pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,13 +19,13 @@ __all__ = ['SecretCredsArgs', 'SecretCreds']
20
19
  @pulumi.input_type
21
20
  class SecretCredsArgs:
22
21
  def __init__(__self__, *,
23
- backend: pulumi.Input[builtins.str],
24
- role: pulumi.Input[builtins.str],
25
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ backend: pulumi.Input[_builtins.str],
23
+ role: pulumi.Input[_builtins.str],
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
26
25
  """
27
26
  The set of arguments for constructing a SecretCreds resource.
28
- :param pulumi.Input[builtins.str] role: Name of the role.
29
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
27
+ :param pulumi.Input[_builtins.str] role: Name of the role.
28
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
30
29
  The value should not contain leading or trailing forward slashes.
31
30
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
32
31
  *Available only for Vault Enterprise*.
@@ -36,30 +35,30 @@ class SecretCredsArgs:
36
35
  if namespace is not None:
37
36
  pulumi.set(__self__, "namespace", namespace)
38
37
 
39
- @property
38
+ @_builtins.property
40
39
  @pulumi.getter
41
- def backend(self) -> pulumi.Input[builtins.str]:
40
+ def backend(self) -> pulumi.Input[_builtins.str]:
42
41
  return pulumi.get(self, "backend")
43
42
 
44
43
  @backend.setter
45
- def backend(self, value: pulumi.Input[builtins.str]):
44
+ def backend(self, value: pulumi.Input[_builtins.str]):
46
45
  pulumi.set(self, "backend", value)
47
46
 
48
- @property
47
+ @_builtins.property
49
48
  @pulumi.getter
50
- def role(self) -> pulumi.Input[builtins.str]:
49
+ def role(self) -> pulumi.Input[_builtins.str]:
51
50
  """
52
51
  Name of the role.
53
52
  """
54
53
  return pulumi.get(self, "role")
55
54
 
56
55
  @role.setter
57
- def role(self, value: pulumi.Input[builtins.str]):
56
+ def role(self, value: pulumi.Input[_builtins.str]):
58
57
  pulumi.set(self, "role", value)
59
58
 
60
- @property
59
+ @_builtins.property
61
60
  @pulumi.getter
62
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
61
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
63
62
  """
64
63
  The namespace to provision the resource in.
65
64
  The value should not contain leading or trailing forward slashes.
@@ -69,35 +68,35 @@ class SecretCredsArgs:
69
68
  return pulumi.get(self, "namespace")
70
69
 
71
70
  @namespace.setter
72
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
71
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
73
72
  pulumi.set(self, "namespace", value)
74
73
 
75
74
 
76
75
  @pulumi.input_type
77
76
  class _SecretCredsState:
78
77
  def __init__(__self__, *,
79
- backend: Optional[pulumi.Input[builtins.str]] = None,
80
- lease_id: Optional[pulumi.Input[builtins.str]] = None,
81
- namespace: Optional[pulumi.Input[builtins.str]] = None,
82
- organization: Optional[pulumi.Input[builtins.str]] = None,
83
- role: Optional[pulumi.Input[builtins.str]] = None,
84
- team_id: Optional[pulumi.Input[builtins.str]] = None,
85
- token: Optional[pulumi.Input[builtins.str]] = None,
86
- token_id: Optional[pulumi.Input[builtins.str]] = None):
78
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
79
+ lease_id: Optional[pulumi.Input[_builtins.str]] = None,
80
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
81
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
82
+ role: Optional[pulumi.Input[_builtins.str]] = None,
83
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
84
+ token: Optional[pulumi.Input[_builtins.str]] = None,
85
+ token_id: Optional[pulumi.Input[_builtins.str]] = None):
87
86
  """
88
87
  Input properties used for looking up and filtering SecretCreds resources.
89
- :param pulumi.Input[builtins.str] lease_id: The lease associated with the token. Only user tokens will have a
88
+ :param pulumi.Input[_builtins.str] lease_id: The lease associated with the token. Only user tokens will have a
90
89
  Vault lease associated with them.
91
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
90
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
92
91
  The value should not contain leading or trailing forward slashes.
93
92
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
94
93
  *Available only for Vault Enterprise*.
95
- :param pulumi.Input[builtins.str] organization: The organization associated with the token provided.
96
- :param pulumi.Input[builtins.str] role: Name of the role.
97
- :param pulumi.Input[builtins.str] team_id: The team id associated with the token provided.
98
- :param pulumi.Input[builtins.str] token: The actual token that was generated and can be used with API calls
94
+ :param pulumi.Input[_builtins.str] organization: The organization associated with the token provided.
95
+ :param pulumi.Input[_builtins.str] role: Name of the role.
96
+ :param pulumi.Input[_builtins.str] team_id: The team id associated with the token provided.
97
+ :param pulumi.Input[_builtins.str] token: The actual token that was generated and can be used with API calls
99
98
  to identify the user of the call.
100
- :param pulumi.Input[builtins.str] token_id: The public identifier for a specific token. It can be used
99
+ :param pulumi.Input[_builtins.str] token_id: The public identifier for a specific token. It can be used
101
100
  to look up information about a token or to revoke a token.
102
101
  """
103
102
  if backend is not None:
@@ -117,18 +116,18 @@ class _SecretCredsState:
117
116
  if token_id is not None:
118
117
  pulumi.set(__self__, "token_id", token_id)
119
118
 
120
- @property
119
+ @_builtins.property
121
120
  @pulumi.getter
122
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
121
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
123
122
  return pulumi.get(self, "backend")
124
123
 
125
124
  @backend.setter
126
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
125
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
127
126
  pulumi.set(self, "backend", value)
128
127
 
129
- @property
128
+ @_builtins.property
130
129
  @pulumi.getter(name="leaseId")
131
- def lease_id(self) -> Optional[pulumi.Input[builtins.str]]:
130
+ def lease_id(self) -> Optional[pulumi.Input[_builtins.str]]:
132
131
  """
133
132
  The lease associated with the token. Only user tokens will have a
134
133
  Vault lease associated with them.
@@ -136,12 +135,12 @@ class _SecretCredsState:
136
135
  return pulumi.get(self, "lease_id")
137
136
 
138
137
  @lease_id.setter
139
- def lease_id(self, value: Optional[pulumi.Input[builtins.str]]):
138
+ def lease_id(self, value: Optional[pulumi.Input[_builtins.str]]):
140
139
  pulumi.set(self, "lease_id", value)
141
140
 
142
- @property
141
+ @_builtins.property
143
142
  @pulumi.getter
144
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
143
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
145
144
  """
146
145
  The namespace to provision the resource in.
147
146
  The value should not contain leading or trailing forward slashes.
@@ -151,48 +150,48 @@ class _SecretCredsState:
151
150
  return pulumi.get(self, "namespace")
152
151
 
153
152
  @namespace.setter
154
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
153
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
155
154
  pulumi.set(self, "namespace", value)
156
155
 
157
- @property
156
+ @_builtins.property
158
157
  @pulumi.getter
159
- def organization(self) -> Optional[pulumi.Input[builtins.str]]:
158
+ def organization(self) -> Optional[pulumi.Input[_builtins.str]]:
160
159
  """
161
160
  The organization associated with the token provided.
162
161
  """
163
162
  return pulumi.get(self, "organization")
164
163
 
165
164
  @organization.setter
166
- def organization(self, value: Optional[pulumi.Input[builtins.str]]):
165
+ def organization(self, value: Optional[pulumi.Input[_builtins.str]]):
167
166
  pulumi.set(self, "organization", value)
168
167
 
169
- @property
168
+ @_builtins.property
170
169
  @pulumi.getter
171
- def role(self) -> Optional[pulumi.Input[builtins.str]]:
170
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
172
171
  """
173
172
  Name of the role.
174
173
  """
175
174
  return pulumi.get(self, "role")
176
175
 
177
176
  @role.setter
178
- def role(self, value: Optional[pulumi.Input[builtins.str]]):
177
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
179
178
  pulumi.set(self, "role", value)
180
179
 
181
- @property
180
+ @_builtins.property
182
181
  @pulumi.getter(name="teamId")
183
- def team_id(self) -> Optional[pulumi.Input[builtins.str]]:
182
+ def team_id(self) -> Optional[pulumi.Input[_builtins.str]]:
184
183
  """
185
184
  The team id associated with the token provided.
186
185
  """
187
186
  return pulumi.get(self, "team_id")
188
187
 
189
188
  @team_id.setter
190
- def team_id(self, value: Optional[pulumi.Input[builtins.str]]):
189
+ def team_id(self, value: Optional[pulumi.Input[_builtins.str]]):
191
190
  pulumi.set(self, "team_id", value)
192
191
 
193
- @property
192
+ @_builtins.property
194
193
  @pulumi.getter
195
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
194
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
196
195
  """
197
196
  The actual token that was generated and can be used with API calls
198
197
  to identify the user of the call.
@@ -200,12 +199,12 @@ class _SecretCredsState:
200
199
  return pulumi.get(self, "token")
201
200
 
202
201
  @token.setter
203
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
202
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
204
203
  pulumi.set(self, "token", value)
205
204
 
206
- @property
205
+ @_builtins.property
207
206
  @pulumi.getter(name="tokenId")
208
- def token_id(self) -> Optional[pulumi.Input[builtins.str]]:
207
+ def token_id(self) -> Optional[pulumi.Input[_builtins.str]]:
209
208
  """
210
209
  The public identifier for a specific token. It can be used
211
210
  to look up information about a token or to revoke a token.
@@ -213,7 +212,7 @@ class _SecretCredsState:
213
212
  return pulumi.get(self, "token_id")
214
213
 
215
214
  @token_id.setter
216
- def token_id(self, value: Optional[pulumi.Input[builtins.str]]):
215
+ def token_id(self, value: Optional[pulumi.Input[_builtins.str]]):
217
216
  pulumi.set(self, "token_id", value)
218
217
 
219
218
 
@@ -223,9 +222,9 @@ class SecretCreds(pulumi.CustomResource):
223
222
  def __init__(__self__,
224
223
  resource_name: str,
225
224
  opts: Optional[pulumi.ResourceOptions] = None,
226
- backend: Optional[pulumi.Input[builtins.str]] = None,
227
- namespace: Optional[pulumi.Input[builtins.str]] = None,
228
- role: Optional[pulumi.Input[builtins.str]] = None,
225
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
226
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
227
+ role: Optional[pulumi.Input[_builtins.str]] = None,
229
228
  __props__=None):
230
229
  """
231
230
  ## Example Usage
@@ -250,11 +249,11 @@ class SecretCreds(pulumi.CustomResource):
250
249
 
251
250
  :param str resource_name: The name of the resource.
252
251
  :param pulumi.ResourceOptions opts: Options for the resource.
253
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
252
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
254
253
  The value should not contain leading or trailing forward slashes.
255
254
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
256
255
  *Available only for Vault Enterprise*.
257
- :param pulumi.Input[builtins.str] role: Name of the role.
256
+ :param pulumi.Input[_builtins.str] role: Name of the role.
258
257
  """
259
258
  ...
260
259
  @overload
@@ -298,9 +297,9 @@ class SecretCreds(pulumi.CustomResource):
298
297
  def _internal_init(__self__,
299
298
  resource_name: str,
300
299
  opts: Optional[pulumi.ResourceOptions] = None,
301
- backend: Optional[pulumi.Input[builtins.str]] = None,
302
- namespace: Optional[pulumi.Input[builtins.str]] = None,
303
- role: Optional[pulumi.Input[builtins.str]] = None,
300
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
301
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
302
+ role: Optional[pulumi.Input[_builtins.str]] = None,
304
303
  __props__=None):
305
304
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
306
305
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -334,14 +333,14 @@ class SecretCreds(pulumi.CustomResource):
334
333
  def get(resource_name: str,
335
334
  id: pulumi.Input[str],
336
335
  opts: Optional[pulumi.ResourceOptions] = None,
337
- backend: Optional[pulumi.Input[builtins.str]] = None,
338
- lease_id: Optional[pulumi.Input[builtins.str]] = None,
339
- namespace: Optional[pulumi.Input[builtins.str]] = None,
340
- organization: Optional[pulumi.Input[builtins.str]] = None,
341
- role: Optional[pulumi.Input[builtins.str]] = None,
342
- team_id: Optional[pulumi.Input[builtins.str]] = None,
343
- token: Optional[pulumi.Input[builtins.str]] = None,
344
- token_id: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretCreds':
336
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
337
+ lease_id: Optional[pulumi.Input[_builtins.str]] = None,
338
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
339
+ organization: Optional[pulumi.Input[_builtins.str]] = None,
340
+ role: Optional[pulumi.Input[_builtins.str]] = None,
341
+ team_id: Optional[pulumi.Input[_builtins.str]] = None,
342
+ token: Optional[pulumi.Input[_builtins.str]] = None,
343
+ token_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretCreds':
345
344
  """
346
345
  Get an existing SecretCreds resource's state with the given name, id, and optional extra
347
346
  properties used to qualify the lookup.
@@ -349,18 +348,18 @@ class SecretCreds(pulumi.CustomResource):
349
348
  :param str resource_name: The unique name of the resulting resource.
350
349
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
351
350
  :param pulumi.ResourceOptions opts: Options for the resource.
352
- :param pulumi.Input[builtins.str] lease_id: The lease associated with the token. Only user tokens will have a
351
+ :param pulumi.Input[_builtins.str] lease_id: The lease associated with the token. Only user tokens will have a
353
352
  Vault lease associated with them.
354
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
353
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
355
354
  The value should not contain leading or trailing forward slashes.
356
355
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
357
356
  *Available only for Vault Enterprise*.
358
- :param pulumi.Input[builtins.str] organization: The organization associated with the token provided.
359
- :param pulumi.Input[builtins.str] role: Name of the role.
360
- :param pulumi.Input[builtins.str] team_id: The team id associated with the token provided.
361
- :param pulumi.Input[builtins.str] token: The actual token that was generated and can be used with API calls
357
+ :param pulumi.Input[_builtins.str] organization: The organization associated with the token provided.
358
+ :param pulumi.Input[_builtins.str] role: Name of the role.
359
+ :param pulumi.Input[_builtins.str] team_id: The team id associated with the token provided.
360
+ :param pulumi.Input[_builtins.str] token: The actual token that was generated and can be used with API calls
362
361
  to identify the user of the call.
363
- :param pulumi.Input[builtins.str] token_id: The public identifier for a specific token. It can be used
362
+ :param pulumi.Input[_builtins.str] token_id: The public identifier for a specific token. It can be used
364
363
  to look up information about a token or to revoke a token.
365
364
  """
366
365
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -377,23 +376,23 @@ class SecretCreds(pulumi.CustomResource):
377
376
  __props__.__dict__["token_id"] = token_id
378
377
  return SecretCreds(resource_name, opts=opts, __props__=__props__)
379
378
 
380
- @property
379
+ @_builtins.property
381
380
  @pulumi.getter
382
- def backend(self) -> pulumi.Output[builtins.str]:
381
+ def backend(self) -> pulumi.Output[_builtins.str]:
383
382
  return pulumi.get(self, "backend")
384
383
 
385
- @property
384
+ @_builtins.property
386
385
  @pulumi.getter(name="leaseId")
387
- def lease_id(self) -> pulumi.Output[builtins.str]:
386
+ def lease_id(self) -> pulumi.Output[_builtins.str]:
388
387
  """
389
388
  The lease associated with the token. Only user tokens will have a
390
389
  Vault lease associated with them.
391
390
  """
392
391
  return pulumi.get(self, "lease_id")
393
392
 
394
- @property
393
+ @_builtins.property
395
394
  @pulumi.getter
396
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
395
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
397
396
  """
398
397
  The namespace to provision the resource in.
399
398
  The value should not contain leading or trailing forward slashes.
@@ -402,42 +401,42 @@ class SecretCreds(pulumi.CustomResource):
402
401
  """
403
402
  return pulumi.get(self, "namespace")
404
403
 
405
- @property
404
+ @_builtins.property
406
405
  @pulumi.getter
407
- def organization(self) -> pulumi.Output[builtins.str]:
406
+ def organization(self) -> pulumi.Output[_builtins.str]:
408
407
  """
409
408
  The organization associated with the token provided.
410
409
  """
411
410
  return pulumi.get(self, "organization")
412
411
 
413
- @property
412
+ @_builtins.property
414
413
  @pulumi.getter
415
- def role(self) -> pulumi.Output[builtins.str]:
414
+ def role(self) -> pulumi.Output[_builtins.str]:
416
415
  """
417
416
  Name of the role.
418
417
  """
419
418
  return pulumi.get(self, "role")
420
419
 
421
- @property
420
+ @_builtins.property
422
421
  @pulumi.getter(name="teamId")
423
- def team_id(self) -> pulumi.Output[builtins.str]:
422
+ def team_id(self) -> pulumi.Output[_builtins.str]:
424
423
  """
425
424
  The team id associated with the token provided.
426
425
  """
427
426
  return pulumi.get(self, "team_id")
428
427
 
429
- @property
428
+ @_builtins.property
430
429
  @pulumi.getter
431
- def token(self) -> pulumi.Output[builtins.str]:
430
+ def token(self) -> pulumi.Output[_builtins.str]:
432
431
  """
433
432
  The actual token that was generated and can be used with API calls
434
433
  to identify the user of the call.
435
434
  """
436
435
  return pulumi.get(self, "token")
437
436
 
438
- @property
437
+ @_builtins.property
439
438
  @pulumi.getter(name="tokenId")
440
- def token_id(self) -> pulumi.Output[builtins.str]:
439
+ def token_id(self) -> pulumi.Output[_builtins.str]:
441
440
  """
442
441
  The public identifier for a specific token. It can be used
443
442
  to look up information about a token or to revoke a token.