pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members:
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -24,22 +23,22 @@ MYPY = False
24
23
 
25
24
  if not MYPY:
26
25
  class SecretV2CustomMetadataArgsDict(TypedDict):
27
- cas_required: NotRequired[pulumi.Input[builtins.bool]]
26
+ cas_required: NotRequired[pulumi.Input[_builtins.bool]]
28
27
  """
29
28
  If true, all keys will require the cas parameter to be set on all write requests.
30
29
  """
31
- data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
30
+ data: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
32
31
  """
33
32
  **Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
34
33
  secret data from Vault**. A mapping whose keys are the top-level data keys returned from
35
34
  Vault and whose values are the corresponding values. This map can only represent string data,
36
35
  so any non-string values returned from Vault are serialized as JSON.
37
36
  """
38
- delete_version_after: NotRequired[pulumi.Input[builtins.int]]
37
+ delete_version_after: NotRequired[pulumi.Input[_builtins.int]]
39
38
  """
40
39
  If set, specifies the length of time before a version is deleted.
41
40
  """
42
- max_versions: NotRequired[pulumi.Input[builtins.int]]
41
+ max_versions: NotRequired[pulumi.Input[_builtins.int]]
43
42
  """
44
43
  The number of versions to keep per key.
45
44
  """
@@ -49,18 +48,18 @@ elif False:
49
48
  @pulumi.input_type
50
49
  class SecretV2CustomMetadataArgs:
51
50
  def __init__(__self__, *,
52
- cas_required: Optional[pulumi.Input[builtins.bool]] = None,
53
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
54
- delete_version_after: Optional[pulumi.Input[builtins.int]] = None,
55
- max_versions: Optional[pulumi.Input[builtins.int]] = None):
51
+ cas_required: Optional[pulumi.Input[_builtins.bool]] = None,
52
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
53
+ delete_version_after: Optional[pulumi.Input[_builtins.int]] = None,
54
+ max_versions: Optional[pulumi.Input[_builtins.int]] = None):
56
55
  """
57
- :param pulumi.Input[builtins.bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
58
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: **Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
56
+ :param pulumi.Input[_builtins.bool] cas_required: If true, all keys will require the cas parameter to be set on all write requests.
57
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: **Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
59
58
  secret data from Vault**. A mapping whose keys are the top-level data keys returned from
60
59
  Vault and whose values are the corresponding values. This map can only represent string data,
61
60
  so any non-string values returned from Vault are serialized as JSON.
62
- :param pulumi.Input[builtins.int] delete_version_after: If set, specifies the length of time before a version is deleted.
63
- :param pulumi.Input[builtins.int] max_versions: The number of versions to keep per key.
61
+ :param pulumi.Input[_builtins.int] delete_version_after: If set, specifies the length of time before a version is deleted.
62
+ :param pulumi.Input[_builtins.int] max_versions: The number of versions to keep per key.
64
63
  """
65
64
  if cas_required is not None:
66
65
  pulumi.set(__self__, "cas_required", cas_required)
@@ -71,21 +70,21 @@ class SecretV2CustomMetadataArgs:
71
70
  if max_versions is not None:
72
71
  pulumi.set(__self__, "max_versions", max_versions)
73
72
 
74
- @property
73
+ @_builtins.property
75
74
  @pulumi.getter(name="casRequired")
76
- def cas_required(self) -> Optional[pulumi.Input[builtins.bool]]:
75
+ def cas_required(self) -> Optional[pulumi.Input[_builtins.bool]]:
77
76
  """
78
77
  If true, all keys will require the cas parameter to be set on all write requests.
79
78
  """
80
79
  return pulumi.get(self, "cas_required")
81
80
 
82
81
  @cas_required.setter
83
- def cas_required(self, value: Optional[pulumi.Input[builtins.bool]]):
82
+ def cas_required(self, value: Optional[pulumi.Input[_builtins.bool]]):
84
83
  pulumi.set(self, "cas_required", value)
85
84
 
86
- @property
85
+ @_builtins.property
87
86
  @pulumi.getter
88
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
87
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
89
88
  """
90
89
  **Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
91
90
  secret data from Vault**. A mapping whose keys are the top-level data keys returned from
@@ -95,31 +94,31 @@ class SecretV2CustomMetadataArgs:
95
94
  return pulumi.get(self, "data")
96
95
 
97
96
  @data.setter
98
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
97
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
99
98
  pulumi.set(self, "data", value)
100
99
 
101
- @property
100
+ @_builtins.property
102
101
  @pulumi.getter(name="deleteVersionAfter")
103
- def delete_version_after(self) -> Optional[pulumi.Input[builtins.int]]:
102
+ def delete_version_after(self) -> Optional[pulumi.Input[_builtins.int]]:
104
103
  """
105
104
  If set, specifies the length of time before a version is deleted.
106
105
  """
107
106
  return pulumi.get(self, "delete_version_after")
108
107
 
109
108
  @delete_version_after.setter
110
- def delete_version_after(self, value: Optional[pulumi.Input[builtins.int]]):
109
+ def delete_version_after(self, value: Optional[pulumi.Input[_builtins.int]]):
111
110
  pulumi.set(self, "delete_version_after", value)
112
111
 
113
- @property
112
+ @_builtins.property
114
113
  @pulumi.getter(name="maxVersions")
115
- def max_versions(self) -> Optional[pulumi.Input[builtins.int]]:
114
+ def max_versions(self) -> Optional[pulumi.Input[_builtins.int]]:
116
115
  """
117
116
  The number of versions to keep per key.
118
117
  """
119
118
  return pulumi.get(self, "max_versions")
120
119
 
121
120
  @max_versions.setter
122
- def max_versions(self, value: Optional[pulumi.Input[builtins.int]]):
121
+ def max_versions(self, value: Optional[pulumi.Input[_builtins.int]]):
123
122
  pulumi.set(self, "max_versions", value)
124
123
 
125
124
 
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -53,9 +52,9 @@ class GetSecretResult:
53
52
  raise TypeError("Expected argument 'path' to be a str")
54
53
  pulumi.set(__self__, "path", path)
55
54
 
56
- @property
55
+ @_builtins.property
57
56
  @pulumi.getter
58
- def data(self) -> Mapping[str, builtins.str]:
57
+ def data(self) -> Mapping[str, _builtins.str]:
59
58
  """
60
59
  A mapping whose keys are the top-level data keys returned from
61
60
  Vault and whose values are the corresponding values. This map can only
@@ -64,57 +63,57 @@ class GetSecretResult:
64
63
  """
65
64
  return pulumi.get(self, "data")
66
65
 
67
- @property
66
+ @_builtins.property
68
67
  @pulumi.getter(name="dataJson")
69
- def data_json(self) -> builtins.str:
68
+ def data_json(self) -> _builtins.str:
70
69
  """
71
70
  JSON-encoded string that that is
72
71
  read as the secret data at the given path.
73
72
  """
74
73
  return pulumi.get(self, "data_json")
75
74
 
76
- @property
75
+ @_builtins.property
77
76
  @pulumi.getter
78
- def id(self) -> builtins.str:
77
+ def id(self) -> _builtins.str:
79
78
  """
80
79
  The provider-assigned unique ID for this managed resource.
81
80
  """
82
81
  return pulumi.get(self, "id")
83
82
 
84
- @property
83
+ @_builtins.property
85
84
  @pulumi.getter(name="leaseDuration")
86
- def lease_duration(self) -> builtins.int:
85
+ def lease_duration(self) -> _builtins.int:
87
86
  """
88
87
  The duration of the secret lease, in seconds. Once
89
88
  this time has passed any plan generated with this data may fail to apply.
90
89
  """
91
90
  return pulumi.get(self, "lease_duration")
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter(name="leaseId")
95
- def lease_id(self) -> builtins.str:
94
+ def lease_id(self) -> _builtins.str:
96
95
  """
97
96
  The lease identifier assigned by Vault, if any.
98
97
  """
99
98
  return pulumi.get(self, "lease_id")
100
99
 
101
- @property
100
+ @_builtins.property
102
101
  @pulumi.getter(name="leaseRenewable")
103
- def lease_renewable(self) -> builtins.bool:
102
+ def lease_renewable(self) -> _builtins.bool:
104
103
  """
105
104
  True if the duration of this lease can be extended
106
105
  through renewal.
107
106
  """
108
107
  return pulumi.get(self, "lease_renewable")
109
108
 
110
- @property
109
+ @_builtins.property
111
110
  @pulumi.getter
112
- def namespace(self) -> Optional[builtins.str]:
111
+ def namespace(self) -> Optional[_builtins.str]:
113
112
  return pulumi.get(self, "namespace")
114
113
 
115
- @property
114
+ @_builtins.property
116
115
  @pulumi.getter
117
- def path(self) -> builtins.str:
116
+ def path(self) -> _builtins.str:
118
117
  return pulumi.get(self, "path")
119
118
 
120
119
 
@@ -134,8 +133,8 @@ class AwaitableGetSecretResult(GetSecretResult):
134
133
  path=self.path)
135
134
 
136
135
 
137
- def get_secret(namespace: Optional[builtins.str] = None,
138
- path: Optional[builtins.str] = None,
136
+ def get_secret(namespace: Optional[_builtins.str] = None,
137
+ path: Optional[_builtins.str] = None,
139
138
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
140
139
  """
141
140
  ## Example Usage
@@ -166,11 +165,11 @@ def get_secret(namespace: Optional[builtins.str] = None,
166
165
  Use of this resource requires the `read` capability on the given path.
167
166
 
168
167
 
169
- :param builtins.str namespace: The namespace of the target resource.
168
+ :param _builtins.str namespace: The namespace of the target resource.
170
169
  The value should not contain leading or trailing forward slashes.
171
170
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
172
171
  *Available only for Vault Enterprise*.
173
- :param builtins.str path: Full path of the KV-V1 secret.
172
+ :param _builtins.str path: Full path of the KV-V1 secret.
174
173
  """
175
174
  __args__ = dict()
176
175
  __args__['namespace'] = namespace
@@ -187,8 +186,8 @@ def get_secret(namespace: Optional[builtins.str] = None,
187
186
  lease_renewable=pulumi.get(__ret__, 'lease_renewable'),
188
187
  namespace=pulumi.get(__ret__, 'namespace'),
189
188
  path=pulumi.get(__ret__, 'path'))
190
- def get_secret_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
191
- path: Optional[pulumi.Input[builtins.str]] = None,
189
+ def get_secret_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
190
+ path: Optional[pulumi.Input[_builtins.str]] = None,
192
191
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
193
192
  """
194
193
  ## Example Usage
@@ -219,11 +218,11 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]]
219
218
  Use of this resource requires the `read` capability on the given path.
220
219
 
221
220
 
222
- :param builtins.str namespace: The namespace of the target resource.
221
+ :param _builtins.str namespace: The namespace of the target resource.
223
222
  The value should not contain leading or trailing forward slashes.
224
223
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
225
224
  *Available only for Vault Enterprise*.
226
- :param builtins.str path: Full path of the KV-V1 secret.
225
+ :param _builtins.str path: Full path of the KV-V1 secret.
227
226
  """
228
227
  __args__ = dict()
229
228
  __args__['namespace'] = namespace
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -56,61 +55,61 @@ class GetSecretSubkeysV2Result:
56
55
  raise TypeError("Expected argument 'version' to be a int")
57
56
  pulumi.set(__self__, "version", version)
58
57
 
59
- @property
58
+ @_builtins.property
60
59
  @pulumi.getter
61
- def data(self) -> Mapping[str, builtins.str]:
60
+ def data(self) -> Mapping[str, _builtins.str]:
62
61
  """
63
62
  Subkeys for the KV-V2 secret stored as a serialized map of strings.
64
63
  """
65
64
  return pulumi.get(self, "data")
66
65
 
67
- @property
66
+ @_builtins.property
68
67
  @pulumi.getter(name="dataJson")
69
- def data_json(self) -> builtins.str:
68
+ def data_json(self) -> _builtins.str:
70
69
  """
71
70
  Subkeys for the KV-V2 secret read from Vault.
72
71
  """
73
72
  return pulumi.get(self, "data_json")
74
73
 
75
- @property
74
+ @_builtins.property
76
75
  @pulumi.getter
77
- def depth(self) -> Optional[builtins.int]:
76
+ def depth(self) -> Optional[_builtins.int]:
78
77
  return pulumi.get(self, "depth")
79
78
 
80
- @property
79
+ @_builtins.property
81
80
  @pulumi.getter
82
- def id(self) -> builtins.str:
81
+ def id(self) -> _builtins.str:
83
82
  """
84
83
  The provider-assigned unique ID for this managed resource.
85
84
  """
86
85
  return pulumi.get(self, "id")
87
86
 
88
- @property
87
+ @_builtins.property
89
88
  @pulumi.getter
90
- def mount(self) -> builtins.str:
89
+ def mount(self) -> _builtins.str:
91
90
  return pulumi.get(self, "mount")
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter
95
- def name(self) -> builtins.str:
94
+ def name(self) -> _builtins.str:
96
95
  return pulumi.get(self, "name")
97
96
 
98
- @property
97
+ @_builtins.property
99
98
  @pulumi.getter
100
- def namespace(self) -> Optional[builtins.str]:
99
+ def namespace(self) -> Optional[_builtins.str]:
101
100
  return pulumi.get(self, "namespace")
102
101
 
103
- @property
102
+ @_builtins.property
104
103
  @pulumi.getter
105
- def path(self) -> builtins.str:
104
+ def path(self) -> _builtins.str:
106
105
  """
107
106
  Full path where the KV-V2 secrets are listed.
108
107
  """
109
108
  return pulumi.get(self, "path")
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter
113
- def version(self) -> Optional[builtins.int]:
112
+ def version(self) -> Optional[_builtins.int]:
114
113
  return pulumi.get(self, "version")
115
114
 
116
115
 
@@ -131,11 +130,11 @@ class AwaitableGetSecretSubkeysV2Result(GetSecretSubkeysV2Result):
131
130
  version=self.version)
132
131
 
133
132
 
134
- def get_secret_subkeys_v2(depth: Optional[builtins.int] = None,
135
- mount: Optional[builtins.str] = None,
136
- name: Optional[builtins.str] = None,
137
- namespace: Optional[builtins.str] = None,
138
- version: Optional[builtins.int] = None,
133
+ def get_secret_subkeys_v2(depth: Optional[_builtins.int] = None,
134
+ mount: Optional[_builtins.str] = None,
135
+ name: Optional[_builtins.str] = None,
136
+ namespace: Optional[_builtins.str] = None,
137
+ version: Optional[_builtins.int] = None,
139
138
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretSubkeysV2Result:
140
139
  """
141
140
  ## Example Usage
@@ -168,20 +167,20 @@ def get_secret_subkeys_v2(depth: Optional[builtins.int] = None,
168
167
  Use of this resource requires the `read` capability on the given path.
169
168
 
170
169
 
171
- :param builtins.int depth: Specifies the deepest nesting level to provide in the output.
170
+ :param _builtins.int depth: Specifies the deepest nesting level to provide in the output.
172
171
  If non-zero, keys that reside at the specified depth value will be
173
172
  artificially treated as leaves and will thus be `null` even if further
174
173
  underlying sub-keys exist.
175
- :param builtins.str mount: Path where KV-V2 engine is mounted.
176
- :param builtins.str name: Full name of the secret. For a nested secret
174
+ :param _builtins.str mount: Path where KV-V2 engine is mounted.
175
+ :param _builtins.str name: Full name of the secret. For a nested secret
177
176
  the name is the nested path excluding the mount and data
178
177
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
179
178
  the name is `foo/bar/baz`.
180
- :param builtins.str namespace: The namespace of the target resource.
179
+ :param _builtins.str namespace: The namespace of the target resource.
181
180
  The value should not contain leading or trailing forward slashes.
182
181
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
183
182
  *Available only for Vault Enterprise*.
184
- :param builtins.int version: Specifies the version to return. If not
183
+ :param _builtins.int version: Specifies the version to return. If not
185
184
  set the latest version is returned.
186
185
  """
187
186
  __args__ = dict()
@@ -203,11 +202,11 @@ def get_secret_subkeys_v2(depth: Optional[builtins.int] = None,
203
202
  namespace=pulumi.get(__ret__, 'namespace'),
204
203
  path=pulumi.get(__ret__, 'path'),
205
204
  version=pulumi.get(__ret__, 'version'))
206
- def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[builtins.int]]] = None,
207
- mount: Optional[pulumi.Input[builtins.str]] = None,
208
- name: Optional[pulumi.Input[builtins.str]] = None,
209
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
210
- version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
205
+ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
206
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
207
+ name: Optional[pulumi.Input[_builtins.str]] = None,
208
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
209
+ version: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
211
210
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretSubkeysV2Result]:
212
211
  """
213
212
  ## Example Usage
@@ -240,20 +239,20 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[builtins.
240
239
  Use of this resource requires the `read` capability on the given path.
241
240
 
242
241
 
243
- :param builtins.int depth: Specifies the deepest nesting level to provide in the output.
242
+ :param _builtins.int depth: Specifies the deepest nesting level to provide in the output.
244
243
  If non-zero, keys that reside at the specified depth value will be
245
244
  artificially treated as leaves and will thus be `null` even if further
246
245
  underlying sub-keys exist.
247
- :param builtins.str mount: Path where KV-V2 engine is mounted.
248
- :param builtins.str name: Full name of the secret. For a nested secret
246
+ :param _builtins.str mount: Path where KV-V2 engine is mounted.
247
+ :param _builtins.str name: Full name of the secret. For a nested secret
249
248
  the name is the nested path excluding the mount and data
250
249
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
251
250
  the name is `foo/bar/baz`.
252
- :param builtins.str namespace: The namespace of the target resource.
251
+ :param _builtins.str namespace: The namespace of the target resource.
253
252
  The value should not contain leading or trailing forward slashes.
254
253
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
255
254
  *Available only for Vault Enterprise*.
256
- :param builtins.int version: Specifies the version to return. If not
255
+ :param _builtins.int version: Specifies the version to return. If not
257
256
  set the latest version is returned.
258
257
  """
259
258
  __args__ = dict()
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -65,25 +64,25 @@ class GetSecretV2Result:
65
64
  raise TypeError("Expected argument 'version' to be a int")
66
65
  pulumi.set(__self__, "version", version)
67
66
 
68
- @property
67
+ @_builtins.property
69
68
  @pulumi.getter(name="createdTime")
70
- def created_time(self) -> builtins.str:
69
+ def created_time(self) -> _builtins.str:
71
70
  """
72
71
  Time at which secret was created.
73
72
  """
74
73
  return pulumi.get(self, "created_time")
75
74
 
76
- @property
75
+ @_builtins.property
77
76
  @pulumi.getter(name="customMetadata")
78
- def custom_metadata(self) -> Mapping[str, builtins.str]:
77
+ def custom_metadata(self) -> Mapping[str, _builtins.str]:
79
78
  """
80
79
  Custom metadata for the secret.
81
80
  """
82
81
  return pulumi.get(self, "custom_metadata")
83
82
 
84
- @property
83
+ @_builtins.property
85
84
  @pulumi.getter
86
- def data(self) -> Mapping[str, builtins.str]:
85
+ def data(self) -> Mapping[str, _builtins.str]:
87
86
  """
88
87
  A mapping whose keys are the top-level data keys returned from
89
88
  Vault and whose values are the corresponding values. This map can only
@@ -92,65 +91,65 @@ class GetSecretV2Result:
92
91
  """
93
92
  return pulumi.get(self, "data")
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter(name="dataJson")
97
- def data_json(self) -> builtins.str:
96
+ def data_json(self) -> _builtins.str:
98
97
  """
99
98
  JSON-encoded string that that is
100
99
  read as the secret data at the given path.
101
100
  """
102
101
  return pulumi.get(self, "data_json")
103
102
 
104
- @property
103
+ @_builtins.property
105
104
  @pulumi.getter(name="deletionTime")
106
- def deletion_time(self) -> builtins.str:
105
+ def deletion_time(self) -> _builtins.str:
107
106
  """
108
107
  Deletion time for the secret.
109
108
  """
110
109
  return pulumi.get(self, "deletion_time")
111
110
 
112
- @property
111
+ @_builtins.property
113
112
  @pulumi.getter
114
- def destroyed(self) -> builtins.bool:
113
+ def destroyed(self) -> _builtins.bool:
115
114
  """
116
115
  Indicates whether the secret has been destroyed.
117
116
  """
118
117
  return pulumi.get(self, "destroyed")
119
118
 
120
- @property
119
+ @_builtins.property
121
120
  @pulumi.getter
122
- def id(self) -> builtins.str:
121
+ def id(self) -> _builtins.str:
123
122
  """
124
123
  The provider-assigned unique ID for this managed resource.
125
124
  """
126
125
  return pulumi.get(self, "id")
127
126
 
128
- @property
127
+ @_builtins.property
129
128
  @pulumi.getter
130
- def mount(self) -> builtins.str:
129
+ def mount(self) -> _builtins.str:
131
130
  return pulumi.get(self, "mount")
132
131
 
133
- @property
132
+ @_builtins.property
134
133
  @pulumi.getter
135
- def name(self) -> builtins.str:
134
+ def name(self) -> _builtins.str:
136
135
  return pulumi.get(self, "name")
137
136
 
138
- @property
137
+ @_builtins.property
139
138
  @pulumi.getter
140
- def namespace(self) -> Optional[builtins.str]:
139
+ def namespace(self) -> Optional[_builtins.str]:
141
140
  return pulumi.get(self, "namespace")
142
141
 
143
- @property
142
+ @_builtins.property
144
143
  @pulumi.getter
145
- def path(self) -> builtins.str:
144
+ def path(self) -> _builtins.str:
146
145
  """
147
146
  Full path where the KVV2 secret is written.
148
147
  """
149
148
  return pulumi.get(self, "path")
150
149
 
151
- @property
150
+ @_builtins.property
152
151
  @pulumi.getter
153
- def version(self) -> Optional[builtins.int]:
152
+ def version(self) -> Optional[_builtins.int]:
154
153
  """
155
154
  Version of the secret.
156
155
  """
@@ -177,10 +176,10 @@ class AwaitableGetSecretV2Result(GetSecretV2Result):
177
176
  version=self.version)
178
177
 
179
178
 
180
- def get_secret_v2(mount: Optional[builtins.str] = None,
181
- name: Optional[builtins.str] = None,
182
- namespace: Optional[builtins.str] = None,
183
- version: Optional[builtins.int] = None,
179
+ def get_secret_v2(mount: Optional[_builtins.str] = None,
180
+ name: Optional[_builtins.str] = None,
181
+ namespace: Optional[_builtins.str] = None,
182
+ version: Optional[_builtins.int] = None,
184
183
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretV2Result:
185
184
  """
186
185
  ## Example Usage
@@ -214,16 +213,16 @@ def get_secret_v2(mount: Optional[builtins.str] = None,
214
213
  Use of this resource requires the `read` capability on the given path.
215
214
 
216
215
 
217
- :param builtins.str mount: Path where KV-V2 engine is mounted.
218
- :param builtins.str name: Full name of the secret. For a nested secret
216
+ :param _builtins.str mount: Path where KV-V2 engine is mounted.
217
+ :param _builtins.str name: Full name of the secret. For a nested secret
219
218
  the name is the nested path excluding the mount and data
220
219
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
221
220
  the name is `foo/bar/baz`.
222
- :param builtins.str namespace: The namespace of the target resource.
221
+ :param _builtins.str namespace: The namespace of the target resource.
223
222
  The value should not contain leading or trailing forward slashes.
224
223
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
225
224
  *Available only for Vault Enterprise*.
226
- :param builtins.int version: Version of the secret to retrieve.
225
+ :param _builtins.int version: Version of the secret to retrieve.
227
226
  """
228
227
  __args__ = dict()
229
228
  __args__['mount'] = mount
@@ -246,10 +245,10 @@ def get_secret_v2(mount: Optional[builtins.str] = None,
246
245
  namespace=pulumi.get(__ret__, 'namespace'),
247
246
  path=pulumi.get(__ret__, 'path'),
248
247
  version=pulumi.get(__ret__, 'version'))
249
- def get_secret_v2_output(mount: Optional[pulumi.Input[builtins.str]] = None,
250
- name: Optional[pulumi.Input[builtins.str]] = None,
251
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
252
- version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
248
+ def get_secret_v2_output(mount: Optional[pulumi.Input[_builtins.str]] = None,
249
+ name: Optional[pulumi.Input[_builtins.str]] = None,
250
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
251
+ version: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
253
252
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretV2Result]:
254
253
  """
255
254
  ## Example Usage
@@ -283,16 +282,16 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[builtins.str]] = None,
283
282
  Use of this resource requires the `read` capability on the given path.
284
283
 
285
284
 
286
- :param builtins.str mount: Path where KV-V2 engine is mounted.
287
- :param builtins.str name: Full name of the secret. For a nested secret
285
+ :param _builtins.str mount: Path where KV-V2 engine is mounted.
286
+ :param _builtins.str name: Full name of the secret. For a nested secret
288
287
  the name is the nested path excluding the mount and data
289
288
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
290
289
  the name is `foo/bar/baz`.
291
- :param builtins.str namespace: The namespace of the target resource.
290
+ :param _builtins.str namespace: The namespace of the target resource.
292
291
  The value should not contain leading or trailing forward slashes.
293
292
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
294
293
  *Available only for Vault Enterprise*.
295
- :param builtins.int version: Version of the secret to retrieve.
294
+ :param _builtins.int version: Version of the secret to retrieve.
296
295
  """
297
296
  __args__ = dict()
298
297
  __args__['mount'] = mount