pulumi-vault 7.1.0a1752118888__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0a1752118888.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -50,51 +49,51 @@ class GetBackendKeyResult:
50
49
  raise TypeError("Expected argument 'namespace' to be a str")
51
50
  pulumi.set(__self__, "namespace", namespace)
52
51
 
53
- @property
52
+ @_builtins.property
54
53
  @pulumi.getter
55
- def backend(self) -> builtins.str:
54
+ def backend(self) -> _builtins.str:
56
55
  return pulumi.get(self, "backend")
57
56
 
58
- @property
57
+ @_builtins.property
59
58
  @pulumi.getter
60
- def id(self) -> builtins.str:
59
+ def id(self) -> _builtins.str:
61
60
  """
62
61
  The provider-assigned unique ID for this managed resource.
63
62
  """
64
63
  return pulumi.get(self, "id")
65
64
 
66
- @property
65
+ @_builtins.property
67
66
  @pulumi.getter(name="keyId")
68
- def key_id(self) -> builtins.str:
67
+ def key_id(self) -> _builtins.str:
69
68
  """
70
69
  ID of the key.
71
70
  """
72
71
  return pulumi.get(self, "key_id")
73
72
 
74
- @property
73
+ @_builtins.property
75
74
  @pulumi.getter(name="keyName")
76
- def key_name(self) -> builtins.str:
75
+ def key_name(self) -> _builtins.str:
77
76
  """
78
77
  Name of the key.
79
78
  """
80
79
  return pulumi.get(self, "key_name")
81
80
 
82
- @property
81
+ @_builtins.property
83
82
  @pulumi.getter(name="keyRef")
84
- def key_ref(self) -> builtins.str:
83
+ def key_ref(self) -> _builtins.str:
85
84
  return pulumi.get(self, "key_ref")
86
85
 
87
- @property
86
+ @_builtins.property
88
87
  @pulumi.getter(name="keyType")
89
- def key_type(self) -> builtins.str:
88
+ def key_type(self) -> _builtins.str:
90
89
  """
91
90
  Type of the key.
92
91
  """
93
92
  return pulumi.get(self, "key_type")
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter
97
- def namespace(self) -> Optional[builtins.str]:
96
+ def namespace(self) -> Optional[_builtins.str]:
98
97
  return pulumi.get(self, "namespace")
99
98
 
100
99
 
@@ -113,9 +112,9 @@ class AwaitableGetBackendKeyResult(GetBackendKeyResult):
113
112
  namespace=self.namespace)
114
113
 
115
114
 
116
- def get_backend_key(backend: Optional[builtins.str] = None,
117
- key_ref: Optional[builtins.str] = None,
118
- namespace: Optional[builtins.str] = None,
115
+ def get_backend_key(backend: Optional[_builtins.str] = None,
116
+ key_ref: Optional[_builtins.str] = None,
117
+ namespace: Optional[_builtins.str] = None,
119
118
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeyResult:
120
119
  """
121
120
  ## Example Usage
@@ -128,7 +127,7 @@ def get_backend_key(backend: Optional[builtins.str] = None,
128
127
  path="pki",
129
128
  type="pki",
130
129
  description="PKI secret engine mount")
131
- key = vault.pki_secret.SecretBackendKey("key",
130
+ key = vault.pkisecret.SecretBackendKey("key",
132
131
  backend=pki.path,
133
132
  type="internal",
134
133
  key_name="example",
@@ -139,10 +138,10 @@ def get_backend_key(backend: Optional[builtins.str] = None,
139
138
  ```
140
139
 
141
140
 
142
- :param builtins.str backend: The path to the PKI secret backend to
141
+ :param _builtins.str backend: The path to the PKI secret backend to
143
142
  read the key from, with no leading or trailing `/`s.
144
- :param builtins.str key_ref: Reference to an existing key.
145
- :param builtins.str namespace: The namespace of the target resource.
143
+ :param _builtins.str key_ref: Reference to an existing key.
144
+ :param _builtins.str namespace: The namespace of the target resource.
146
145
  The value should not contain leading or trailing forward slashes.
147
146
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
148
147
  *Available only for Vault Enterprise*.
@@ -162,9 +161,9 @@ def get_backend_key(backend: Optional[builtins.str] = None,
162
161
  key_ref=pulumi.get(__ret__, 'key_ref'),
163
162
  key_type=pulumi.get(__ret__, 'key_type'),
164
163
  namespace=pulumi.get(__ret__, 'namespace'))
165
- def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
166
- key_ref: Optional[pulumi.Input[builtins.str]] = None,
167
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
164
+ def get_backend_key_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
165
+ key_ref: Optional[pulumi.Input[_builtins.str]] = None,
166
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
168
167
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
169
168
  """
170
169
  ## Example Usage
@@ -177,7 +176,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
177
176
  path="pki",
178
177
  type="pki",
179
178
  description="PKI secret engine mount")
180
- key = vault.pki_secret.SecretBackendKey("key",
179
+ key = vault.pkisecret.SecretBackendKey("key",
181
180
  backend=pki.path,
182
181
  type="internal",
183
182
  key_name="example",
@@ -188,10 +187,10 @@ def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
188
187
  ```
189
188
 
190
189
 
191
- :param builtins.str backend: The path to the PKI secret backend to
190
+ :param _builtins.str backend: The path to the PKI secret backend to
192
191
  read the key from, with no leading or trailing `/`s.
193
- :param builtins.str key_ref: Reference to an existing key.
194
- :param builtins.str namespace: The namespace of the target resource.
192
+ :param _builtins.str key_ref: Reference to an existing key.
193
+ :param _builtins.str namespace: The namespace of the target resource.
195
194
  The value should not contain leading or trailing forward slashes.
196
195
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
197
196
  *Available only for Vault Enterprise*.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -47,46 +46,46 @@ class GetBackendKeysResult:
47
46
  raise TypeError("Expected argument 'namespace' to be a str")
48
47
  pulumi.set(__self__, "namespace", namespace)
49
48
 
50
- @property
49
+ @_builtins.property
51
50
  @pulumi.getter
52
- def backend(self) -> builtins.str:
51
+ def backend(self) -> _builtins.str:
53
52
  return pulumi.get(self, "backend")
54
53
 
55
- @property
54
+ @_builtins.property
56
55
  @pulumi.getter
57
- def id(self) -> builtins.str:
56
+ def id(self) -> _builtins.str:
58
57
  """
59
58
  The provider-assigned unique ID for this managed resource.
60
59
  """
61
60
  return pulumi.get(self, "id")
62
61
 
63
- @property
62
+ @_builtins.property
64
63
  @pulumi.getter(name="keyInfo")
65
- def key_info(self) -> Mapping[str, builtins.str]:
64
+ def key_info(self) -> Mapping[str, _builtins.str]:
66
65
  """
67
66
  Map of key strings read from Vault.
68
67
  """
69
68
  return pulumi.get(self, "key_info")
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter(name="keyInfoJson")
73
- def key_info_json(self) -> builtins.str:
72
+ def key_info_json(self) -> _builtins.str:
74
73
  """
75
74
  JSON-encoded key data read from Vault.
76
75
  """
77
76
  return pulumi.get(self, "key_info_json")
78
77
 
79
- @property
78
+ @_builtins.property
80
79
  @pulumi.getter
81
- def keys(self) -> Sequence[builtins.str]:
80
+ def keys(self) -> Sequence[_builtins.str]:
82
81
  """
83
82
  Keys used under the backend path.
84
83
  """
85
84
  return pulumi.get(self, "keys")
86
85
 
87
- @property
86
+ @_builtins.property
88
87
  @pulumi.getter
89
- def namespace(self) -> Optional[builtins.str]:
88
+ def namespace(self) -> Optional[_builtins.str]:
90
89
  return pulumi.get(self, "namespace")
91
90
 
92
91
 
@@ -104,8 +103,8 @@ class AwaitableGetBackendKeysResult(GetBackendKeysResult):
104
103
  namespace=self.namespace)
105
104
 
106
105
 
107
- def get_backend_keys(backend: Optional[builtins.str] = None,
108
- namespace: Optional[builtins.str] = None,
106
+ def get_backend_keys(backend: Optional[_builtins.str] = None,
107
+ namespace: Optional[_builtins.str] = None,
109
108
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeysResult:
110
109
  """
111
110
  ## Example Usage
@@ -118,7 +117,7 @@ def get_backend_keys(backend: Optional[builtins.str] = None,
118
117
  path="pki",
119
118
  type="pki",
120
119
  description="PKI secret engine mount")
121
- root = vault.pki_secret.SecretBackendRootCert("root",
120
+ root = vault.pkisecret.SecretBackendRootCert("root",
122
121
  backend=pki.path,
123
122
  type="internal",
124
123
  common_name="example",
@@ -128,9 +127,9 @@ def get_backend_keys(backend: Optional[builtins.str] = None,
128
127
  ```
129
128
 
130
129
 
131
- :param builtins.str backend: The path to the PKI secret backend to
130
+ :param _builtins.str backend: The path to the PKI secret backend to
132
131
  read the keys from, with no leading or trailing `/`s.
133
- :param builtins.str namespace: The namespace of the target resource.
132
+ :param _builtins.str namespace: The namespace of the target resource.
134
133
  The value should not contain leading or trailing forward slashes.
135
134
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
136
135
  *Available only for Vault Enterprise*.
@@ -148,8 +147,8 @@ def get_backend_keys(backend: Optional[builtins.str] = None,
148
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
149
148
  keys=pulumi.get(__ret__, 'keys'),
150
149
  namespace=pulumi.get(__ret__, 'namespace'))
151
- def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None,
152
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
150
+ def get_backend_keys_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
151
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
153
152
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
154
153
  """
155
154
  ## Example Usage
@@ -162,7 +161,7 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None
162
161
  path="pki",
163
162
  type="pki",
164
163
  description="PKI secret engine mount")
165
- root = vault.pki_secret.SecretBackendRootCert("root",
164
+ root = vault.pkisecret.SecretBackendRootCert("root",
166
165
  backend=pki.path,
167
166
  type="internal",
168
167
  common_name="example",
@@ -172,9 +171,9 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None
172
171
  ```
173
172
 
174
173
 
175
- :param builtins.str backend: The path to the PKI secret backend to
174
+ :param _builtins.str backend: The path to the PKI secret backend to
176
175
  read the keys from, with no leading or trailing `/`s.
177
- :param builtins.str namespace: The namespace of the target resource.
176
+ :param _builtins.str namespace: The namespace of the target resource.
178
177
  The value should not contain leading or trailing forward slashes.
179
178
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
180
179
  *Available only for Vault Enterprise*.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -30,16 +29,16 @@ __all__ = [
30
29
  @pulumi.output_type
31
30
  class BackendConfigCmpv2Authenticators(dict):
32
31
  def __init__(__self__, *,
33
- cert: Optional[Mapping[str, builtins.str]] = None):
32
+ cert: Optional[Mapping[str, _builtins.str]] = None):
34
33
  """
35
- :param Mapping[str, builtins.str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
34
+ :param Mapping[str, _builtins.str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
36
35
  """
37
36
  if cert is not None:
38
37
  pulumi.set(__self__, "cert", cert)
39
38
 
40
- @property
39
+ @_builtins.property
41
40
  @pulumi.getter
42
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
41
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
43
42
  """
44
43
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
45
44
  """
@@ -49,28 +48,28 @@ class BackendConfigCmpv2Authenticators(dict):
49
48
  @pulumi.output_type
50
49
  class BackendConfigEstAuthenticators(dict):
51
50
  def __init__(__self__, *,
52
- cert: Optional[Mapping[str, builtins.str]] = None,
53
- userpass: Optional[Mapping[str, builtins.str]] = None):
51
+ cert: Optional[Mapping[str, _builtins.str]] = None,
52
+ userpass: Optional[Mapping[str, _builtins.str]] = None):
54
53
  """
55
- :param Mapping[str, builtins.str] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
56
- :param Mapping[str, builtins.str] userpass: The accessor (required) property for user pass auth backends.
54
+ :param Mapping[str, _builtins.str] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
55
+ :param Mapping[str, _builtins.str] userpass: The accessor (required) property for user pass auth backends.
57
56
  """
58
57
  if cert is not None:
59
58
  pulumi.set(__self__, "cert", cert)
60
59
  if userpass is not None:
61
60
  pulumi.set(__self__, "userpass", userpass)
62
61
 
63
- @property
62
+ @_builtins.property
64
63
  @pulumi.getter
65
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
64
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
66
65
  """
67
66
  The accessor (required) and cert_role (optional) properties for cert auth backends.
68
67
  """
69
68
  return pulumi.get(self, "cert")
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter
73
- def userpass(self) -> Optional[Mapping[str, builtins.str]]:
72
+ def userpass(self) -> Optional[Mapping[str, _builtins.str]]:
74
73
  """
75
74
  The accessor (required) property for user pass auth backends.
76
75
  """
@@ -80,28 +79,28 @@ class BackendConfigEstAuthenticators(dict):
80
79
  @pulumi.output_type
81
80
  class BackendConfigScepAuthenticators(dict):
82
81
  def __init__(__self__, *,
83
- cert: Optional[Mapping[str, builtins.str]] = None,
84
- scep: Optional[Mapping[str, builtins.str]] = None):
82
+ cert: Optional[Mapping[str, _builtins.str]] = None,
83
+ scep: Optional[Mapping[str, _builtins.str]] = None):
85
84
  """
86
- :param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends
87
- :param Mapping[str, builtins.str] scep: The accessor property for SCEP auth backends
85
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends
86
+ :param Mapping[str, _builtins.str] scep: The accessor property for SCEP auth backends
88
87
  """
89
88
  if cert is not None:
90
89
  pulumi.set(__self__, "cert", cert)
91
90
  if scep is not None:
92
91
  pulumi.set(__self__, "scep", scep)
93
92
 
94
- @property
93
+ @_builtins.property
95
94
  @pulumi.getter
96
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
95
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
97
96
  """
98
97
  The accessor and cert_role properties for cert auth backends
99
98
  """
100
99
  return pulumi.get(self, "cert")
101
100
 
102
- @property
101
+ @_builtins.property
103
102
  @pulumi.getter
104
- def scep(self) -> Optional[Mapping[str, builtins.str]]:
103
+ def scep(self) -> Optional[Mapping[str, _builtins.str]]:
105
104
  """
106
105
  The accessor property for SCEP auth backends
107
106
  """
@@ -111,16 +110,16 @@ class BackendConfigScepAuthenticators(dict):
111
110
  @pulumi.output_type
112
111
  class BackendConfigScepExternalValidation(dict):
113
112
  def __init__(__self__, *,
114
- intune: Optional[Mapping[str, builtins.str]] = None):
113
+ intune: Optional[Mapping[str, _builtins.str]] = None):
115
114
  """
116
- :param Mapping[str, builtins.str] intune: The credentials to enable Microsoft Intune validation of SCEP requests
115
+ :param Mapping[str, _builtins.str] intune: The credentials to enable Microsoft Intune validation of SCEP requests
117
116
  """
118
117
  if intune is not None:
119
118
  pulumi.set(__self__, "intune", intune)
120
119
 
121
- @property
120
+ @_builtins.property
122
121
  @pulumi.getter
123
- def intune(self) -> Optional[Mapping[str, builtins.str]]:
122
+ def intune(self) -> Optional[Mapping[str, _builtins.str]]:
124
123
  """
125
124
  The credentials to enable Microsoft Intune validation of SCEP requests
126
125
  """
@@ -130,13 +129,13 @@ class BackendConfigScepExternalValidation(dict):
130
129
  @pulumi.output_type
131
130
  class SecretBackendRolePolicyIdentifier(dict):
132
131
  def __init__(__self__, *,
133
- oid: builtins.str,
134
- cps: Optional[builtins.str] = None,
135
- notice: Optional[builtins.str] = None):
132
+ oid: _builtins.str,
133
+ cps: Optional[_builtins.str] = None,
134
+ notice: Optional[_builtins.str] = None):
136
135
  """
137
- :param builtins.str oid: The OID for the policy identifier
138
- :param builtins.str cps: The URL of the CPS for the policy identifier
139
- :param builtins.str notice: A notice for the policy identifier
136
+ :param _builtins.str oid: The OID for the policy identifier
137
+ :param _builtins.str cps: The URL of the CPS for the policy identifier
138
+ :param _builtins.str notice: A notice for the policy identifier
140
139
  """
141
140
  pulumi.set(__self__, "oid", oid)
142
141
  if cps is not None:
@@ -144,25 +143,25 @@ class SecretBackendRolePolicyIdentifier(dict):
144
143
  if notice is not None:
145
144
  pulumi.set(__self__, "notice", notice)
146
145
 
147
- @property
146
+ @_builtins.property
148
147
  @pulumi.getter
149
- def oid(self) -> builtins.str:
148
+ def oid(self) -> _builtins.str:
150
149
  """
151
150
  The OID for the policy identifier
152
151
  """
153
152
  return pulumi.get(self, "oid")
154
153
 
155
- @property
154
+ @_builtins.property
156
155
  @pulumi.getter
157
- def cps(self) -> Optional[builtins.str]:
156
+ def cps(self) -> Optional[_builtins.str]:
158
157
  """
159
158
  The URL of the CPS for the policy identifier
160
159
  """
161
160
  return pulumi.get(self, "cps")
162
161
 
163
- @property
162
+ @_builtins.property
164
163
  @pulumi.getter
165
- def notice(self) -> Optional[builtins.str]:
164
+ def notice(self) -> Optional[_builtins.str]:
166
165
  """
167
166
  A notice for the policy identifier
168
167
  """
@@ -172,16 +171,16 @@ class SecretBackendRolePolicyIdentifier(dict):
172
171
  @pulumi.output_type
173
172
  class GetBackendConfigCmpv2AuthenticatorResult(dict):
174
173
  def __init__(__self__, *,
175
- cert: Optional[Mapping[str, builtins.str]] = None):
174
+ cert: Optional[Mapping[str, _builtins.str]] = None):
176
175
  """
177
- :param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends
176
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends
178
177
  """
179
178
  if cert is not None:
180
179
  pulumi.set(__self__, "cert", cert)
181
180
 
182
- @property
181
+ @_builtins.property
183
182
  @pulumi.getter
184
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
183
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
185
184
  """
186
185
  The accessor and cert_role properties for cert auth backends
187
186
  """
@@ -191,28 +190,28 @@ class GetBackendConfigCmpv2AuthenticatorResult(dict):
191
190
  @pulumi.output_type
192
191
  class GetBackendConfigEstAuthenticatorResult(dict):
193
192
  def __init__(__self__, *,
194
- cert: Optional[Mapping[str, builtins.str]] = None,
195
- userpass: Optional[Mapping[str, builtins.str]] = None):
193
+ cert: Optional[Mapping[str, _builtins.str]] = None,
194
+ userpass: Optional[Mapping[str, _builtins.str]] = None):
196
195
  """
197
- :param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends.
198
- :param Mapping[str, builtins.str] userpass: The accessor property for user pass auth backends.
196
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends.
197
+ :param Mapping[str, _builtins.str] userpass: The accessor property for user pass auth backends.
199
198
  """
200
199
  if cert is not None:
201
200
  pulumi.set(__self__, "cert", cert)
202
201
  if userpass is not None:
203
202
  pulumi.set(__self__, "userpass", userpass)
204
203
 
205
- @property
204
+ @_builtins.property
206
205
  @pulumi.getter
207
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
206
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
208
207
  """
209
208
  The accessor and cert_role properties for cert auth backends.
210
209
  """
211
210
  return pulumi.get(self, "cert")
212
211
 
213
- @property
212
+ @_builtins.property
214
213
  @pulumi.getter
215
- def userpass(self) -> Optional[Mapping[str, builtins.str]]:
214
+ def userpass(self) -> Optional[Mapping[str, _builtins.str]]:
216
215
  """
217
216
  The accessor property for user pass auth backends.
218
217
  """
@@ -222,28 +221,28 @@ class GetBackendConfigEstAuthenticatorResult(dict):
222
221
  @pulumi.output_type
223
222
  class GetBackendConfigScepAuthenticatorResult(dict):
224
223
  def __init__(__self__, *,
225
- cert: Optional[Mapping[str, builtins.str]] = None,
226
- scep: Optional[Mapping[str, builtins.str]] = None):
224
+ cert: Optional[Mapping[str, _builtins.str]] = None,
225
+ scep: Optional[Mapping[str, _builtins.str]] = None):
227
226
  """
228
- :param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends.
229
- :param Mapping[str, builtins.str] scep: The accessor property for scep auth backends.
227
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends.
228
+ :param Mapping[str, _builtins.str] scep: The accessor property for scep auth backends.
230
229
  """
231
230
  if cert is not None:
232
231
  pulumi.set(__self__, "cert", cert)
233
232
  if scep is not None:
234
233
  pulumi.set(__self__, "scep", scep)
235
234
 
236
- @property
235
+ @_builtins.property
237
236
  @pulumi.getter
238
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
237
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
239
238
  """
240
239
  The accessor and cert_role properties for cert auth backends.
241
240
  """
242
241
  return pulumi.get(self, "cert")
243
242
 
244
- @property
243
+ @_builtins.property
245
244
  @pulumi.getter
246
- def scep(self) -> Optional[Mapping[str, builtins.str]]:
245
+ def scep(self) -> Optional[Mapping[str, _builtins.str]]:
247
246
  """
248
247
  The accessor property for scep auth backends.
249
248
  """
@@ -253,16 +252,16 @@ class GetBackendConfigScepAuthenticatorResult(dict):
253
252
  @pulumi.output_type
254
253
  class GetBackendConfigScepExternalValidationResult(dict):
255
254
  def __init__(__self__, *,
256
- intune: Optional[Mapping[str, builtins.str]] = None):
255
+ intune: Optional[Mapping[str, _builtins.str]] = None):
257
256
  """
258
- :param Mapping[str, builtins.str] intune: The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
257
+ :param Mapping[str, _builtins.str] intune: The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
259
258
  """
260
259
  if intune is not None:
261
260
  pulumi.set(__self__, "intune", intune)
262
261
 
263
- @property
262
+ @_builtins.property
264
263
  @pulumi.getter
265
- def intune(self) -> Optional[Mapping[str, builtins.str]]:
264
+ def intune(self) -> Optional[Mapping[str, _builtins.str]]:
266
265
  """
267
266
  The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
268
267
  """