pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -56,64 +55,64 @@ class GetBackendCertMetadataResult:
56
55
  raise TypeError("Expected argument 'serial_number' to be a str")
57
56
  pulumi.set(__self__, "serial_number", serial_number)
58
57
 
59
- @property
58
+ @_builtins.property
60
59
  @pulumi.getter(name="certMetadata")
61
- def cert_metadata(self) -> builtins.str:
60
+ def cert_metadata(self) -> _builtins.str:
62
61
  """
63
62
  The metadata associated with the certificate
64
63
  """
65
64
  return pulumi.get(self, "cert_metadata")
66
65
 
67
- @property
66
+ @_builtins.property
68
67
  @pulumi.getter
69
- def expiration(self) -> builtins.str:
68
+ def expiration(self) -> _builtins.str:
70
69
  """
71
70
  The expiration date of the certificate in unix epoch format
72
71
  """
73
72
  return pulumi.get(self, "expiration")
74
73
 
75
- @property
74
+ @_builtins.property
76
75
  @pulumi.getter
77
- def id(self) -> builtins.str:
76
+ def id(self) -> _builtins.str:
78
77
  """
79
78
  The provider-assigned unique ID for this managed resource.
80
79
  """
81
80
  return pulumi.get(self, "id")
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter(name="issuerId")
85
- def issuer_id(self) -> builtins.str:
84
+ def issuer_id(self) -> _builtins.str:
86
85
  """
87
86
  ID of the issuer.
88
87
  """
89
88
  return pulumi.get(self, "issuer_id")
90
89
 
91
- @property
90
+ @_builtins.property
92
91
  @pulumi.getter
93
- def namespace(self) -> Optional[builtins.str]:
92
+ def namespace(self) -> Optional[_builtins.str]:
94
93
  return pulumi.get(self, "namespace")
95
94
 
96
- @property
95
+ @_builtins.property
97
96
  @pulumi.getter
98
- def path(self) -> builtins.str:
97
+ def path(self) -> _builtins.str:
99
98
  return pulumi.get(self, "path")
100
99
 
101
- @property
100
+ @_builtins.property
102
101
  @pulumi.getter
103
- def role(self) -> builtins.str:
102
+ def role(self) -> _builtins.str:
104
103
  """
105
104
  The role used to create the certificate
106
105
  """
107
106
  return pulumi.get(self, "role")
108
107
 
109
- @property
108
+ @_builtins.property
110
109
  @pulumi.getter
111
- def serial(self) -> builtins.str:
110
+ def serial(self) -> _builtins.str:
112
111
  return pulumi.get(self, "serial")
113
112
 
114
- @property
113
+ @_builtins.property
115
114
  @pulumi.getter(name="serialNumber")
116
- def serial_number(self) -> builtins.str:
115
+ def serial_number(self) -> _builtins.str:
117
116
  """
118
117
  The serial number
119
118
  """
@@ -137,9 +136,9 @@ class AwaitableGetBackendCertMetadataResult(GetBackendCertMetadataResult):
137
136
  serial_number=self.serial_number)
138
137
 
139
138
 
140
- def get_backend_cert_metadata(namespace: Optional[builtins.str] = None,
141
- path: Optional[builtins.str] = None,
142
- serial: Optional[builtins.str] = None,
139
+ def get_backend_cert_metadata(namespace: Optional[_builtins.str] = None,
140
+ path: Optional[_builtins.str] = None,
141
+ serial: Optional[_builtins.str] = None,
143
142
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendCertMetadataResult:
144
143
  """
145
144
  ## Example Usage
@@ -152,13 +151,13 @@ def get_backend_cert_metadata(namespace: Optional[builtins.str] = None,
152
151
  path="pki",
153
152
  type="pki",
154
153
  description="PKI secret engine mount")
155
- root = vault.pki_secret.SecretBackendRootCert("root",
154
+ root = vault.pkisecret.SecretBackendRootCert("root",
156
155
  backend=pki.path,
157
156
  type="internal",
158
157
  common_name="example",
159
158
  ttl="86400",
160
159
  issuer_name="example")
161
- test_secret_backend_role = vault.pki_secret.SecretBackendRole("test",
160
+ test_secret_backend_role = vault.pkisecret.SecretBackendRole("test",
162
161
  backend=test_vault_pki_secret_backend_root_cert["backend"],
163
162
  name="test",
164
163
  allowed_domains=["test.my.domain"],
@@ -170,7 +169,7 @@ def get_backend_cert_metadata(namespace: Optional[builtins.str] = None,
170
169
  "KeyEncipherment",
171
170
  ],
172
171
  no_store_metadata=False)
173
- test_secret_backend_cert = vault.pki_secret.SecretBackendCert("test",
172
+ test_secret_backend_cert = vault.pkisecret.SecretBackendCert("test",
174
173
  backend=test_secret_backend_role.backend,
175
174
  name=test_secret_backend_role.name,
176
175
  common_name="cert.test.my.domain",
@@ -182,13 +181,13 @@ def get_backend_cert_metadata(namespace: Optional[builtins.str] = None,
182
181
  ```
183
182
 
184
183
 
185
- :param builtins.str namespace: The namespace of the target resource.
184
+ :param _builtins.str namespace: The namespace of the target resource.
186
185
  The value should not contain leading or trailing forward slashes.
187
186
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
188
187
  *Available only for Vault Enterprise*.
189
- :param builtins.str path: The path to the PKI secret backend to
188
+ :param _builtins.str path: The path to the PKI secret backend to
190
189
  read the cert metadata from, with no leading or trailing `/`s.
191
- :param builtins.str serial: Specifies the serial of the certificate whose metadata to read.
190
+ :param _builtins.str serial: Specifies the serial of the certificate whose metadata to read.
192
191
  """
193
192
  __args__ = dict()
194
193
  __args__['namespace'] = namespace
@@ -207,9 +206,9 @@ def get_backend_cert_metadata(namespace: Optional[builtins.str] = None,
207
206
  role=pulumi.get(__ret__, 'role'),
208
207
  serial=pulumi.get(__ret__, 'serial'),
209
208
  serial_number=pulumi.get(__ret__, 'serial_number'))
210
- def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
211
- path: Optional[pulumi.Input[builtins.str]] = None,
212
- serial: Optional[pulumi.Input[builtins.str]] = None,
209
+ def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
210
+ path: Optional[pulumi.Input[_builtins.str]] = None,
211
+ serial: Optional[pulumi.Input[_builtins.str]] = None,
213
212
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendCertMetadataResult]:
214
213
  """
215
214
  ## Example Usage
@@ -222,13 +221,13 @@ def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[b
222
221
  path="pki",
223
222
  type="pki",
224
223
  description="PKI secret engine mount")
225
- root = vault.pki_secret.SecretBackendRootCert("root",
224
+ root = vault.pkisecret.SecretBackendRootCert("root",
226
225
  backend=pki.path,
227
226
  type="internal",
228
227
  common_name="example",
229
228
  ttl="86400",
230
229
  issuer_name="example")
231
- test_secret_backend_role = vault.pki_secret.SecretBackendRole("test",
230
+ test_secret_backend_role = vault.pkisecret.SecretBackendRole("test",
232
231
  backend=test_vault_pki_secret_backend_root_cert["backend"],
233
232
  name="test",
234
233
  allowed_domains=["test.my.domain"],
@@ -240,7 +239,7 @@ def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[b
240
239
  "KeyEncipherment",
241
240
  ],
242
241
  no_store_metadata=False)
243
- test_secret_backend_cert = vault.pki_secret.SecretBackendCert("test",
242
+ test_secret_backend_cert = vault.pkisecret.SecretBackendCert("test",
244
243
  backend=test_secret_backend_role.backend,
245
244
  name=test_secret_backend_role.name,
246
245
  common_name="cert.test.my.domain",
@@ -252,13 +251,13 @@ def get_backend_cert_metadata_output(namespace: Optional[pulumi.Input[Optional[b
252
251
  ```
253
252
 
254
253
 
255
- :param builtins.str namespace: The namespace of the target resource.
254
+ :param _builtins.str namespace: The namespace of the target resource.
256
255
  The value should not contain leading or trailing forward slashes.
257
256
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
258
257
  *Available only for Vault Enterprise*.
259
- :param builtins.str path: The path to the PKI secret backend to
258
+ :param _builtins.str path: The path to the PKI secret backend to
260
259
  read the cert metadata from, with no leading or trailing `/`s.
261
- :param builtins.str serial: Specifies the serial of the certificate whose metadata to read.
260
+ :param _builtins.str serial: Specifies the serial of the certificate whose metadata to read.
262
261
  """
263
262
  __args__ = dict()
264
263
  __args__['namespace'] = namespace
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -60,57 +59,57 @@ class GetBackendConfigCmpv2Result:
60
59
  raise TypeError("Expected argument 'namespace' to be a str")
61
60
  pulumi.set(__self__, "namespace", namespace)
62
61
 
63
- @property
62
+ @_builtins.property
64
63
  @pulumi.getter(name="auditFields")
65
- def audit_fields(self) -> Sequence[builtins.str]:
64
+ def audit_fields(self) -> Sequence[_builtins.str]:
66
65
  return pulumi.get(self, "audit_fields")
67
66
 
68
- @property
67
+ @_builtins.property
69
68
  @pulumi.getter
70
69
  def authenticators(self) -> Sequence['outputs.GetBackendConfigCmpv2AuthenticatorResult']:
71
70
  return pulumi.get(self, "authenticators")
72
71
 
73
- @property
72
+ @_builtins.property
74
73
  @pulumi.getter
75
- def backend(self) -> builtins.str:
74
+ def backend(self) -> _builtins.str:
76
75
  return pulumi.get(self, "backend")
77
76
 
78
- @property
77
+ @_builtins.property
79
78
  @pulumi.getter(name="defaultPathPolicy")
80
- def default_path_policy(self) -> builtins.str:
79
+ def default_path_policy(self) -> _builtins.str:
81
80
  return pulumi.get(self, "default_path_policy")
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter(name="disabledValidations")
85
- def disabled_validations(self) -> Optional[Sequence[builtins.str]]:
84
+ def disabled_validations(self) -> Optional[Sequence[_builtins.str]]:
86
85
  return pulumi.get(self, "disabled_validations")
87
86
 
88
- @property
87
+ @_builtins.property
89
88
  @pulumi.getter(name="enableSentinelParsing")
90
- def enable_sentinel_parsing(self) -> builtins.bool:
89
+ def enable_sentinel_parsing(self) -> _builtins.bool:
91
90
  return pulumi.get(self, "enable_sentinel_parsing")
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter
95
- def enabled(self) -> builtins.bool:
94
+ def enabled(self) -> _builtins.bool:
96
95
  return pulumi.get(self, "enabled")
97
96
 
98
- @property
97
+ @_builtins.property
99
98
  @pulumi.getter
100
- def id(self) -> builtins.str:
99
+ def id(self) -> _builtins.str:
101
100
  """
102
101
  The provider-assigned unique ID for this managed resource.
103
102
  """
104
103
  return pulumi.get(self, "id")
105
104
 
106
- @property
105
+ @_builtins.property
107
106
  @pulumi.getter(name="lastUpdated")
108
- def last_updated(self) -> builtins.str:
107
+ def last_updated(self) -> _builtins.str:
109
108
  return pulumi.get(self, "last_updated")
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter
113
- def namespace(self) -> Optional[builtins.str]:
112
+ def namespace(self) -> Optional[_builtins.str]:
114
113
  return pulumi.get(self, "namespace")
115
114
 
116
115
 
@@ -132,9 +131,9 @@ class AwaitableGetBackendConfigCmpv2Result(GetBackendConfigCmpv2Result):
132
131
  namespace=self.namespace)
133
132
 
134
133
 
135
- def get_backend_config_cmpv2(backend: Optional[builtins.str] = None,
136
- disabled_validations: Optional[Sequence[builtins.str]] = None,
137
- namespace: Optional[builtins.str] = None,
134
+ def get_backend_config_cmpv2(backend: Optional[_builtins.str] = None,
135
+ disabled_validations: Optional[Sequence[_builtins.str]] = None,
136
+ namespace: Optional[_builtins.str] = None,
138
137
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigCmpv2Result:
139
138
  """
140
139
  ## Example Usage
@@ -151,12 +150,12 @@ def get_backend_config_cmpv2(backend: Optional[builtins.str] = None,
151
150
  ```
152
151
 
153
152
 
154
- :param builtins.str backend: The path to the PKI secret backend to
153
+ :param _builtins.str backend: The path to the PKI secret backend to
155
154
  read the CMPv2 configuration from, with no leading or trailing `/`s.
156
155
 
157
156
  # Attributes Reference
158
- :param Sequence[builtins.str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
159
- :param builtins.str namespace: The namespace of the target resource.
157
+ :param Sequence[_builtins.str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
158
+ :param _builtins.str namespace: The namespace of the target resource.
160
159
  The value should not contain leading or trailing forward slashes.
161
160
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
162
161
  *Available only for Vault Enterprise*.
@@ -179,9 +178,9 @@ def get_backend_config_cmpv2(backend: Optional[builtins.str] = None,
179
178
  id=pulumi.get(__ret__, 'id'),
180
179
  last_updated=pulumi.get(__ret__, 'last_updated'),
181
180
  namespace=pulumi.get(__ret__, 'namespace'))
182
- def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[builtins.str]] = None,
183
- disabled_validations: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
184
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
181
+ def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
182
+ disabled_validations: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
183
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
185
184
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigCmpv2Result]:
186
185
  """
187
186
  ## Example Usage
@@ -198,12 +197,12 @@ def get_backend_config_cmpv2_output(backend: Optional[pulumi.Input[builtins.str]
198
197
  ```
199
198
 
200
199
 
201
- :param builtins.str backend: The path to the PKI secret backend to
200
+ :param _builtins.str backend: The path to the PKI secret backend to
202
201
  read the CMPv2 configuration from, with no leading or trailing `/`s.
203
202
 
204
203
  # Attributes Reference
205
- :param Sequence[builtins.str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
206
- :param builtins.str namespace: The namespace of the target resource.
204
+ :param Sequence[_builtins.str] disabled_validations: A comma-separated list of validations not to perform on CMPv2 messages.
205
+ :param _builtins.str namespace: The namespace of the target resource.
207
206
  The value should not contain leading or trailing forward slashes.
208
207
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
209
208
  *Available only for Vault Enterprise*.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -63,15 +62,15 @@ class GetBackendConfigEstResult:
63
62
  raise TypeError("Expected argument 'namespace' to be a str")
64
63
  pulumi.set(__self__, "namespace", namespace)
65
64
 
66
- @property
65
+ @_builtins.property
67
66
  @pulumi.getter(name="auditFields")
68
- def audit_fields(self) -> Sequence[builtins.str]:
67
+ def audit_fields(self) -> Sequence[_builtins.str]:
69
68
  """
70
69
  Fields parsed from the CSR that appear in the audit and can be used by sentinel policies.
71
70
  """
72
71
  return pulumi.get(self, "audit_fields")
73
72
 
74
- @property
73
+ @_builtins.property
75
74
  @pulumi.getter
76
75
  def authenticators(self) -> Sequence['outputs.GetBackendConfigEstAuthenticatorResult']:
77
76
  """
@@ -79,70 +78,70 @@ class GetBackendConfigEstResult:
79
78
  """
80
79
  return pulumi.get(self, "authenticators")
81
80
 
82
- @property
81
+ @_builtins.property
83
82
  @pulumi.getter
84
- def backend(self) -> builtins.str:
83
+ def backend(self) -> _builtins.str:
85
84
  return pulumi.get(self, "backend")
86
85
 
87
- @property
86
+ @_builtins.property
88
87
  @pulumi.getter(name="defaultMount")
89
- def default_mount(self) -> builtins.bool:
88
+ def default_mount(self) -> _builtins.bool:
90
89
  """
91
90
  If set, this mount is registered as the default `.well-known/est` URL path. Only a single mount can enable this across a Vault cluster.
92
91
  """
93
92
  return pulumi.get(self, "default_mount")
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter(name="defaultPathPolicy")
97
- def default_path_policy(self) -> builtins.str:
96
+ def default_path_policy(self) -> _builtins.str:
98
97
  """
99
98
  Required to be set if default_mount is enabled. Specifies the behavior for requests using the default EST label. Can be sign-verbatim or a role given by role:<role_name>.
100
99
  """
101
100
  return pulumi.get(self, "default_path_policy")
102
101
 
103
- @property
102
+ @_builtins.property
104
103
  @pulumi.getter(name="enableSentinelParsing")
105
- def enable_sentinel_parsing(self) -> builtins.bool:
104
+ def enable_sentinel_parsing(self) -> _builtins.bool:
106
105
  """
107
106
  If set, parse out fields from the provided CSR making them available for Sentinel policies.
108
107
  """
109
108
  return pulumi.get(self, "enable_sentinel_parsing")
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter
113
- def enabled(self) -> builtins.bool:
112
+ def enabled(self) -> _builtins.bool:
114
113
  """
115
114
  Specifies whether EST is enabled.
116
115
  """
117
116
  return pulumi.get(self, "enabled")
118
117
 
119
- @property
118
+ @_builtins.property
120
119
  @pulumi.getter
121
- def id(self) -> builtins.str:
120
+ def id(self) -> _builtins.str:
122
121
  """
123
122
  The provider-assigned unique ID for this managed resource.
124
123
  """
125
124
  return pulumi.get(self, "id")
126
125
 
127
- @property
126
+ @_builtins.property
128
127
  @pulumi.getter(name="labelToPathPolicy")
129
- def label_to_path_policy(self) -> Mapping[str, builtins.str]:
128
+ def label_to_path_policy(self) -> Mapping[str, _builtins.str]:
130
129
  """
131
130
  A pairing of an EST label with the redirected behavior for requests hitting that role. The path policy can be sign-verbatim or a role given by role:<role_name>. Labels must be unique across Vault cluster, and will register .well-known/est/<label> URL paths.
132
131
  """
133
132
  return pulumi.get(self, "label_to_path_policy")
134
133
 
135
- @property
134
+ @_builtins.property
136
135
  @pulumi.getter(name="lastUpdated")
137
- def last_updated(self) -> builtins.str:
136
+ def last_updated(self) -> _builtins.str:
138
137
  """
139
138
  A read-only timestamp representing the last time the configuration was updated.
140
139
  """
141
140
  return pulumi.get(self, "last_updated")
142
141
 
143
- @property
142
+ @_builtins.property
144
143
  @pulumi.getter
145
- def namespace(self) -> Optional[builtins.str]:
144
+ def namespace(self) -> Optional[_builtins.str]:
146
145
  return pulumi.get(self, "namespace")
147
146
 
148
147
 
@@ -165,8 +164,8 @@ class AwaitableGetBackendConfigEstResult(GetBackendConfigEstResult):
165
164
  namespace=self.namespace)
166
165
 
167
166
 
168
- def get_backend_config_est(backend: Optional[builtins.str] = None,
169
- namespace: Optional[builtins.str] = None,
167
+ def get_backend_config_est(backend: Optional[_builtins.str] = None,
168
+ namespace: Optional[_builtins.str] = None,
170
169
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigEstResult:
171
170
  """
172
171
  ## Example Usage
@@ -183,9 +182,9 @@ def get_backend_config_est(backend: Optional[builtins.str] = None,
183
182
  ```
184
183
 
185
184
 
186
- :param builtins.str backend: The path to the PKI secret backend to
185
+ :param _builtins.str backend: The path to the PKI secret backend to
187
186
  read the EST configuration from, with no leading or trailing `/`s.
188
- :param builtins.str namespace: The namespace of the target resource.
187
+ :param _builtins.str namespace: The namespace of the target resource.
189
188
  The value should not contain leading or trailing forward slashes.
190
189
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
191
190
  *Available only for Vault Enterprise*.
@@ -208,8 +207,8 @@ def get_backend_config_est(backend: Optional[builtins.str] = None,
208
207
  label_to_path_policy=pulumi.get(__ret__, 'label_to_path_policy'),
209
208
  last_updated=pulumi.get(__ret__, 'last_updated'),
210
209
  namespace=pulumi.get(__ret__, 'namespace'))
211
- def get_backend_config_est_output(backend: Optional[pulumi.Input[builtins.str]] = None,
212
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
210
+ def get_backend_config_est_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
211
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
213
212
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigEstResult]:
214
213
  """
215
214
  ## Example Usage
@@ -226,9 +225,9 @@ def get_backend_config_est_output(backend: Optional[pulumi.Input[builtins.str]]
226
225
  ```
227
226
 
228
227
 
229
- :param builtins.str backend: The path to the PKI secret backend to
228
+ :param _builtins.str backend: The path to the PKI secret backend to
230
229
  read the EST configuration from, with no leading or trailing `/`s.
231
- :param builtins.str namespace: The namespace of the target resource.
230
+ :param _builtins.str namespace: The namespace of the target resource.
232
231
  The value should not contain leading or trailing forward slashes.
233
232
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
234
233
  *Available only for Vault Enterprise*.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -63,23 +62,23 @@ class GetBackendConfigScepResult:
63
62
  raise TypeError("Expected argument 'restrict_ca_chain_to_issuer' to be a bool")
64
63
  pulumi.set(__self__, "restrict_ca_chain_to_issuer", restrict_ca_chain_to_issuer)
65
64
 
66
- @property
65
+ @_builtins.property
67
66
  @pulumi.getter(name="allowedDigestAlgorithms")
68
- def allowed_digest_algorithms(self) -> Sequence[builtins.str]:
67
+ def allowed_digest_algorithms(self) -> Sequence[_builtins.str]:
69
68
  """
70
69
  List of allowed digest algorithms for SCEP requests.
71
70
  """
72
71
  return pulumi.get(self, "allowed_digest_algorithms")
73
72
 
74
- @property
73
+ @_builtins.property
75
74
  @pulumi.getter(name="allowedEncryptionAlgorithms")
76
- def allowed_encryption_algorithms(self) -> Sequence[builtins.str]:
75
+ def allowed_encryption_algorithms(self) -> Sequence[_builtins.str]:
77
76
  """
78
77
  List of allowed encryption algorithms for SCEP requests.
79
78
  """
80
79
  return pulumi.get(self, "allowed_encryption_algorithms")
81
80
 
82
- @property
81
+ @_builtins.property
83
82
  @pulumi.getter
84
83
  def authenticators(self) -> Sequence['outputs.GetBackendConfigScepAuthenticatorResult']:
85
84
  """
@@ -87,28 +86,28 @@ class GetBackendConfigScepResult:
87
86
  """
88
87
  return pulumi.get(self, "authenticators")
89
88
 
90
- @property
89
+ @_builtins.property
91
90
  @pulumi.getter
92
- def backend(self) -> builtins.str:
91
+ def backend(self) -> _builtins.str:
93
92
  return pulumi.get(self, "backend")
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter(name="defaultPathPolicy")
97
- def default_path_policy(self) -> builtins.str:
96
+ def default_path_policy(self) -> _builtins.str:
98
97
  """
99
98
  Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
100
99
  """
101
100
  return pulumi.get(self, "default_path_policy")
102
101
 
103
- @property
102
+ @_builtins.property
104
103
  @pulumi.getter
105
- def enabled(self) -> builtins.bool:
104
+ def enabled(self) -> _builtins.bool:
106
105
  """
107
106
  Specifies whether SCEP is enabled.
108
107
  """
109
108
  return pulumi.get(self, "enabled")
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter(name="externalValidations")
113
112
  def external_validations(self) -> Sequence['outputs.GetBackendConfigScepExternalValidationResult']:
114
113
  """
@@ -116,30 +115,30 @@ class GetBackendConfigScepResult:
116
115
  """
117
116
  return pulumi.get(self, "external_validations")
118
117
 
119
- @property
118
+ @_builtins.property
120
119
  @pulumi.getter
121
- def id(self) -> builtins.str:
120
+ def id(self) -> _builtins.str:
122
121
  """
123
122
  The provider-assigned unique ID for this managed resource.
124
123
  """
125
124
  return pulumi.get(self, "id")
126
125
 
127
- @property
126
+ @_builtins.property
128
127
  @pulumi.getter(name="lastUpdated")
129
- def last_updated(self) -> builtins.str:
128
+ def last_updated(self) -> _builtins.str:
130
129
  """
131
130
  A read-only timestamp representing the last time the configuration was updated.
132
131
  """
133
132
  return pulumi.get(self, "last_updated")
134
133
 
135
- @property
134
+ @_builtins.property
136
135
  @pulumi.getter
137
- def namespace(self) -> Optional[builtins.str]:
136
+ def namespace(self) -> Optional[_builtins.str]:
138
137
  return pulumi.get(self, "namespace")
139
138
 
140
- @property
139
+ @_builtins.property
141
140
  @pulumi.getter(name="restrictCaChainToIssuer")
142
- def restrict_ca_chain_to_issuer(self) -> builtins.bool:
141
+ def restrict_ca_chain_to_issuer(self) -> _builtins.bool:
143
142
  """
144
143
  If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.
145
144
  """
@@ -165,8 +164,8 @@ class AwaitableGetBackendConfigScepResult(GetBackendConfigScepResult):
165
164
  restrict_ca_chain_to_issuer=self.restrict_ca_chain_to_issuer)
166
165
 
167
166
 
168
- def get_backend_config_scep(backend: Optional[builtins.str] = None,
169
- namespace: Optional[builtins.str] = None,
167
+ def get_backend_config_scep(backend: Optional[_builtins.str] = None,
168
+ namespace: Optional[_builtins.str] = None,
170
169
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendConfigScepResult:
171
170
  """
172
171
  ## Example Usage
@@ -183,9 +182,9 @@ def get_backend_config_scep(backend: Optional[builtins.str] = None,
183
182
  ```
184
183
 
185
184
 
186
- :param builtins.str backend: The path to the PKI secret backend to
185
+ :param _builtins.str backend: The path to the PKI secret backend to
187
186
  read the SCEP configuration from, with no leading or trailing `/`s.
188
- :param builtins.str namespace: The namespace of the target resource.
187
+ :param _builtins.str namespace: The namespace of the target resource.
189
188
  The value should not contain leading or trailing forward slashes.
190
189
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
191
190
  *Available only for Vault Enterprise*.
@@ -208,8 +207,8 @@ def get_backend_config_scep(backend: Optional[builtins.str] = None,
208
207
  last_updated=pulumi.get(__ret__, 'last_updated'),
209
208
  namespace=pulumi.get(__ret__, 'namespace'),
210
209
  restrict_ca_chain_to_issuer=pulumi.get(__ret__, 'restrict_ca_chain_to_issuer'))
211
- def get_backend_config_scep_output(backend: Optional[pulumi.Input[builtins.str]] = None,
212
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
210
+ def get_backend_config_scep_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
211
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
213
212
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendConfigScepResult]:
214
213
  """
215
214
  ## Example Usage
@@ -226,9 +225,9 @@ def get_backend_config_scep_output(backend: Optional[pulumi.Input[builtins.str]]
226
225
  ```
227
226
 
228
227
 
229
- :param builtins.str backend: The path to the PKI secret backend to
228
+ :param _builtins.str backend: The path to the PKI secret backend to
230
229
  read the SCEP configuration from, with no leading or trailing `/`s.
231
- :param builtins.str namespace: The namespace of the target resource.
230
+ :param _builtins.str namespace: The namespace of the target resource.
232
231
  The value should not contain leading or trailing forward slashes.
233
232
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
234
233
  *Available only for Vault Enterprise*.