pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -28,7 +27,7 @@ class GetBackendConfigScepResult:
28
27
  """
29
28
  A collection of values returned by getBackendConfigScep.
30
29
  """
31
- def __init__(__self__, allowed_digest_algorithms=None, allowed_encryption_algorithms=None, authenticators=None, backend=None, default_path_policy=None, enabled=None, external_validations=None, id=None, last_updated=None, namespace=None, restrict_ca_chain_to_issuer=None):
30
+ def __init__(__self__, allowed_digest_algorithms=None, allowed_encryption_algorithms=None, authenticators=None, backend=None, default_path_policy=None, enabled=None, external_validations=None, id=None, last_updated=None, log_level=None, namespace=None, restrict_ca_chain_to_issuer=None):
32
31
  if allowed_digest_algorithms and not isinstance(allowed_digest_algorithms, list):
33
32
  raise TypeError("Expected argument 'allowed_digest_algorithms' to be a list")
34
33
  pulumi.set(__self__, "allowed_digest_algorithms", allowed_digest_algorithms)
@@ -56,6 +55,9 @@ class GetBackendConfigScepResult:
56
55
  if last_updated and not isinstance(last_updated, str):
57
56
  raise TypeError("Expected argument 'last_updated' to be a str")
58
57
  pulumi.set(__self__, "last_updated", last_updated)
58
+ if log_level and not isinstance(log_level, str):
59
+ raise TypeError("Expected argument 'log_level' to be a str")
60
+ pulumi.set(__self__, "log_level", log_level)
59
61
  if namespace and not isinstance(namespace, str):
60
62
  raise TypeError("Expected argument 'namespace' to be a str")
61
63
  pulumi.set(__self__, "namespace", namespace)
@@ -63,23 +65,23 @@ class GetBackendConfigScepResult:
63
65
  raise TypeError("Expected argument 'restrict_ca_chain_to_issuer' to be a bool")
64
66
  pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
65
67
 
66
- @property
68
+ @_builtins.property
67
69
  @pulumi.getter(name="allowedDigestAlgorithms")
68
- def allowed_digest_algorithms(self) -> Sequence[builtins.str]:
70
+ def allowed_digest_algorithms(self) -> Sequence[_builtins.str]:
69
71
  """
70
72
  List of allowed digest algorithms for SCEP requests.
71
73
  """
72
74
  return pulumi.get(self, "allowed_digest_algorithms")
73
75
 
74
- @property
76
+ @_builtins.property
75
77
  @pulumi.getter(name="allowedEncryptionAlgorithms")
76
- def allowed_encryption_algorithms(self) -> Sequence[builtins.str]:
78
+ def allowed_encryption_algorithms(self) -> Sequence[_builtins.str]:
77
79
  """
78
80
  List of allowed encryption algorithms for SCEP requests.
79
81
  """
80
82
  return pulumi.get(self, "allowed_encryption_algorithms")
81
83
 
82
- @property
84
+ @_builtins.property
83
85
  @pulumi.getter
84
86
  def authenticators(self) -> Sequence['outputs.GetBackendConfigScepAuthenticatorResult']:
85
87
  """
@@ -87,28 +89,28 @@ class GetBackendConfigScepResult:
87
89
  """
88
90
  return pulumi.get(self, "authenticators")
89
91
 
90
- @property
92
+ @_builtins.property
91
93
  @pulumi.getter
92
- def backend(self) -> builtins.str:
94
+ def backend(self) -> _builtins.str:
93
95
  return pulumi.get(self, "backend")
94
96
 
95
- @property
97
+ @_builtins.property
96
98
  @pulumi.getter(name="defaultPathPolicy")
97
- def default_path_policy(self) -> builtins.str:
99
+ def default_path_policy(self) -> _builtins.str:
98
100
  """
99
101
  Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
100
102
  """
101
103
  return pulumi.get(self, "default_path_policy")
102
104
 
103
- @property
105
+ @_builtins.property
104
106
  @pulumi.getter
105
- def enabled(self) -> builtins.bool:
107
+ def enabled(self) -> _builtins.bool:
106
108
  """
107
109
  Specifies whether SCEP is enabled.
108
110
  """
109
111
  return pulumi.get(self, "enabled")
110
112
 
111
- @property
113
+ @_builtins.property
112
114
  @pulumi.getter(name="externalValidations")
113
115
  def external_validations(self) -> Sequence['outputs.GetBackendConfigScepExternalValidationResult']:
114
116
  """
@@ -116,30 +118,38 @@ class GetBackendConfigScepResult:
116
118
  """
117
119
  return pulumi.get(self, "external_validations")
118
120
 
119
- @property
121
+ @_builtins.property
120
122
  @pulumi.getter
121
- def id(self) -> builtins.str:
123
+ def id(self) -> _builtins.str:
122
124
  """
123
125
  The provider-assigned unique ID for this managed resource.
124
126
  """
125
127
  return pulumi.get(self, "id")
126
128
 
127
- @property
129
+ @_builtins.property
128
130
  @pulumi.getter(name="lastUpdated")
129
- def last_updated(self) -> builtins.str:
131
+ def last_updated(self) -> _builtins.str:
130
132
  """
131
133
  A read-only timestamp representing the last time the configuration was updated.
132
134
  """
133
135
  return pulumi.get(self, "last_updated")
134
136
 
135
- @property
137
+ @_builtins.property
138
+ @pulumi.getter(name="logLevel")
139
+ def log_level(self) -> Optional[_builtins.str]:
140
+ """
141
+ The level of logging verbosity, affects only SCEP logs on this mount.
142
+ """
143
+ return pulumi.get(self, "log_level")
144
+
145
+ @_builtins.property
136
146
  @pulumi.getter
137
- def namespace(self) -> Optional[builtins.str]:
147
+ def namespace(self) -> Optional[_builtins.str]:
138
148
  return pulumi.get(self, "namespace")
139
149
 
140
- @property
150
+ @_builtins.property
141
151
  @pulumi.getter(name="restrictCaChainToIssuer")
142
- def restrict_ca_chain_to_issuer(self) -> builtins.bool:
152
+ def restrict_ca_chain_to_issuer(self) -> _builtins.bool:
143
153
  """
144
154
  If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
145
155
  """
@@ -161,12 +171,14 @@ class AwaitableGetBackendConfigScepResult(GetBackendConfigScepResult):
161
171
  external_validations=self.external_validations,
162
172
  id=self.id,
163
173
  last_updated=self.last_updated,
174
+ log_level=self.log_level,
164
175
  namespace=self.namespace,
165
176
  restrict_ca_chain_to_issuer=self.restrict_ca_chain_to_issuer)
166
177
 
167
178
 
168
- def get_backend_config_scep(backend: Optional[builtins.str] = None,
169
- namespace: Optional[builtins.str] = None,
179
+ def get_backend_config_scep(backend: Optional[_builtins.str] = None,
180
+ log_level: Optional[_builtins.str] = None,
181
+ namespace: Optional[_builtins.str] = None,
170
182
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigScepResult:
171
183
  """
172
184
  ## Example Usage
@@ -183,15 +195,17 @@ def get_backend_config_scep(backend: Optional[builtins.str] = None,
183
195
  ```
184
196
 
185
197
 
186
- :param builtins.str backend: The path to the PKI secret backend to
198
+ :param _builtins.str backend: The path to the PKI secret backend to
187
199
  read the SCEP configuration from, with no leading or trailing `/`s.
188
- :param builtins.str namespace: The namespace of the target resource.
200
+ :param _builtins.str log_level: The level of logging verbosity, affects only SCEP logs on this mount.
201
+ :param _builtins.str namespace: The namespace of the target resource.
189
202
  The value should not contain leading or trailing forward slashes.
190
203
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
191
204
  *Available only for Vault Enterprise*.
192
205
  """
193
206
  __args__ = dict()
194
207
  __args__['backend'] = backend
208
+ __args__['logLevel'] = log_level
195
209
  __args__['namespace'] = namespace
196
210
  opts = pulumi.InvokeOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
197
211
  __ret__ = pulumi.runtime.invoke('vault:pkiSecret/getBackendConfigScep:getBackendConfigScep', __args__, opts=opts, typ=GetBackendConfigScepResult).value
@@ -206,10 +220,12 @@ def get_backend_config_scep(backend: Optional[builtins.str] = None,
206
220
  external_validations=pulumi.get(__ret__, 'external_validations'),
207
221
  id=pulumi.get(__ret__, 'id'),
208
222
  last_updated=pulumi.get(__ret__, 'last_updated'),
223
+ log_level=pulumi.get(__ret__, 'log_level'),
209
224
  namespace=pulumi.get(__ret__, 'namespace'),
210
225
  restrict_ca_chain_to_issuer=pulumi.get(__ret__, 'restrict_ca_chain_to_issuer'))
211
- def get_backend_config_scep_output(backend: Optional[pulumi.Input[builtins.str]] = None,
212
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
226
+ def get_backend_config_scep_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
227
+ log_level: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
228
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
213
229
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigScepResult]:
214
230
  """
215
231
  ## Example Usage
@@ -226,15 +242,17 @@ def get_backend_config_scep_output(backend: Optional[pulumi.Input[builtins.str]]
226
242
  ```
227
243
 
228
244
 
229
- :param builtins.str backend: The path to the PKI secret backend to
245
+ :param _builtins.str backend: The path to the PKI secret backend to
230
246
  read the SCEP configuration from, with no leading or trailing `/`s.
231
- :param builtins.str namespace: The namespace of the target resource.
247
+ :param _builtins.str log_level: The level of logging verbosity, affects only SCEP logs on this mount.
248
+ :param _builtins.str namespace: The namespace of the target resource.
232
249
  The value should not contain leading or trailing forward slashes.
233
250
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
234
251
  *Available only for Vault Enterprise*.
235
252
  """
236
253
  __args__ = dict()
237
254
  __args__['backend'] = backend
255
+ __args__['logLevel'] = log_level
238
256
  __args__['namespace'] = namespace
239
257
  opts = pulumi.InvokeOutputOptions.merge(_utilities.get_invoke_opts_defaults(), opts)
240
258
  __ret__ = pulumi.runtime.invoke_output('vault:pkiSecret/getBackendConfigScep:getBackendConfigScep', __args__, opts=opts, typ=GetBackendConfigScepResult)
@@ -248,5 +266,6 @@ def get_backend_config_scep_output(backend: Optional[pulumi.Input[builtins.str]]
248
266
  external_validations=pulumi.get(__response__, 'external_validations'),
249
267
  id=pulumi.get(__response__, 'id'),
250
268
  last_updated=pulumi.get(__response__, 'last_updated'),
269
+ log_level=pulumi.get(__response__, 'log_level'),
251
270
  namespace=pulumi.get(__response__, 'namespace'),
252
271
  restrict_ca_chain_to_issuer=pulumi.get(__response__, 'restrict_ca_chain_to_issuer')))
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -77,30 +76,30 @@ class GetBackendIssuerResult:
77
76
  raise TypeError("Expected argument 'usage' to be a str")
78
77
  pulumi.set(__self__, "usage", usage)
79
78
 
80
- @property
79
+ @_builtins.property
81
80
  @pulumi.getter
82
- def backend(self) -> builtins.str:
81
+ def backend(self) -> _builtins.str:
83
82
  return pulumi.get(self, "backend")
84
83
 
85
- @property
84
+ @_builtins.property
86
85
  @pulumi.getter(name="caChains")
87
- def ca_chains(self) -> Sequence[builtins.str]:
86
+ def ca_chains(self) -> Sequence[_builtins.str]:
88
87
  """
89
88
  The CA chain as a list of format specific certificates.
90
89
  """
91
90
  return pulumi.get(self, "ca_chains")
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter
95
- def certificate(self) -> builtins.str:
94
+ def certificate(self) -> _builtins.str:
96
95
  """
97
96
  Certificate associated with this issuer.
98
97
  """
99
98
  return pulumi.get(self, "certificate")
100
99
 
101
- @property
100
+ @_builtins.property
102
101
  @pulumi.getter(name="disableCriticalExtensionChecks")
103
- def disable_critical_extension_checks(self) -> Optional[builtins.bool]:
102
+ def disable_critical_extension_checks(self) -> Optional[_builtins.bool]:
104
103
  """
105
104
  This determines whether this
106
105
  issuer is able to issue certificates where the chain of trust (including the
@@ -108,9 +107,9 @@ class GetBackendIssuerResult:
108
107
  """
109
108
  return pulumi.get(self, "disable_critical_extension_checks")
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter(name="disableNameChecks")
113
- def disable_name_checks(self) -> Optional[builtins.bool]:
112
+ def disable_name_checks(self) -> Optional[_builtins.bool]:
114
113
  """
115
114
  This determines whether this issuer is able
116
115
  to issue certificates where the chain of trust (including the final issued
@@ -119,9 +118,9 @@ class GetBackendIssuerResult:
119
118
  """
120
119
  return pulumi.get(self, "disable_name_checks")
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter(name="disableNameConstraintChecks")
124
- def disable_name_constraint_checks(self) -> Optional[builtins.bool]:
123
+ def disable_name_constraint_checks(self) -> Optional[_builtins.bool]:
125
124
  """
126
125
  This determines whether this
127
126
  issuer is able to issue certificates where the chain of trust (including the
@@ -130,9 +129,9 @@ class GetBackendIssuerResult:
130
129
  """
131
130
  return pulumi.get(self, "disable_name_constraint_checks")
132
131
 
133
- @property
132
+ @_builtins.property
134
133
  @pulumi.getter(name="disablePathLengthChecks")
135
- def disable_path_length_checks(self) -> Optional[builtins.bool]:
134
+ def disable_path_length_checks(self) -> Optional[_builtins.bool]:
136
135
  """
137
136
  This determines whether this issuer
138
137
  is able to issue certificates where the chain of trust (including the final
@@ -141,68 +140,68 @@ class GetBackendIssuerResult:
141
140
  """
142
141
  return pulumi.get(self, "disable_path_length_checks")
143
142
 
144
- @property
143
+ @_builtins.property
145
144
  @pulumi.getter
146
- def id(self) -> builtins.str:
145
+ def id(self) -> _builtins.str:
147
146
  """
148
147
  The provider-assigned unique ID for this managed resource.
149
148
  """
150
149
  return pulumi.get(self, "id")
151
150
 
152
- @property
151
+ @_builtins.property
153
152
  @pulumi.getter(name="issuerId")
154
- def issuer_id(self) -> builtins.str:
153
+ def issuer_id(self) -> _builtins.str:
155
154
  """
156
155
  ID of the issuer.
157
156
  """
158
157
  return pulumi.get(self, "issuer_id")
159
158
 
160
- @property
159
+ @_builtins.property
161
160
  @pulumi.getter(name="issuerName")
162
- def issuer_name(self) -> builtins.str:
161
+ def issuer_name(self) -> _builtins.str:
163
162
  """
164
163
  Name of the issuer.
165
164
  """
166
165
  return pulumi.get(self, "issuer_name")
167
166
 
168
- @property
167
+ @_builtins.property
169
168
  @pulumi.getter(name="issuerRef")
170
- def issuer_ref(self) -> builtins.str:
169
+ def issuer_ref(self) -> _builtins.str:
171
170
  return pulumi.get(self, "issuer_ref")
172
171
 
173
- @property
172
+ @_builtins.property
174
173
  @pulumi.getter(name="keyId")
175
- def key_id(self) -> builtins.str:
174
+ def key_id(self) -> _builtins.str:
176
175
  """
177
176
  ID of the key used by the issuer.
178
177
  """
179
178
  return pulumi.get(self, "key_id")
180
179
 
181
- @property
180
+ @_builtins.property
182
181
  @pulumi.getter(name="leafNotAfterBehavior")
183
- def leaf_not_after_behavior(self) -> builtins.str:
182
+ def leaf_not_after_behavior(self) -> _builtins.str:
184
183
  """
185
184
  Behavior of a leaf's NotAfter field during issuance.
186
185
  """
187
186
  return pulumi.get(self, "leaf_not_after_behavior")
188
187
 
189
- @property
188
+ @_builtins.property
190
189
  @pulumi.getter(name="manualChains")
191
- def manual_chains(self) -> Sequence[builtins.str]:
190
+ def manual_chains(self) -> Sequence[_builtins.str]:
192
191
  """
193
192
  Chain of issuer references to build this issuer's computed
194
193
  CAChain field from, when non-empty.
195
194
  """
196
195
  return pulumi.get(self, "manual_chains")
197
196
 
198
- @property
197
+ @_builtins.property
199
198
  @pulumi.getter
200
- def namespace(self) -> Optional[builtins.str]:
199
+ def namespace(self) -> Optional[_builtins.str]:
201
200
  return pulumi.get(self, "namespace")
202
201
 
203
- @property
202
+ @_builtins.property
204
203
  @pulumi.getter
205
- def usage(self) -> builtins.str:
204
+ def usage(self) -> _builtins.str:
206
205
  """
207
206
  Allowed usages for this issuer.
208
207
  """
@@ -233,13 +232,13 @@ class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
233
232
  usage=self.usage)
234
233
 
235
234
 
236
- def get_backend_issuer(backend: Optional[builtins.str] = None,
237
- disable_critical_extension_checks: Optional[builtins.bool] = None,
238
- disable_name_checks: Optional[builtins.bool] = None,
239
- disable_name_constraint_checks: Optional[builtins.bool] = None,
240
- disable_path_length_checks: Optional[builtins.bool] = None,
241
- issuer_ref: Optional[builtins.str] = None,
242
- namespace: Optional[builtins.str] = None,
235
+ def get_backend_issuer(backend: Optional[_builtins.str] = None,
236
+ disable_critical_extension_checks: Optional[_builtins.bool] = None,
237
+ disable_name_checks: Optional[_builtins.bool] = None,
238
+ disable_name_constraint_checks: Optional[_builtins.bool] = None,
239
+ disable_path_length_checks: Optional[_builtins.bool] = None,
240
+ issuer_ref: Optional[_builtins.str] = None,
241
+ namespace: Optional[_builtins.str] = None,
243
242
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
244
243
  """
245
244
  ## Example Usage
@@ -252,7 +251,7 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
252
251
  path="pki",
253
252
  type="pki",
254
253
  description="PKI secret engine mount")
255
- root = vault.pki_secret.SecretBackendRootCert("root",
254
+ root = vault.pkisecret.SecretBackendRootCert("root",
256
255
  backend=pki.path,
257
256
  type="internal",
258
257
  common_name="example",
@@ -263,25 +262,25 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
263
262
  ```
264
263
 
265
264
 
266
- :param builtins.str backend: The path to the PKI secret backend to
265
+ :param _builtins.str backend: The path to the PKI secret backend to
267
266
  read the issuer from, with no leading or trailing `/`s.
268
- :param builtins.bool disable_critical_extension_checks: This determines whether this
267
+ :param _builtins.bool disable_critical_extension_checks: This determines whether this
269
268
  issuer is able to issue certificates where the chain of trust (including the
270
269
  issued certificate) contain critical extensions not processed by Vault.
271
- :param builtins.bool disable_name_checks: This determines whether this issuer is able
270
+ :param _builtins.bool disable_name_checks: This determines whether this issuer is able
272
271
  to issue certificates where the chain of trust (including the final issued
273
272
  certificate) contains a link in which the subject of the issuing certificate
274
273
  does not match the named issuer of the certificate it signed.
275
- :param builtins.bool disable_name_constraint_checks: This determines whether this
274
+ :param _builtins.bool disable_name_constraint_checks: This determines whether this
276
275
  issuer is able to issue certificates where the chain of trust (including the
277
276
  final issued certificate) violates the name constraints critical extension of
278
277
  one of the issuer certificates in the chain.
279
- :param builtins.bool disable_path_length_checks: This determines whether this issuer
278
+ :param _builtins.bool disable_path_length_checks: This determines whether this issuer
280
279
  is able to issue certificates where the chain of trust (including the final
281
280
  issued certificate) is longer than allowed by a certificate authority in that
282
281
  chain.
283
- :param builtins.str issuer_ref: Reference to an existing issuer.
284
- :param builtins.str namespace: The namespace of the target resource.
282
+ :param _builtins.str issuer_ref: Reference to an existing issuer.
283
+ :param _builtins.str namespace: The namespace of the target resource.
285
284
  The value should not contain leading or trailing forward slashes.
286
285
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
287
286
  *Available only for Vault Enterprise*.
@@ -314,13 +313,13 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
314
313
  manual_chains=pulumi.get(__ret__, 'manual_chains'),
315
314
  namespace=pulumi.get(__ret__, 'namespace'),
316
315
  usage=pulumi.get(__ret__, 'usage'))
317
- def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = None,
318
- disable_critical_extension_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
319
- disable_name_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
320
- disable_name_constraint_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
321
- disable_path_length_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
322
- issuer_ref: Optional[pulumi.Input[builtins.str]] = None,
323
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
316
+ def get_backend_issuer_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
317
+ disable_critical_extension_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
318
+ disable_name_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
319
+ disable_name_constraint_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
320
+ disable_path_length_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
321
+ issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
322
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
324
323
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
325
324
  """
326
325
  ## Example Usage
@@ -333,7 +332,7 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = No
333
332
  path="pki",
334
333
  type="pki",
335
334
  description="PKI secret engine mount")
336
- root = vault.pki_secret.SecretBackendRootCert("root",
335
+ root = vault.pkisecret.SecretBackendRootCert("root",
337
336
  backend=pki.path,
338
337
  type="internal",
339
338
  common_name="example",
@@ -344,25 +343,25 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = No
344
343
  ```
345
344
 
346
345
 
347
- :param builtins.str backend: The path to the PKI secret backend to
346
+ :param _builtins.str backend: The path to the PKI secret backend to
348
347
  read the issuer from, with no leading or trailing `/`s.
349
- :param builtins.bool disable_critical_extension_checks: This determines whether this
348
+ :param _builtins.bool disable_critical_extension_checks: This determines whether this
350
349
  issuer is able to issue certificates where the chain of trust (including the
351
350
  issued certificate) contain critical extensions not processed by Vault.
352
- :param builtins.bool disable_name_checks: This determines whether this issuer is able
351
+ :param _builtins.bool disable_name_checks: This determines whether this issuer is able
353
352
  to issue certificates where the chain of trust (including the final issued
354
353
  certificate) contains a link in which the subject of the issuing certificate
355
354
  does not match the named issuer of the certificate it signed.
356
- :param builtins.bool disable_name_constraint_checks: This determines whether this
355
+ :param _builtins.bool disable_name_constraint_checks: This determines whether this
357
356
  issuer is able to issue certificates where the chain of trust (including the
358
357
  final issued certificate) violates the name constraints critical extension of
359
358
  one of the issuer certificates in the chain.
360
- :param builtins.bool disable_path_length_checks: This determines whether this issuer
359
+ :param _builtins.bool disable_path_length_checks: This determines whether this issuer
361
360
  is able to issue certificates where the chain of trust (including the final
362
361
  issued certificate) is longer than allowed by a certificate authority in that
363
362
  chain.
364
- :param builtins.str issuer_ref: Reference to an existing issuer.
365
- :param builtins.str namespace: The namespace of the target resource.
363
+ :param _builtins.str issuer_ref: Reference to an existing issuer.
364
+ :param _builtins.str namespace: The namespace of the target resource.
366
365
  The value should not contain leading or trailing forward slashes.
367
366
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
368
367
  *Available only for Vault Enterprise*.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -47,46 +46,46 @@ class GetBackendIssuersResult:
47
46
  raise TypeError("Expected argument 'namespace' to be a str")
48
47
  pulumi.set(__self__, "namespace", namespace)
49
48
 
50
- @property
49
+ @_builtins.property
51
50
  @pulumi.getter
52
- def backend(self) -> builtins.str:
51
+ def backend(self) -> _builtins.str:
53
52
  return pulumi.get(self, "backend")
54
53
 
55
- @property
54
+ @_builtins.property
56
55
  @pulumi.getter
57
- def id(self) -> builtins.str:
56
+ def id(self) -> _builtins.str:
58
57
  """
59
58
  The provider-assigned unique ID for this managed resource.
60
59
  """
61
60
  return pulumi.get(self, "id")
62
61
 
63
- @property
62
+ @_builtins.property
64
63
  @pulumi.getter(name="keyInfo")
65
- def key_info(self) -> Mapping[str, builtins.str]:
64
+ def key_info(self) -> Mapping[str, _builtins.str]:
66
65
  """
67
66
  Map of issuer strings read from Vault.
68
67
  """
69
68
  return pulumi.get(self, "key_info")
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter(name="keyInfoJson")
73
- def key_info_json(self) -> builtins.str:
72
+ def key_info_json(self) -> _builtins.str:
74
73
  """
75
74
  JSON-encoded issuer data read from Vault.
76
75
  """
77
76
  return pulumi.get(self, "key_info_json")
78
77
 
79
- @property
78
+ @_builtins.property
80
79
  @pulumi.getter
81
- def keys(self) -> Sequence[builtins.str]:
80
+ def keys(self) -> Sequence[_builtins.str]:
82
81
  """
83
82
  Keys used by issuers under the backend path.
84
83
  """
85
84
  return pulumi.get(self, "keys")
86
85
 
87
- @property
86
+ @_builtins.property
88
87
  @pulumi.getter
89
- def namespace(self) -> Optional[builtins.str]:
88
+ def namespace(self) -> Optional[_builtins.str]:
90
89
  return pulumi.get(self, "namespace")
91
90
 
92
91
 
@@ -104,8 +103,8 @@ class AwaitableGetBackendIssuersResult(GetBackendIssuersResult):
104
103
  namespace=self.namespace)
105
104
 
106
105
 
107
- def get_backend_issuers(backend: Optional[builtins.str] = None,
108
- namespace: Optional[builtins.str] = None,
106
+ def get_backend_issuers(backend: Optional[_builtins.str] = None,
107
+ namespace: Optional[_builtins.str] = None,
109
108
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuersResult:
110
109
  """
111
110
  ## Example Usage
@@ -118,7 +117,7 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
118
117
  path="pki",
119
118
  type="pki",
120
119
  description="PKI secret engine mount")
121
- root = vault.pki_secret.SecretBackendRootCert("root",
120
+ root = vault.pkisecret.SecretBackendRootCert("root",
122
121
  backend=pki.path,
123
122
  type="internal",
124
123
  common_name="example",
@@ -128,9 +127,9 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
128
127
  ```
129
128
 
130
129
 
131
- :param builtins.str backend: The path to the PKI secret backend to
130
+ :param _builtins.str backend: The path to the PKI secret backend to
132
131
  read the issuers from, with no leading or trailing `/`s.
133
- :param builtins.str namespace: The namespace of the target resource.
132
+ :param _builtins.str namespace: The namespace of the target resource.
134
133
  The value should not contain leading or trailing forward slashes.
135
134
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
136
135
  *Available only for Vault Enterprise*.
@@ -148,8 +147,8 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
148
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
149
148
  keys=pulumi.get(__ret__, 'keys'),
150
149
  namespace=pulumi.get(__ret__, 'namespace'))
151
- def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = None,
152
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
150
+ def get_backend_issuers_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
151
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
153
152
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
154
153
  """
155
154
  ## Example Usage
@@ -162,7 +161,7 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = N
162
161
  path="pki",
163
162
  type="pki",
164
163
  description="PKI secret engine mount")
165
- root = vault.pki_secret.SecretBackendRootCert("root",
164
+ root = vault.pkisecret.SecretBackendRootCert("root",
166
165
  backend=pki.path,
167
166
  type="internal",
168
167
  common_name="example",
@@ -172,9 +171,9 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = N
172
171
  ```
173
172
 
174
173
 
175
- :param builtins.str backend: The path to the PKI secret backend to
174
+ :param _builtins.str backend: The path to the PKI secret backend to
176
175
  read the issuers from, with no leading or trailing `/`s.
177
- :param builtins.str namespace: The namespace of the target resource.
176
+ :param _builtins.str namespace: The namespace of the target resource.
178
177
  The value should not contain leading or trailing forward slashes.
179
178
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
180
179
  *Available only for Vault Enterprise*.