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
135
134
  """
136
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: The accessor and cert_role properties for cert auth backends
137
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] scep: The accessor property for SCEP auth backends
135
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: The accessor and cert_role properties for cert auth backends
136
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] scep: The accessor property for SCEP auth backends
138
137
  """
139
138
  if cert is not None:
140
139
  pulumi.set(__self__, "cert", cert)
141
140
  if scep is not None:
142
141
  pulumi.set(__self__, "scep", scep)
143
142
 
144
- @property
143
+ @_builtins.property
145
144
  @pulumi.getter
146
- def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
145
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
147
146
  """
148
147
  The accessor and cert_role properties for cert auth backends
149
148
  """
150
149
  return pulumi.get(self, "cert")
151
150
 
152
151
  @cert.setter
153
- def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
152
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
154
153
  pulumi.set(self, "cert", value)
155
154
 
156
- @property
155
+ @_builtins.property
157
156
  @pulumi.getter
158
- def scep(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
157
+ def scep(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
159
158
  """
160
159
  The accessor property for SCEP auth backends
161
160
  """
162
161
  return pulumi.get(self, "scep")
163
162
 
164
163
  @scep.setter
165
- def scep(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
164
+ def scep(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
166
165
  pulumi.set(self, "scep", value)
167
166
 
168
167
 
169
168
  if not MYPY:
170
169
  class BackendConfigScepExternalValidationArgsDict(TypedDict):
171
- intune: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
170
+ intune: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
172
171
  """
173
172
  The credentials to enable Microsoft Intune validation of SCEP requests
174
173
  """
@@ -178,37 +177,37 @@ elif False:
178
177
  @pulumi.input_type
179
178
  class BackendConfigScepExternalValidationArgs:
180
179
  def __init__(__self__, *,
181
- intune: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
180
+ intune: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
182
181
  """
183
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] intune: The credentials to enable Microsoft Intune validation of SCEP requests
182
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] intune: The credentials to enable Microsoft Intune validation of SCEP requests
184
183
  """
185
184
  if intune is not None:
186
185
  pulumi.set(__self__, "intune", intune)
187
186
 
188
- @property
187
+ @_builtins.property
189
188
  @pulumi.getter
190
- def intune(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
189
+ def intune(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
191
190
  """
192
191
  The credentials to enable Microsoft Intune validation of SCEP requests
193
192
  """
194
193
  return pulumi.get(self, "intune")
195
194
 
196
195
  @intune.setter
197
- def intune(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
196
+ def intune(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
198
197
  pulumi.set(self, "intune", value)
199
198
 
200
199
 
201
200
  if not MYPY:
202
201
  class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
203
- oid: pulumi.Input[builtins.str]
202
+ oid: pulumi.Input[_builtins.str]
204
203
  """
205
204
  The OID for the policy identifier
206
205
  """
207
- cps: NotRequired[pulumi.Input[builtins.str]]
206
+ cps: NotRequired[pulumi.Input[_builtins.str]]
208
207
  """
209
208
  The URL of the CPS for the policy identifier
210
209
  """
211
- notice: NotRequired[pulumi.Input[builtins.str]]
210
+ notice: NotRequired[pulumi.Input[_builtins.str]]
212
211
  """
213
212
  A notice for the policy identifier
214
213
  """
@@ -218,13 +217,13 @@ elif False:
218
217
  @pulumi.input_type
219
218
  class SecretBackendRolePolicyIdentifierArgs:
220
219
  def __init__(__self__, *,
221
- oid: pulumi.Input[builtins.str],
222
- cps: Optional[pulumi.Input[builtins.str]] = None,
223
- notice: Optional[pulumi.Input[builtins.str]] = None):
220
+ oid: pulumi.Input[_builtins.str],
221
+ cps: Optional[pulumi.Input[_builtins.str]] = None,
222
+ notice: Optional[pulumi.Input[_builtins.str]] = None):
224
223
  """
225
- :param pulumi.Input[builtins.str] oid: The OID for the policy identifier
226
- :param pulumi.Input[builtins.str] cps: The URL of the CPS for the policy identifier
227
- :param pulumi.Input[builtins.str] notice: A notice for the policy identifier
224
+ :param pulumi.Input[_builtins.str] oid: The OID for the policy identifier
225
+ :param pulumi.Input[_builtins.str] cps: The URL of the CPS for the policy identifier
226
+ :param pulumi.Input[_builtins.str] notice: A notice for the policy identifier
228
227
  """
229
228
  pulumi.set(__self__, "oid", oid)
230
229
  if cps is not None:
@@ -232,40 +231,40 @@ class SecretBackendRolePolicyIdentifierArgs:
232
231
  if notice is not None:
233
232
  pulumi.set(__self__, "notice", notice)
234
233
 
235
- @property
234
+ @_builtins.property
236
235
  @pulumi.getter
237
- def oid(self) -> pulumi.Input[builtins.str]:
236
+ def oid(self) -> pulumi.Input[_builtins.str]:
238
237
  """
239
238
  The OID for the policy identifier
240
239
  """
241
240
  return pulumi.get(self, "oid")
242
241
 
243
242
  @oid.setter
244
- def oid(self, value: pulumi.Input[builtins.str]):
243
+ def oid(self, value: pulumi.Input[_builtins.str]):
245
244
  pulumi.set(self, "oid", value)
246
245
 
247
- @property
246
+ @_builtins.property
248
247
  @pulumi.getter
249
- def cps(self) -> Optional[pulumi.Input[builtins.str]]:
248
+ def cps(self) -> Optional[pulumi.Input[_builtins.str]]:
250
249
  """
251
250
  The URL of the CPS for the policy identifier
252
251
  """
253
252
  return pulumi.get(self, "cps")
254
253
 
255
254
  @cps.setter
256
- def cps(self, value: Optional[pulumi.Input[builtins.str]]):
255
+ def cps(self, value: Optional[pulumi.Input[_builtins.str]]):
257
256
  pulumi.set(self, "cps", value)
258
257
 
259
- @property
258
+ @_builtins.property
260
259
  @pulumi.getter
261
- def notice(self) -> Optional[pulumi.Input[builtins.str]]:
260
+ def notice(self) -> Optional[pulumi.Input[_builtins.str]]:
262
261
  """
263
262
  A notice for the policy identifier
264
263
  """
265
264
  return pulumi.get(self, "notice")
266
265
 
267
266
  @notice.setter
268
- def notice(self, value: Optional[pulumi.Input[builtins.str]]):
267
+ def notice(self, value: Optional[pulumi.Input[_builtins.str]]):
269
268
  pulumi.set(self, "notice", value)
270
269
 
271
270