pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,17 +19,17 @@ __all__ = ['SecretScopeArgs', 'SecretScope']
20
19
  @pulumi.input_type
21
20
  class SecretScopeArgs:
22
21
  def __init__(__self__, *,
23
- path: pulumi.Input[builtins.str],
24
- scope: pulumi.Input[builtins.str],
25
- force: Optional[pulumi.Input[builtins.bool]] = None,
26
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ path: pulumi.Input[_builtins.str],
23
+ scope: pulumi.Input[_builtins.str],
24
+ force: Optional[pulumi.Input[_builtins.bool]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
27
26
  """
28
27
  The set of arguments for constructing a SecretScope resource.
29
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
28
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
30
29
  not begin or end with a `/`. Defaults to `kmip`.
31
- :param pulumi.Input[builtins.str] scope: Name of the scope.
32
- :param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
33
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
30
+ :param pulumi.Input[_builtins.str] scope: Name of the scope.
31
+ :param pulumi.Input[_builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
32
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
34
33
  The value should not contain leading or trailing forward slashes.
35
34
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
36
35
  *Available only for Vault Enterprise*.
@@ -42,9 +41,9 @@ class SecretScopeArgs:
42
41
  if namespace is not None:
43
42
  pulumi.set(__self__, "namespace", namespace)
44
43
 
45
- @property
44
+ @_builtins.property
46
45
  @pulumi.getter
47
- def path(self) -> pulumi.Input[builtins.str]:
46
+ def path(self) -> pulumi.Input[_builtins.str]:
48
47
  """
49
48
  The unique path this backend should be mounted at. Must
50
49
  not begin or end with a `/`. Defaults to `kmip`.
@@ -52,36 +51,36 @@ class SecretScopeArgs:
52
51
  return pulumi.get(self, "path")
53
52
 
54
53
  @path.setter
55
- def path(self, value: pulumi.Input[builtins.str]):
54
+ def path(self, value: pulumi.Input[_builtins.str]):
56
55
  pulumi.set(self, "path", value)
57
56
 
58
- @property
57
+ @_builtins.property
59
58
  @pulumi.getter
60
- def scope(self) -> pulumi.Input[builtins.str]:
59
+ def scope(self) -> pulumi.Input[_builtins.str]:
61
60
  """
62
61
  Name of the scope.
63
62
  """
64
63
  return pulumi.get(self, "scope")
65
64
 
66
65
  @scope.setter
67
- def scope(self, value: pulumi.Input[builtins.str]):
66
+ def scope(self, value: pulumi.Input[_builtins.str]):
68
67
  pulumi.set(self, "scope", value)
69
68
 
70
- @property
69
+ @_builtins.property
71
70
  @pulumi.getter
72
- def force(self) -> Optional[pulumi.Input[builtins.bool]]:
71
+ def force(self) -> Optional[pulumi.Input[_builtins.bool]]:
73
72
  """
74
73
  Boolean field to force deletion even if there are managed objects in the scope.
75
74
  """
76
75
  return pulumi.get(self, "force")
77
76
 
78
77
  @force.setter
79
- def force(self, value: Optional[pulumi.Input[builtins.bool]]):
78
+ def force(self, value: Optional[pulumi.Input[_builtins.bool]]):
80
79
  pulumi.set(self, "force", value)
81
80
 
82
- @property
81
+ @_builtins.property
83
82
  @pulumi.getter
84
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
83
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
85
84
  """
86
85
  The namespace to provision the resource in.
87
86
  The value should not contain leading or trailing forward slashes.
@@ -91,27 +90,27 @@ class SecretScopeArgs:
91
90
  return pulumi.get(self, "namespace")
92
91
 
93
92
  @namespace.setter
94
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
93
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
95
94
  pulumi.set(self, "namespace", value)
96
95
 
97
96
 
98
97
  @pulumi.input_type
99
98
  class _SecretScopeState:
100
99
  def __init__(__self__, *,
101
- force: Optional[pulumi.Input[builtins.bool]] = None,
102
- namespace: Optional[pulumi.Input[builtins.str]] = None,
103
- path: Optional[pulumi.Input[builtins.str]] = None,
104
- scope: Optional[pulumi.Input[builtins.str]] = None):
100
+ force: Optional[pulumi.Input[_builtins.bool]] = None,
101
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
102
+ path: Optional[pulumi.Input[_builtins.str]] = None,
103
+ scope: Optional[pulumi.Input[_builtins.str]] = None):
105
104
  """
106
105
  Input properties used for looking up and filtering SecretScope resources.
107
- :param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
108
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
106
+ :param pulumi.Input[_builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
107
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
109
108
  The value should not contain leading or trailing forward slashes.
110
109
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
111
110
  *Available only for Vault Enterprise*.
112
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
111
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
113
112
  not begin or end with a `/`. Defaults to `kmip`.
114
- :param pulumi.Input[builtins.str] scope: Name of the scope.
113
+ :param pulumi.Input[_builtins.str] scope: Name of the scope.
115
114
  """
116
115
  if force is not None:
117
116
  pulumi.set(__self__, "force", force)
@@ -122,21 +121,21 @@ class _SecretScopeState:
122
121
  if scope is not None:
123
122
  pulumi.set(__self__, "scope", scope)
124
123
 
125
- @property
124
+ @_builtins.property
126
125
  @pulumi.getter
127
- def force(self) -> Optional[pulumi.Input[builtins.bool]]:
126
+ def force(self) -> Optional[pulumi.Input[_builtins.bool]]:
128
127
  """
129
128
  Boolean field to force deletion even if there are managed objects in the scope.
130
129
  """
131
130
  return pulumi.get(self, "force")
132
131
 
133
132
  @force.setter
134
- def force(self, value: Optional[pulumi.Input[builtins.bool]]):
133
+ def force(self, value: Optional[pulumi.Input[_builtins.bool]]):
135
134
  pulumi.set(self, "force", value)
136
135
 
137
- @property
136
+ @_builtins.property
138
137
  @pulumi.getter
139
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
138
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
140
139
  """
141
140
  The namespace to provision the resource in.
142
141
  The value should not contain leading or trailing forward slashes.
@@ -146,12 +145,12 @@ class _SecretScopeState:
146
145
  return pulumi.get(self, "namespace")
147
146
 
148
147
  @namespace.setter
149
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
148
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
150
149
  pulumi.set(self, "namespace", value)
151
150
 
152
- @property
151
+ @_builtins.property
153
152
  @pulumi.getter
154
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
153
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
155
154
  """
156
155
  The unique path this backend should be mounted at. Must
157
156
  not begin or end with a `/`. Defaults to `kmip`.
@@ -159,19 +158,19 @@ class _SecretScopeState:
159
158
  return pulumi.get(self, "path")
160
159
 
161
160
  @path.setter
162
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
161
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
163
162
  pulumi.set(self, "path", value)
164
163
 
165
- @property
164
+ @_builtins.property
166
165
  @pulumi.getter
167
- def scope(self) -> Optional[pulumi.Input[builtins.str]]:
166
+ def scope(self) -> Optional[pulumi.Input[_builtins.str]]:
168
167
  """
169
168
  Name of the scope.
170
169
  """
171
170
  return pulumi.get(self, "scope")
172
171
 
173
172
  @scope.setter
174
- def scope(self, value: Optional[pulumi.Input[builtins.str]]):
173
+ def scope(self, value: Optional[pulumi.Input[_builtins.str]]):
175
174
  pulumi.set(self, "scope", value)
176
175
 
177
176
 
@@ -181,10 +180,10 @@ class SecretScope(pulumi.CustomResource):
181
180
  def __init__(__self__,
182
181
  resource_name: str,
183
182
  opts: Optional[pulumi.ResourceOptions] = None,
184
- force: Optional[pulumi.Input[builtins.bool]] = None,
185
- namespace: Optional[pulumi.Input[builtins.str]] = None,
186
- path: Optional[pulumi.Input[builtins.str]] = None,
187
- scope: Optional[pulumi.Input[builtins.str]] = None,
183
+ force: Optional[pulumi.Input[_builtins.bool]] = None,
184
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
185
+ path: Optional[pulumi.Input[_builtins.str]] = None,
186
+ scope: Optional[pulumi.Input[_builtins.str]] = None,
188
187
  __props__=None):
189
188
  """
190
189
  Manages KMIP Secret Scopes in a Vault server. This feature requires
@@ -216,14 +215,14 @@ class SecretScope(pulumi.CustomResource):
216
215
 
217
216
  :param str resource_name: The name of the resource.
218
217
  :param pulumi.ResourceOptions opts: Options for the resource.
219
- :param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
220
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
218
+ :param pulumi.Input[_builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
219
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
221
220
  The value should not contain leading or trailing forward slashes.
222
221
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
223
222
  *Available only for Vault Enterprise*.
224
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
223
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
225
224
  not begin or end with a `/`. Defaults to `kmip`.
226
- :param pulumi.Input[builtins.str] scope: Name of the scope.
225
+ :param pulumi.Input[_builtins.str] scope: Name of the scope.
227
226
  """
228
227
  ...
229
228
  @overload
@@ -274,10 +273,10 @@ class SecretScope(pulumi.CustomResource):
274
273
  def _internal_init(__self__,
275
274
  resource_name: str,
276
275
  opts: Optional[pulumi.ResourceOptions] = None,
277
- force: Optional[pulumi.Input[builtins.bool]] = None,
278
- namespace: Optional[pulumi.Input[builtins.str]] = None,
279
- path: Optional[pulumi.Input[builtins.str]] = None,
280
- scope: Optional[pulumi.Input[builtins.str]] = None,
276
+ force: Optional[pulumi.Input[_builtins.bool]] = None,
277
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
278
+ path: Optional[pulumi.Input[_builtins.str]] = None,
279
+ scope: Optional[pulumi.Input[_builtins.str]] = None,
281
280
  __props__=None):
282
281
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
283
282
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -305,10 +304,10 @@ class SecretScope(pulumi.CustomResource):
305
304
  def get(resource_name: str,
306
305
  id: pulumi.Input[str],
307
306
  opts: Optional[pulumi.ResourceOptions] = None,
308
- force: Optional[pulumi.Input[builtins.bool]] = None,
309
- namespace: Optional[pulumi.Input[builtins.str]] = None,
310
- path: Optional[pulumi.Input[builtins.str]] = None,
311
- scope: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretScope':
307
+ force: Optional[pulumi.Input[_builtins.bool]] = None,
308
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
309
+ path: Optional[pulumi.Input[_builtins.str]] = None,
310
+ scope: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretScope':
312
311
  """
313
312
  Get an existing SecretScope resource's state with the given name, id, and optional extra
314
313
  properties used to qualify the lookup.
@@ -316,14 +315,14 @@ class SecretScope(pulumi.CustomResource):
316
315
  :param str resource_name: The unique name of the resulting resource.
317
316
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
318
317
  :param pulumi.ResourceOptions opts: Options for the resource.
319
- :param pulumi.Input[builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
320
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
318
+ :param pulumi.Input[_builtins.bool] force: Boolean field to force deletion even if there are managed objects in the scope.
319
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
321
320
  The value should not contain leading or trailing forward slashes.
322
321
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
323
322
  *Available only for Vault Enterprise*.
324
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
323
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
325
324
  not begin or end with a `/`. Defaults to `kmip`.
326
- :param pulumi.Input[builtins.str] scope: Name of the scope.
325
+ :param pulumi.Input[_builtins.str] scope: Name of the scope.
327
326
  """
328
327
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
329
328
 
@@ -335,17 +334,17 @@ class SecretScope(pulumi.CustomResource):
335
334
  __props__.__dict__["scope"] = scope
336
335
  return SecretScope(resource_name, opts=opts, __props__=__props__)
337
336
 
338
- @property
337
+ @_builtins.property
339
338
  @pulumi.getter
340
- def force(self) -> pulumi.Output[Optional[builtins.bool]]:
339
+ def force(self) -> pulumi.Output[Optional[_builtins.bool]]:
341
340
  """
342
341
  Boolean field to force deletion even if there are managed objects in the scope.
343
342
  """
344
343
  return pulumi.get(self, "force")
345
344
 
346
- @property
345
+ @_builtins.property
347
346
  @pulumi.getter
348
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
347
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
349
348
  """
350
349
  The namespace to provision the resource in.
351
350
  The value should not contain leading or trailing forward slashes.
@@ -354,18 +353,18 @@ class SecretScope(pulumi.CustomResource):
354
353
  """
355
354
  return pulumi.get(self, "namespace")
356
355
 
357
- @property
356
+ @_builtins.property
358
357
  @pulumi.getter
359
- def path(self) -> pulumi.Output[builtins.str]:
358
+ def path(self) -> pulumi.Output[_builtins.str]:
360
359
  """
361
360
  The unique path this backend should be mounted at. Must
362
361
  not begin or end with a `/`. Defaults to `kmip`.
363
362
  """
364
363
  return pulumi.get(self, "path")
365
364
 
366
- @property
365
+ @_builtins.property
367
366
  @pulumi.getter
368
- def scope(self) -> pulumi.Output[builtins.str]:
367
+ def scope(self) -> pulumi.Output[_builtins.str]:
369
368
  """
370
369
  Name of the scope.
371
370
  """
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members: