pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,24 +19,24 @@ __all__ = ['SecretRoleArgs', 'SecretRole']
20
19
  @pulumi.input_type
21
20
  class SecretRoleArgs:
22
21
  def __init__(__self__, *,
23
- backend: pulumi.Input[builtins.str],
24
- role: pulumi.Input[builtins.str],
25
- service_account_name: pulumi.Input[builtins.str],
26
- namespace: Optional[pulumi.Input[builtins.str]] = None,
27
- ttl: Optional[pulumi.Input[builtins.int]] = None):
22
+ backend: pulumi.Input[_builtins.str],
23
+ role: pulumi.Input[_builtins.str],
24
+ service_account_name: pulumi.Input[_builtins.str],
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
28
27
  """
29
28
  The set of arguments for constructing a SecretRole resource.
30
- :param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
29
+ :param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
31
30
  with no leading or trailing `/`s.
32
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
31
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
33
32
  Must be unique within the backend.
34
- :param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
33
+ :param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
35
34
  account mapped to this role.
36
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
36
  The value should not contain leading or trailing forward slashes.
38
37
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
38
  *Available only for Vault Enterprise*.
40
- :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
39
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
41
40
  ttl if not provided.
42
41
  """
43
42
  pulumi.set(__self__, "backend", backend)
@@ -48,9 +47,9 @@ class SecretRoleArgs:
48
47
  if ttl is not None:
49
48
  pulumi.set(__self__, "ttl", ttl)
50
49
 
51
- @property
50
+ @_builtins.property
52
51
  @pulumi.getter
53
- def backend(self) -> pulumi.Input[builtins.str]:
52
+ def backend(self) -> pulumi.Input[_builtins.str]:
54
53
  """
55
54
  The path the AD secret backend is mounted at,
56
55
  with no leading or trailing `/`s.
@@ -58,12 +57,12 @@ class SecretRoleArgs:
58
57
  return pulumi.get(self, "backend")
59
58
 
60
59
  @backend.setter
61
- def backend(self, value: pulumi.Input[builtins.str]):
60
+ def backend(self, value: pulumi.Input[_builtins.str]):
62
61
  pulumi.set(self, "backend", value)
63
62
 
64
- @property
63
+ @_builtins.property
65
64
  @pulumi.getter
66
- def role(self) -> pulumi.Input[builtins.str]:
65
+ def role(self) -> pulumi.Input[_builtins.str]:
67
66
  """
68
67
  The name to identify this role within the backend.
69
68
  Must be unique within the backend.
@@ -71,12 +70,12 @@ class SecretRoleArgs:
71
70
  return pulumi.get(self, "role")
72
71
 
73
72
  @role.setter
74
- def role(self, value: pulumi.Input[builtins.str]):
73
+ def role(self, value: pulumi.Input[_builtins.str]):
75
74
  pulumi.set(self, "role", value)
76
75
 
77
- @property
76
+ @_builtins.property
78
77
  @pulumi.getter(name="serviceAccountName")
79
- def service_account_name(self) -> pulumi.Input[builtins.str]:
78
+ def service_account_name(self) -> pulumi.Input[_builtins.str]:
80
79
  """
81
80
  Specifies the name of the Active Directory service
82
81
  account mapped to this role.
@@ -84,12 +83,12 @@ class SecretRoleArgs:
84
83
  return pulumi.get(self, "service_account_name")
85
84
 
86
85
  @service_account_name.setter
87
- def service_account_name(self, value: pulumi.Input[builtins.str]):
86
+ def service_account_name(self, value: pulumi.Input[_builtins.str]):
88
87
  pulumi.set(self, "service_account_name", value)
89
88
 
90
- @property
89
+ @_builtins.property
91
90
  @pulumi.getter
92
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
91
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
93
92
  """
94
93
  The namespace to provision the resource in.
95
94
  The value should not contain leading or trailing forward slashes.
@@ -99,12 +98,12 @@ class SecretRoleArgs:
99
98
  return pulumi.get(self, "namespace")
100
99
 
101
100
  @namespace.setter
102
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
101
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
103
102
  pulumi.set(self, "namespace", value)
104
103
 
105
- @property
104
+ @_builtins.property
106
105
  @pulumi.getter
107
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
106
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
108
107
  """
109
108
  The password time-to-live in seconds. Defaults to the configuration
110
109
  ttl if not provided.
@@ -112,35 +111,35 @@ class SecretRoleArgs:
112
111
  return pulumi.get(self, "ttl")
113
112
 
114
113
  @ttl.setter
115
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
114
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
116
115
  pulumi.set(self, "ttl", value)
117
116
 
118
117
 
119
118
  @pulumi.input_type
120
119
  class _SecretRoleState:
121
120
  def __init__(__self__, *,
122
- backend: Optional[pulumi.Input[builtins.str]] = None,
123
- last_vault_rotation: Optional[pulumi.Input[builtins.str]] = None,
124
- namespace: Optional[pulumi.Input[builtins.str]] = None,
125
- password_last_set: Optional[pulumi.Input[builtins.str]] = None,
126
- role: Optional[pulumi.Input[builtins.str]] = None,
127
- service_account_name: Optional[pulumi.Input[builtins.str]] = None,
128
- ttl: Optional[pulumi.Input[builtins.int]] = None):
121
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
122
+ last_vault_rotation: Optional[pulumi.Input[_builtins.str]] = None,
123
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
124
+ password_last_set: Optional[pulumi.Input[_builtins.str]] = None,
125
+ role: Optional[pulumi.Input[_builtins.str]] = None,
126
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
127
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
129
128
  """
130
129
  Input properties used for looking up and filtering SecretRole resources.
131
- :param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
130
+ :param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
132
131
  with no leading or trailing `/`s.
133
- :param pulumi.Input[builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
134
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
132
+ :param pulumi.Input[_builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
133
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
135
134
  The value should not contain leading or trailing forward slashes.
136
135
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
137
136
  *Available only for Vault Enterprise*.
138
- :param pulumi.Input[builtins.str] password_last_set: Timestamp of the last password set by Vault.
139
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
137
+ :param pulumi.Input[_builtins.str] password_last_set: Timestamp of the last password set by Vault.
138
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
140
139
  Must be unique within the backend.
141
- :param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
140
+ :param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
142
141
  account mapped to this role.
143
- :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
142
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
144
143
  ttl if not provided.
145
144
  """
146
145
  if backend is not None:
@@ -158,9 +157,9 @@ class _SecretRoleState:
158
157
  if ttl is not None:
159
158
  pulumi.set(__self__, "ttl", ttl)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter
163
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
162
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
164
163
  """
165
164
  The path the AD secret backend is mounted at,
166
165
  with no leading or trailing `/`s.
@@ -168,24 +167,24 @@ class _SecretRoleState:
168
167
  return pulumi.get(self, "backend")
169
168
 
170
169
  @backend.setter
171
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
170
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
172
171
  pulumi.set(self, "backend", value)
173
172
 
174
- @property
173
+ @_builtins.property
175
174
  @pulumi.getter(name="lastVaultRotation")
176
- def last_vault_rotation(self) -> Optional[pulumi.Input[builtins.str]]:
175
+ def last_vault_rotation(self) -> Optional[pulumi.Input[_builtins.str]]:
177
176
  """
178
177
  Timestamp of the last password rotation by Vault.
179
178
  """
180
179
  return pulumi.get(self, "last_vault_rotation")
181
180
 
182
181
  @last_vault_rotation.setter
183
- def last_vault_rotation(self, value: Optional[pulumi.Input[builtins.str]]):
182
+ def last_vault_rotation(self, value: Optional[pulumi.Input[_builtins.str]]):
184
183
  pulumi.set(self, "last_vault_rotation", value)
185
184
 
186
- @property
185
+ @_builtins.property
187
186
  @pulumi.getter
188
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
187
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
189
188
  """
190
189
  The namespace to provision the resource in.
191
190
  The value should not contain leading or trailing forward slashes.
@@ -195,24 +194,24 @@ class _SecretRoleState:
195
194
  return pulumi.get(self, "namespace")
196
195
 
197
196
  @namespace.setter
198
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
197
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
199
198
  pulumi.set(self, "namespace", value)
200
199
 
201
- @property
200
+ @_builtins.property
202
201
  @pulumi.getter(name="passwordLastSet")
203
- def password_last_set(self) -> Optional[pulumi.Input[builtins.str]]:
202
+ def password_last_set(self) -> Optional[pulumi.Input[_builtins.str]]:
204
203
  """
205
204
  Timestamp of the last password set by Vault.
206
205
  """
207
206
  return pulumi.get(self, "password_last_set")
208
207
 
209
208
  @password_last_set.setter
210
- def password_last_set(self, value: Optional[pulumi.Input[builtins.str]]):
209
+ def password_last_set(self, value: Optional[pulumi.Input[_builtins.str]]):
211
210
  pulumi.set(self, "password_last_set", value)
212
211
 
213
- @property
212
+ @_builtins.property
214
213
  @pulumi.getter
215
- def role(self) -> Optional[pulumi.Input[builtins.str]]:
214
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
216
215
  """
217
216
  The name to identify this role within the backend.
218
217
  Must be unique within the backend.
@@ -220,12 +219,12 @@ class _SecretRoleState:
220
219
  return pulumi.get(self, "role")
221
220
 
222
221
  @role.setter
223
- def role(self, value: Optional[pulumi.Input[builtins.str]]):
222
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
224
223
  pulumi.set(self, "role", value)
225
224
 
226
- @property
225
+ @_builtins.property
227
226
  @pulumi.getter(name="serviceAccountName")
228
- def service_account_name(self) -> Optional[pulumi.Input[builtins.str]]:
227
+ def service_account_name(self) -> Optional[pulumi.Input[_builtins.str]]:
229
228
  """
230
229
  Specifies the name of the Active Directory service
231
230
  account mapped to this role.
@@ -233,12 +232,12 @@ class _SecretRoleState:
233
232
  return pulumi.get(self, "service_account_name")
234
233
 
235
234
  @service_account_name.setter
236
- def service_account_name(self, value: Optional[pulumi.Input[builtins.str]]):
235
+ def service_account_name(self, value: Optional[pulumi.Input[_builtins.str]]):
237
236
  pulumi.set(self, "service_account_name", value)
238
237
 
239
- @property
238
+ @_builtins.property
240
239
  @pulumi.getter
241
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
240
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
242
241
  """
243
242
  The password time-to-live in seconds. Defaults to the configuration
244
243
  ttl if not provided.
@@ -246,7 +245,7 @@ class _SecretRoleState:
246
245
  return pulumi.get(self, "ttl")
247
246
 
248
247
  @ttl.setter
249
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
248
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
250
249
  pulumi.set(self, "ttl", value)
251
250
 
252
251
 
@@ -256,11 +255,11 @@ class SecretRole(pulumi.CustomResource):
256
255
  def __init__(__self__,
257
256
  resource_name: str,
258
257
  opts: Optional[pulumi.ResourceOptions] = None,
259
- backend: Optional[pulumi.Input[builtins.str]] = None,
260
- namespace: Optional[pulumi.Input[builtins.str]] = None,
261
- role: Optional[pulumi.Input[builtins.str]] = None,
262
- service_account_name: Optional[pulumi.Input[builtins.str]] = None,
263
- ttl: Optional[pulumi.Input[builtins.int]] = None,
258
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
259
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
260
+ role: Optional[pulumi.Input[_builtins.str]] = None,
261
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
262
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
264
263
  __props__=None):
265
264
  """
266
265
  ## Example Usage
@@ -293,17 +292,17 @@ class SecretRole(pulumi.CustomResource):
293
292
 
294
293
  :param str resource_name: The name of the resource.
295
294
  :param pulumi.ResourceOptions opts: Options for the resource.
296
- :param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
295
+ :param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
297
296
  with no leading or trailing `/`s.
298
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
297
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
299
298
  The value should not contain leading or trailing forward slashes.
300
299
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
301
300
  *Available only for Vault Enterprise*.
302
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
301
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
303
302
  Must be unique within the backend.
304
- :param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
303
+ :param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
305
304
  account mapped to this role.
306
- :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
305
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
307
306
  ttl if not provided.
308
307
  """
309
308
  ...
@@ -356,11 +355,11 @@ class SecretRole(pulumi.CustomResource):
356
355
  def _internal_init(__self__,
357
356
  resource_name: str,
358
357
  opts: Optional[pulumi.ResourceOptions] = None,
359
- backend: Optional[pulumi.Input[builtins.str]] = None,
360
- namespace: Optional[pulumi.Input[builtins.str]] = None,
361
- role: Optional[pulumi.Input[builtins.str]] = None,
362
- service_account_name: Optional[pulumi.Input[builtins.str]] = None,
363
- ttl: Optional[pulumi.Input[builtins.int]] = None,
358
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
359
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
360
+ role: Optional[pulumi.Input[_builtins.str]] = None,
361
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
362
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
364
363
  __props__=None):
365
364
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
366
365
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -393,13 +392,13 @@ class SecretRole(pulumi.CustomResource):
393
392
  def get(resource_name: str,
394
393
  id: pulumi.Input[str],
395
394
  opts: Optional[pulumi.ResourceOptions] = None,
396
- backend: Optional[pulumi.Input[builtins.str]] = None,
397
- last_vault_rotation: Optional[pulumi.Input[builtins.str]] = None,
398
- namespace: Optional[pulumi.Input[builtins.str]] = None,
399
- password_last_set: Optional[pulumi.Input[builtins.str]] = None,
400
- role: Optional[pulumi.Input[builtins.str]] = None,
401
- service_account_name: Optional[pulumi.Input[builtins.str]] = None,
402
- ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'SecretRole':
395
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
396
+ last_vault_rotation: Optional[pulumi.Input[_builtins.str]] = None,
397
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
398
+ password_last_set: Optional[pulumi.Input[_builtins.str]] = None,
399
+ role: Optional[pulumi.Input[_builtins.str]] = None,
400
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
401
+ ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretRole':
403
402
  """
404
403
  Get an existing SecretRole resource's state with the given name, id, and optional extra
405
404
  properties used to qualify the lookup.
@@ -407,19 +406,19 @@ class SecretRole(pulumi.CustomResource):
407
406
  :param str resource_name: The unique name of the resulting resource.
408
407
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
409
408
  :param pulumi.ResourceOptions opts: Options for the resource.
410
- :param pulumi.Input[builtins.str] backend: The path the AD secret backend is mounted at,
409
+ :param pulumi.Input[_builtins.str] backend: The path the AD secret backend is mounted at,
411
410
  with no leading or trailing `/`s.
412
- :param pulumi.Input[builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
413
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
411
+ :param pulumi.Input[_builtins.str] last_vault_rotation: Timestamp of the last password rotation by Vault.
412
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
414
413
  The value should not contain leading or trailing forward slashes.
415
414
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
416
415
  *Available only for Vault Enterprise*.
417
- :param pulumi.Input[builtins.str] password_last_set: Timestamp of the last password set by Vault.
418
- :param pulumi.Input[builtins.str] role: The name to identify this role within the backend.
416
+ :param pulumi.Input[_builtins.str] password_last_set: Timestamp of the last password set by Vault.
417
+ :param pulumi.Input[_builtins.str] role: The name to identify this role within the backend.
419
418
  Must be unique within the backend.
420
- :param pulumi.Input[builtins.str] service_account_name: Specifies the name of the Active Directory service
419
+ :param pulumi.Input[_builtins.str] service_account_name: Specifies the name of the Active Directory service
421
420
  account mapped to this role.
422
- :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
421
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
423
422
  ttl if not provided.
424
423
  """
425
424
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -435,26 +434,26 @@ class SecretRole(pulumi.CustomResource):
435
434
  __props__.__dict__["ttl"] = ttl
436
435
  return SecretRole(resource_name, opts=opts, __props__=__props__)
437
436
 
438
- @property
437
+ @_builtins.property
439
438
  @pulumi.getter
440
- def backend(self) -> pulumi.Output[builtins.str]:
439
+ def backend(self) -> pulumi.Output[_builtins.str]:
441
440
  """
442
441
  The path the AD secret backend is mounted at,
443
442
  with no leading or trailing `/`s.
444
443
  """
445
444
  return pulumi.get(self, "backend")
446
445
 
447
- @property
446
+ @_builtins.property
448
447
  @pulumi.getter(name="lastVaultRotation")
449
- def last_vault_rotation(self) -> pulumi.Output[builtins.str]:
448
+ def last_vault_rotation(self) -> pulumi.Output[_builtins.str]:
450
449
  """
451
450
  Timestamp of the last password rotation by Vault.
452
451
  """
453
452
  return pulumi.get(self, "last_vault_rotation")
454
453
 
455
- @property
454
+ @_builtins.property
456
455
  @pulumi.getter
457
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
456
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
458
457
  """
459
458
  The namespace to provision the resource in.
460
459
  The value should not contain leading or trailing forward slashes.
@@ -463,35 +462,35 @@ class SecretRole(pulumi.CustomResource):
463
462
  """
464
463
  return pulumi.get(self, "namespace")
465
464
 
466
- @property
465
+ @_builtins.property
467
466
  @pulumi.getter(name="passwordLastSet")
468
- def password_last_set(self) -> pulumi.Output[builtins.str]:
467
+ def password_last_set(self) -> pulumi.Output[_builtins.str]:
469
468
  """
470
469
  Timestamp of the last password set by Vault.
471
470
  """
472
471
  return pulumi.get(self, "password_last_set")
473
472
 
474
- @property
473
+ @_builtins.property
475
474
  @pulumi.getter
476
- def role(self) -> pulumi.Output[builtins.str]:
475
+ def role(self) -> pulumi.Output[_builtins.str]:
477
476
  """
478
477
  The name to identify this role within the backend.
479
478
  Must be unique within the backend.
480
479
  """
481
480
  return pulumi.get(self, "role")
482
481
 
483
- @property
482
+ @_builtins.property
484
483
  @pulumi.getter(name="serviceAccountName")
485
- def service_account_name(self) -> pulumi.Output[builtins.str]:
484
+ def service_account_name(self) -> pulumi.Output[_builtins.str]:
486
485
  """
487
486
  Specifies the name of the Active Directory service
488
487
  account mapped to this role.
489
488
  """
490
489
  return pulumi.get(self, "service_account_name")
491
490
 
492
- @property
491
+ @_builtins.property
493
492
  @pulumi.getter
494
- def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
493
+ def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
495
494
  """
496
495
  The password time-to-live in seconds. Defaults to the configuration
497
496
  ttl if not provided.
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members: