pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,35 +19,35 @@ __all__ = ['SecretRoleArgs', 'SecretRole']
20
19
  @pulumi.input_type
21
20
  class SecretRoleArgs:
22
21
  def __init__(__self__, *,
23
- mount: pulumi.Input[builtins.str],
24
- roles: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
25
- cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
28
- name: Optional[pulumi.Input[builtins.str]] = None,
29
- namespace: Optional[pulumi.Input[builtins.str]] = None,
30
- organization_id: Optional[pulumi.Input[builtins.str]] = None,
31
- project_id: Optional[pulumi.Input[builtins.str]] = None,
32
- project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
33
- ttl: Optional[pulumi.Input[builtins.str]] = None):
22
+ mount: pulumi.Input[_builtins.str],
23
+ roles: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
24
+ cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
27
+ name: Optional[pulumi.Input[_builtins.str]] = None,
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ organization_id: Optional[pulumi.Input[_builtins.str]] = None,
30
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
31
+ project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
32
+ ttl: Optional[pulumi.Input[_builtins.str]] = None):
34
33
  """
35
34
  The set of arguments for constructing a SecretRole resource.
36
- :param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
37
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
38
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
39
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
40
- :param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
41
- :param pulumi.Input[builtins.str] name: The name of the role.
42
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
35
+ :param pulumi.Input[_builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
36
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
37
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
38
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
39
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
40
+ :param pulumi.Input[_builtins.str] name: The name of the role.
41
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
43
42
  The value should not contain leading or trailing forward slashes.
44
43
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
45
44
  *Available only for Vault Enterprise*.
46
- :param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
45
+ :param pulumi.Input[_builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
47
46
  Required if `project_id` is not set.
48
- :param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
47
+ :param pulumi.Input[_builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
49
48
  Required if `organization_id` is not set.
50
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
51
- :param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
49
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
50
+ :param pulumi.Input[_builtins.str] ttl: Duration in seconds after which the issued credential should expire.
52
51
  """
53
52
  pulumi.set(__self__, "mount", mount)
54
53
  pulumi.set(__self__, "roles", roles)
@@ -71,81 +70,81 @@ class SecretRoleArgs:
71
70
  if ttl is not None:
72
71
  pulumi.set(__self__, "ttl", ttl)
73
72
 
74
- @property
73
+ @_builtins.property
75
74
  @pulumi.getter
76
- def mount(self) -> pulumi.Input[builtins.str]:
75
+ def mount(self) -> pulumi.Input[_builtins.str]:
77
76
  """
78
77
  Path where the MongoDB Atlas Secrets Engine is mounted.
79
78
  """
80
79
  return pulumi.get(self, "mount")
81
80
 
82
81
  @mount.setter
83
- def mount(self, value: pulumi.Input[builtins.str]):
82
+ def mount(self, value: pulumi.Input[_builtins.str]):
84
83
  pulumi.set(self, "mount", value)
85
84
 
86
- @property
85
+ @_builtins.property
87
86
  @pulumi.getter
88
- def roles(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
87
+ def roles(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
89
88
  """
90
89
  List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
91
90
  """
92
91
  return pulumi.get(self, "roles")
93
92
 
94
93
  @roles.setter
95
- def roles(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
94
+ def roles(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
96
95
  pulumi.set(self, "roles", value)
97
96
 
98
- @property
97
+ @_builtins.property
99
98
  @pulumi.getter(name="cidrBlocks")
100
- def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
99
+ def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
101
100
  """
102
101
  Whitelist entry in CIDR notation to be added for the API key.
103
102
  """
104
103
  return pulumi.get(self, "cidr_blocks")
105
104
 
106
105
  @cidr_blocks.setter
107
- def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
106
+ def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
108
107
  pulumi.set(self, "cidr_blocks", value)
109
108
 
110
- @property
109
+ @_builtins.property
111
110
  @pulumi.getter(name="ipAddresses")
112
- def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
111
+ def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
113
112
  """
114
113
  IP address to be added to the whitelist for the API key.
115
114
  """
116
115
  return pulumi.get(self, "ip_addresses")
117
116
 
118
117
  @ip_addresses.setter
119
- def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
118
+ def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
120
119
  pulumi.set(self, "ip_addresses", value)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter(name="maxTtl")
124
- def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
123
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
125
124
  """
126
125
  The maximum allowed lifetime of credentials issued using this role.
127
126
  """
128
127
  return pulumi.get(self, "max_ttl")
129
128
 
130
129
  @max_ttl.setter
131
- def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
130
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
132
131
  pulumi.set(self, "max_ttl", value)
133
132
 
134
- @property
133
+ @_builtins.property
135
134
  @pulumi.getter
136
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
135
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
137
136
  """
138
137
  The name of the role.
139
138
  """
140
139
  return pulumi.get(self, "name")
141
140
 
142
141
  @name.setter
143
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
142
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
144
143
  pulumi.set(self, "name", value)
145
144
 
146
- @property
145
+ @_builtins.property
147
146
  @pulumi.getter
148
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
147
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
149
148
  """
150
149
  The namespace to provision the resource in.
151
150
  The value should not contain leading or trailing forward slashes.
@@ -155,12 +154,12 @@ class SecretRoleArgs:
155
154
  return pulumi.get(self, "namespace")
156
155
 
157
156
  @namespace.setter
158
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
157
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
159
158
  pulumi.set(self, "namespace", value)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter(name="organizationId")
163
- def organization_id(self) -> Optional[pulumi.Input[builtins.str]]:
162
+ def organization_id(self) -> Optional[pulumi.Input[_builtins.str]]:
164
163
  """
165
164
  Unique identifier for the organization to which the target API Key belongs.
166
165
  Required if `project_id` is not set.
@@ -168,12 +167,12 @@ class SecretRoleArgs:
168
167
  return pulumi.get(self, "organization_id")
169
168
 
170
169
  @organization_id.setter
171
- def organization_id(self, value: Optional[pulumi.Input[builtins.str]]):
170
+ def organization_id(self, value: Optional[pulumi.Input[_builtins.str]]):
172
171
  pulumi.set(self, "organization_id", value)
173
172
 
174
- @property
173
+ @_builtins.property
175
174
  @pulumi.getter(name="projectId")
176
- def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
175
+ def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
177
176
  """
178
177
  Unique identifier for the project to which the target API Key belongs.
179
178
  Required if `organization_id` is not set.
@@ -181,66 +180,66 @@ class SecretRoleArgs:
181
180
  return pulumi.get(self, "project_id")
182
181
 
183
182
  @project_id.setter
184
- def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
183
+ def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
185
184
  pulumi.set(self, "project_id", value)
186
185
 
187
- @property
186
+ @_builtins.property
188
187
  @pulumi.getter(name="projectRoles")
189
- def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
188
+ def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
190
189
  """
191
190
  Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
192
191
  """
193
192
  return pulumi.get(self, "project_roles")
194
193
 
195
194
  @project_roles.setter
196
- def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
195
+ def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
197
196
  pulumi.set(self, "project_roles", value)
198
197
 
199
- @property
198
+ @_builtins.property
200
199
  @pulumi.getter
201
- def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
200
+ def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
202
201
  """
203
202
  Duration in seconds after which the issued credential should expire.
204
203
  """
205
204
  return pulumi.get(self, "ttl")
206
205
 
207
206
  @ttl.setter
208
- def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
207
+ def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
209
208
  pulumi.set(self, "ttl", value)
210
209
 
211
210
 
212
211
  @pulumi.input_type
213
212
  class _SecretRoleState:
214
213
  def __init__(__self__, *,
215
- cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
216
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
217
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
218
- mount: Optional[pulumi.Input[builtins.str]] = None,
219
- name: Optional[pulumi.Input[builtins.str]] = None,
220
- namespace: Optional[pulumi.Input[builtins.str]] = None,
221
- organization_id: Optional[pulumi.Input[builtins.str]] = None,
222
- project_id: Optional[pulumi.Input[builtins.str]] = None,
223
- project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
224
- roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
225
- ttl: Optional[pulumi.Input[builtins.str]] = None):
214
+ cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
215
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
216
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
217
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
218
+ name: Optional[pulumi.Input[_builtins.str]] = None,
219
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
220
+ organization_id: Optional[pulumi.Input[_builtins.str]] = None,
221
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
222
+ project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
223
+ roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
224
+ ttl: Optional[pulumi.Input[_builtins.str]] = None):
226
225
  """
227
226
  Input properties used for looking up and filtering SecretRole resources.
228
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
229
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
230
- :param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
231
- :param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
232
- :param pulumi.Input[builtins.str] name: The name of the role.
233
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
227
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
228
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
229
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
230
+ :param pulumi.Input[_builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
231
+ :param pulumi.Input[_builtins.str] name: The name of the role.
232
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
234
233
  The value should not contain leading or trailing forward slashes.
235
234
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
236
235
  *Available only for Vault Enterprise*.
237
- :param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
236
+ :param pulumi.Input[_builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
238
237
  Required if `project_id` is not set.
239
- :param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
238
+ :param pulumi.Input[_builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
240
239
  Required if `organization_id` is not set.
241
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
242
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
243
- :param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
240
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
241
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
242
+ :param pulumi.Input[_builtins.str] ttl: Duration in seconds after which the issued credential should expire.
244
243
  """
245
244
  if cidr_blocks is not None:
246
245
  pulumi.set(__self__, "cidr_blocks", cidr_blocks)
@@ -265,69 +264,69 @@ class _SecretRoleState:
265
264
  if ttl is not None:
266
265
  pulumi.set(__self__, "ttl", ttl)
267
266
 
268
- @property
267
+ @_builtins.property
269
268
  @pulumi.getter(name="cidrBlocks")
270
- def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
269
+ def cidr_blocks(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
271
270
  """
272
271
  Whitelist entry in CIDR notation to be added for the API key.
273
272
  """
274
273
  return pulumi.get(self, "cidr_blocks")
275
274
 
276
275
  @cidr_blocks.setter
277
- def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
276
+ def cidr_blocks(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
278
277
  pulumi.set(self, "cidr_blocks", value)
279
278
 
280
- @property
279
+ @_builtins.property
281
280
  @pulumi.getter(name="ipAddresses")
282
- def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
281
+ def ip_addresses(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
283
282
  """
284
283
  IP address to be added to the whitelist for the API key.
285
284
  """
286
285
  return pulumi.get(self, "ip_addresses")
287
286
 
288
287
  @ip_addresses.setter
289
- def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
288
+ def ip_addresses(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
290
289
  pulumi.set(self, "ip_addresses", value)
291
290
 
292
- @property
291
+ @_builtins.property
293
292
  @pulumi.getter(name="maxTtl")
294
- def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
293
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
295
294
  """
296
295
  The maximum allowed lifetime of credentials issued using this role.
297
296
  """
298
297
  return pulumi.get(self, "max_ttl")
299
298
 
300
299
  @max_ttl.setter
301
- def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
300
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
302
301
  pulumi.set(self, "max_ttl", value)
303
302
 
304
- @property
303
+ @_builtins.property
305
304
  @pulumi.getter
306
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
305
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
307
306
  """
308
307
  Path where the MongoDB Atlas Secrets Engine is mounted.
309
308
  """
310
309
  return pulumi.get(self, "mount")
311
310
 
312
311
  @mount.setter
313
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
312
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
314
313
  pulumi.set(self, "mount", value)
315
314
 
316
- @property
315
+ @_builtins.property
317
316
  @pulumi.getter
318
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
317
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
319
318
  """
320
319
  The name of the role.
321
320
  """
322
321
  return pulumi.get(self, "name")
323
322
 
324
323
  @name.setter
325
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
324
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
326
325
  pulumi.set(self, "name", value)
327
326
 
328
- @property
327
+ @_builtins.property
329
328
  @pulumi.getter
330
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
329
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
331
330
  """
332
331
  The namespace to provision the resource in.
333
332
  The value should not contain leading or trailing forward slashes.
@@ -337,12 +336,12 @@ class _SecretRoleState:
337
336
  return pulumi.get(self, "namespace")
338
337
 
339
338
  @namespace.setter
340
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
339
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
341
340
  pulumi.set(self, "namespace", value)
342
341
 
343
- @property
342
+ @_builtins.property
344
343
  @pulumi.getter(name="organizationId")
345
- def organization_id(self) -> Optional[pulumi.Input[builtins.str]]:
344
+ def organization_id(self) -> Optional[pulumi.Input[_builtins.str]]:
346
345
  """
347
346
  Unique identifier for the organization to which the target API Key belongs.
348
347
  Required if `project_id` is not set.
@@ -350,12 +349,12 @@ class _SecretRoleState:
350
349
  return pulumi.get(self, "organization_id")
351
350
 
352
351
  @organization_id.setter
353
- def organization_id(self, value: Optional[pulumi.Input[builtins.str]]):
352
+ def organization_id(self, value: Optional[pulumi.Input[_builtins.str]]):
354
353
  pulumi.set(self, "organization_id", value)
355
354
 
356
- @property
355
+ @_builtins.property
357
356
  @pulumi.getter(name="projectId")
358
- def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
357
+ def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
359
358
  """
360
359
  Unique identifier for the project to which the target API Key belongs.
361
360
  Required if `organization_id` is not set.
@@ -363,43 +362,43 @@ class _SecretRoleState:
363
362
  return pulumi.get(self, "project_id")
364
363
 
365
364
  @project_id.setter
366
- def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
365
+ def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
367
366
  pulumi.set(self, "project_id", value)
368
367
 
369
- @property
368
+ @_builtins.property
370
369
  @pulumi.getter(name="projectRoles")
371
- def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
370
+ def project_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
372
371
  """
373
372
  Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
374
373
  """
375
374
  return pulumi.get(self, "project_roles")
376
375
 
377
376
  @project_roles.setter
378
- def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
377
+ def project_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
379
378
  pulumi.set(self, "project_roles", value)
380
379
 
381
- @property
380
+ @_builtins.property
382
381
  @pulumi.getter
383
- def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
382
+ def roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
384
383
  """
385
384
  List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
386
385
  """
387
386
  return pulumi.get(self, "roles")
388
387
 
389
388
  @roles.setter
390
- def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
389
+ def roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
391
390
  pulumi.set(self, "roles", value)
392
391
 
393
- @property
392
+ @_builtins.property
394
393
  @pulumi.getter
395
- def ttl(self) -> Optional[pulumi.Input[builtins.str]]:
394
+ def ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
396
395
  """
397
396
  Duration in seconds after which the issued credential should expire.
398
397
  """
399
398
  return pulumi.get(self, "ttl")
400
399
 
401
400
  @ttl.setter
402
- def ttl(self, value: Optional[pulumi.Input[builtins.str]]):
401
+ def ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
403
402
  pulumi.set(self, "ttl", value)
404
403
 
405
404
 
@@ -409,17 +408,17 @@ class SecretRole(pulumi.CustomResource):
409
408
  def __init__(__self__,
410
409
  resource_name: str,
411
410
  opts: Optional[pulumi.ResourceOptions] = None,
412
- cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
413
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
414
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
415
- mount: Optional[pulumi.Input[builtins.str]] = None,
416
- name: Optional[pulumi.Input[builtins.str]] = None,
417
- namespace: Optional[pulumi.Input[builtins.str]] = None,
418
- organization_id: Optional[pulumi.Input[builtins.str]] = None,
419
- project_id: Optional[pulumi.Input[builtins.str]] = None,
420
- project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
421
- roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
422
- ttl: Optional[pulumi.Input[builtins.str]] = None,
411
+ cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
412
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
413
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
414
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
415
+ name: Optional[pulumi.Input[_builtins.str]] = None,
416
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
417
+ organization_id: Optional[pulumi.Input[_builtins.str]] = None,
418
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
419
+ project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
420
+ roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
421
+ ttl: Optional[pulumi.Input[_builtins.str]] = None,
423
422
  __props__=None):
424
423
  """
425
424
  ## Example Usage
@@ -460,22 +459,22 @@ class SecretRole(pulumi.CustomResource):
460
459
 
461
460
  :param str resource_name: The name of the resource.
462
461
  :param pulumi.ResourceOptions opts: Options for the resource.
463
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
464
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
465
- :param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
466
- :param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
467
- :param pulumi.Input[builtins.str] name: The name of the role.
468
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
462
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
463
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
464
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
465
+ :param pulumi.Input[_builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
466
+ :param pulumi.Input[_builtins.str] name: The name of the role.
467
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
469
468
  The value should not contain leading or trailing forward slashes.
470
469
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
471
470
  *Available only for Vault Enterprise*.
472
- :param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
471
+ :param pulumi.Input[_builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
473
472
  Required if `project_id` is not set.
474
- :param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
473
+ :param pulumi.Input[_builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
475
474
  Required if `organization_id` is not set.
476
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
477
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
478
- :param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
475
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
476
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
477
+ :param pulumi.Input[_builtins.str] ttl: Duration in seconds after which the issued credential should expire.
479
478
  """
480
479
  ...
481
480
  @overload
@@ -535,17 +534,17 @@ class SecretRole(pulumi.CustomResource):
535
534
  def _internal_init(__self__,
536
535
  resource_name: str,
537
536
  opts: Optional[pulumi.ResourceOptions] = None,
538
- cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
539
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
540
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
541
- mount: Optional[pulumi.Input[builtins.str]] = None,
542
- name: Optional[pulumi.Input[builtins.str]] = None,
543
- namespace: Optional[pulumi.Input[builtins.str]] = None,
544
- organization_id: Optional[pulumi.Input[builtins.str]] = None,
545
- project_id: Optional[pulumi.Input[builtins.str]] = None,
546
- project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
547
- roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
548
- ttl: Optional[pulumi.Input[builtins.str]] = None,
537
+ cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
538
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
539
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
540
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
541
+ name: Optional[pulumi.Input[_builtins.str]] = None,
542
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
543
+ organization_id: Optional[pulumi.Input[_builtins.str]] = None,
544
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
545
+ project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
546
+ roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
547
+ ttl: Optional[pulumi.Input[_builtins.str]] = None,
549
548
  __props__=None):
550
549
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
551
550
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -580,17 +579,17 @@ class SecretRole(pulumi.CustomResource):
580
579
  def get(resource_name: str,
581
580
  id: pulumi.Input[str],
582
581
  opts: Optional[pulumi.ResourceOptions] = None,
583
- cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
584
- ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
585
- max_ttl: Optional[pulumi.Input[builtins.str]] = None,
586
- mount: Optional[pulumi.Input[builtins.str]] = None,
587
- name: Optional[pulumi.Input[builtins.str]] = None,
588
- namespace: Optional[pulumi.Input[builtins.str]] = None,
589
- organization_id: Optional[pulumi.Input[builtins.str]] = None,
590
- project_id: Optional[pulumi.Input[builtins.str]] = None,
591
- project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
592
- roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
593
- ttl: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretRole':
582
+ cidr_blocks: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
583
+ ip_addresses: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
584
+ max_ttl: Optional[pulumi.Input[_builtins.str]] = None,
585
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
586
+ name: Optional[pulumi.Input[_builtins.str]] = None,
587
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
588
+ organization_id: Optional[pulumi.Input[_builtins.str]] = None,
589
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
590
+ project_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
591
+ roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
592
+ ttl: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretRole':
594
593
  """
595
594
  Get an existing SecretRole resource's state with the given name, id, and optional extra
596
595
  properties used to qualify the lookup.
@@ -598,22 +597,22 @@ class SecretRole(pulumi.CustomResource):
598
597
  :param str resource_name: The unique name of the resulting resource.
599
598
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
600
599
  :param pulumi.ResourceOptions opts: Options for the resource.
601
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
602
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
603
- :param pulumi.Input[builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
604
- :param pulumi.Input[builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
605
- :param pulumi.Input[builtins.str] name: The name of the role.
606
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
600
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_blocks: Whitelist entry in CIDR notation to be added for the API key.
601
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ip_addresses: IP address to be added to the whitelist for the API key.
602
+ :param pulumi.Input[_builtins.str] max_ttl: The maximum allowed lifetime of credentials issued using this role.
603
+ :param pulumi.Input[_builtins.str] mount: Path where the MongoDB Atlas Secrets Engine is mounted.
604
+ :param pulumi.Input[_builtins.str] name: The name of the role.
605
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
607
606
  The value should not contain leading or trailing forward slashes.
608
607
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
609
608
  *Available only for Vault Enterprise*.
610
- :param pulumi.Input[builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
609
+ :param pulumi.Input[_builtins.str] organization_id: Unique identifier for the organization to which the target API Key belongs.
611
610
  Required if `project_id` is not set.
612
- :param pulumi.Input[builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
611
+ :param pulumi.Input[_builtins.str] project_id: Unique identifier for the project to which the target API Key belongs.
613
612
  Required if `organization_id` is not set.
614
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
615
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
616
- :param pulumi.Input[builtins.str] ttl: Duration in seconds after which the issued credential should expire.
613
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] project_roles: Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
614
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] roles: List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
615
+ :param pulumi.Input[_builtins.str] ttl: Duration in seconds after which the issued credential should expire.
617
616
  """
618
617
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
619
618
 
@@ -632,49 +631,49 @@ class SecretRole(pulumi.CustomResource):
632
631
  __props__.__dict__["ttl"] = ttl
633
632
  return SecretRole(resource_name, opts=opts, __props__=__props__)
634
633
 
635
- @property
634
+ @_builtins.property
636
635
  @pulumi.getter(name="cidrBlocks")
637
- def cidr_blocks(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
636
+ def cidr_blocks(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
638
637
  """
639
638
  Whitelist entry in CIDR notation to be added for the API key.
640
639
  """
641
640
  return pulumi.get(self, "cidr_blocks")
642
641
 
643
- @property
642
+ @_builtins.property
644
643
  @pulumi.getter(name="ipAddresses")
645
- def ip_addresses(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
644
+ def ip_addresses(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
646
645
  """
647
646
  IP address to be added to the whitelist for the API key.
648
647
  """
649
648
  return pulumi.get(self, "ip_addresses")
650
649
 
651
- @property
650
+ @_builtins.property
652
651
  @pulumi.getter(name="maxTtl")
653
- def max_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
652
+ def max_ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
654
653
  """
655
654
  The maximum allowed lifetime of credentials issued using this role.
656
655
  """
657
656
  return pulumi.get(self, "max_ttl")
658
657
 
659
- @property
658
+ @_builtins.property
660
659
  @pulumi.getter
661
- def mount(self) -> pulumi.Output[builtins.str]:
660
+ def mount(self) -> pulumi.Output[_builtins.str]:
662
661
  """
663
662
  Path where the MongoDB Atlas Secrets Engine is mounted.
664
663
  """
665
664
  return pulumi.get(self, "mount")
666
665
 
667
- @property
666
+ @_builtins.property
668
667
  @pulumi.getter
669
- def name(self) -> pulumi.Output[builtins.str]:
668
+ def name(self) -> pulumi.Output[_builtins.str]:
670
669
  """
671
670
  The name of the role.
672
671
  """
673
672
  return pulumi.get(self, "name")
674
673
 
675
- @property
674
+ @_builtins.property
676
675
  @pulumi.getter
677
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
676
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
678
677
  """
679
678
  The namespace to provision the resource in.
680
679
  The value should not contain leading or trailing forward slashes.
@@ -683,43 +682,43 @@ class SecretRole(pulumi.CustomResource):
683
682
  """
684
683
  return pulumi.get(self, "namespace")
685
684
 
686
- @property
685
+ @_builtins.property
687
686
  @pulumi.getter(name="organizationId")
688
- def organization_id(self) -> pulumi.Output[Optional[builtins.str]]:
687
+ def organization_id(self) -> pulumi.Output[Optional[_builtins.str]]:
689
688
  """
690
689
  Unique identifier for the organization to which the target API Key belongs.
691
690
  Required if `project_id` is not set.
692
691
  """
693
692
  return pulumi.get(self, "organization_id")
694
693
 
695
- @property
694
+ @_builtins.property
696
695
  @pulumi.getter(name="projectId")
697
- def project_id(self) -> pulumi.Output[Optional[builtins.str]]:
696
+ def project_id(self) -> pulumi.Output[Optional[_builtins.str]]:
698
697
  """
699
698
  Unique identifier for the project to which the target API Key belongs.
700
699
  Required if `organization_id` is not set.
701
700
  """
702
701
  return pulumi.get(self, "project_id")
703
702
 
704
- @property
703
+ @_builtins.property
705
704
  @pulumi.getter(name="projectRoles")
706
- def project_roles(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
705
+ def project_roles(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
707
706
  """
708
707
  Roles assigned when an org API key is assigned to a project API key. Possible values are `GROUP_CLUSTER_MANAGER`, `GROUP_DATA_ACCESS_ADMIN`, `GROUP_DATA_ACCESS_READ_ONLY`, `GROUP_DATA_ACCESS_READ_WRITE`, `GROUP_OWNER` and `GROUP_READ_ONLY`.
709
708
  """
710
709
  return pulumi.get(self, "project_roles")
711
710
 
712
- @property
711
+ @_builtins.property
713
712
  @pulumi.getter
714
- def roles(self) -> pulumi.Output[Sequence[builtins.str]]:
713
+ def roles(self) -> pulumi.Output[Sequence[_builtins.str]]:
715
714
  """
716
715
  List of roles that the API Key needs to have. Possible values are `ORG_OWNER`, `ORG_MEMBER`, `ORG_GROUP_CREATOR`, `ORG_BILLING_ADMIN` and `ORG_READ_ONLY`.
717
716
  """
718
717
  return pulumi.get(self, "roles")
719
718
 
720
- @property
719
+ @_builtins.property
721
720
  @pulumi.getter
722
- def ttl(self) -> pulumi.Output[Optional[builtins.str]]:
721
+ def ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
723
722
  """
724
723
  Duration in seconds after which the issued credential should expire.
725
724
  """