pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
pulumi_vault/provider.py CHANGED
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -21,8 +20,8 @@ __all__ = ['ProviderArgs', 'Provider']
21
20
  @pulumi.input_type
22
21
  class ProviderArgs:
23
22
  def __init__(__self__, *,
24
- add_address_to_env: Optional[pulumi.Input[builtins.str]] = None,
25
- address: Optional[pulumi.Input[builtins.str]] = None,
23
+ add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
24
+ address: Optional[pulumi.Input[_builtins.str]] = None,
26
25
  auth_login: Optional[pulumi.Input['ProviderAuthLoginArgs']] = None,
27
26
  auth_login_aws: Optional[pulumi.Input['ProviderAuthLoginAwsArgs']] = None,
28
27
  auth_login_azure: Optional[pulumi.Input['ProviderAuthLoginAzureArgs']] = None,
@@ -35,25 +34,25 @@ class ProviderArgs:
35
34
  auth_login_radius: Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']] = None,
36
35
  auth_login_token_file: Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']] = None,
37
36
  auth_login_userpass: Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']] = None,
38
- ca_cert_dir: Optional[pulumi.Input[builtins.str]] = None,
39
- ca_cert_file: Optional[pulumi.Input[builtins.str]] = None,
37
+ ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
38
+ ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
40
39
  client_auth: Optional[pulumi.Input['ProviderClientAuthArgs']] = None,
41
40
  headers: Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]] = None,
42
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
43
- max_retries: Optional[pulumi.Input[builtins.int]] = None,
44
- max_retries_ccc: Optional[pulumi.Input[builtins.int]] = None,
45
- namespace: Optional[pulumi.Input[builtins.str]] = None,
46
- set_namespace_from_token: Optional[pulumi.Input[builtins.bool]] = None,
47
- skip_child_token: Optional[pulumi.Input[builtins.bool]] = None,
48
- skip_get_vault_version: Optional[pulumi.Input[builtins.bool]] = None,
49
- skip_tls_verify: Optional[pulumi.Input[builtins.bool]] = None,
50
- tls_server_name: Optional[pulumi.Input[builtins.str]] = None,
51
- token: Optional[pulumi.Input[builtins.str]] = None,
52
- token_name: Optional[pulumi.Input[builtins.str]] = None,
53
- vault_version_override: Optional[pulumi.Input[builtins.str]] = None):
41
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
42
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
43
+ max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
44
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
45
+ set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
46
+ skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
47
+ skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
48
+ skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
49
+ tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
50
+ token: Optional[pulumi.Input[_builtins.str]] = None,
51
+ token_name: Optional[pulumi.Input[_builtins.str]] = None,
52
+ vault_version_override: Optional[pulumi.Input[_builtins.str]] = None):
54
53
  """
55
54
  The set of arguments for constructing a Provider resource.
56
- :param pulumi.Input[builtins.str] address: URL of the root of the target Vault server.
55
+ :param pulumi.Input[_builtins.str] address: URL of the root of the target Vault server.
57
56
  :param pulumi.Input['ProviderAuthLoginArgs'] auth_login: Login to vault with an existing auth method using auth/<mount>/login
58
57
  :param pulumi.Input['ProviderAuthLoginAwsArgs'] auth_login_aws: Login to vault using the AWS method
59
58
  :param pulumi.Input['ProviderAuthLoginAzureArgs'] auth_login_azure: Login to vault using the azure method
@@ -66,23 +65,23 @@ class ProviderArgs:
66
65
  :param pulumi.Input['ProviderAuthLoginRadiusArgs'] auth_login_radius: Login to vault using the radius method
67
66
  :param pulumi.Input['ProviderAuthLoginTokenFileArgs'] auth_login_token_file: Login to vault using
68
67
  :param pulumi.Input['ProviderAuthLoginUserpassArgs'] auth_login_userpass: Login to vault using the userpass method
69
- :param pulumi.Input[builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
70
- :param pulumi.Input[builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
68
+ :param pulumi.Input[_builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
69
+ :param pulumi.Input[_builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
71
70
  :param pulumi.Input['ProviderClientAuthArgs'] client_auth: Client authentication credentials.
72
71
  :param pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]] headers: The headers to send with each Vault request.
73
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
74
- :param pulumi.Input[builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
75
- :param pulumi.Input[builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
76
- :param pulumi.Input[builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
77
- :param pulumi.Input[builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
72
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
73
+ :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
74
+ :param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
75
+ :param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
76
+ :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
78
77
  token namespace as the root namespace for all resources.
79
- :param pulumi.Input[builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
80
- :param pulumi.Input[builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
81
- :param pulumi.Input[builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
82
- :param pulumi.Input[builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
83
- :param pulumi.Input[builtins.str] token: Token to use to authenticate to Vault.
84
- :param pulumi.Input[builtins.str] token_name: Token name to use for creating the Vault child token.
85
- :param pulumi.Input[builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
78
+ :param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
79
+ :param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
80
+ :param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
81
+ :param pulumi.Input[_builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
82
+ :param pulumi.Input[_builtins.str] token: Token to use to authenticate to Vault.
83
+ :param pulumi.Input[_builtins.str] token_name: Token name to use for creating the Vault child token.
84
+ :param pulumi.Input[_builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
86
85
  """
87
86
  if add_address_to_env is not None:
88
87
  pulumi.set(__self__, "add_address_to_env", add_address_to_env)
@@ -151,28 +150,28 @@ class ProviderArgs:
151
150
  if vault_version_override is not None:
152
151
  pulumi.set(__self__, "vault_version_override", vault_version_override)
153
152
 
154
- @property
153
+ @_builtins.property
155
154
  @pulumi.getter(name="addAddressToEnv")
156
- def add_address_to_env(self) -> Optional[pulumi.Input[builtins.str]]:
155
+ def add_address_to_env(self) -> Optional[pulumi.Input[_builtins.str]]:
157
156
  return pulumi.get(self, "add_address_to_env")
158
157
 
159
158
  @add_address_to_env.setter
160
- def add_address_to_env(self, value: Optional[pulumi.Input[builtins.str]]):
159
+ def add_address_to_env(self, value: Optional[pulumi.Input[_builtins.str]]):
161
160
  pulumi.set(self, "add_address_to_env", value)
162
161
 
163
- @property
162
+ @_builtins.property
164
163
  @pulumi.getter
165
- def address(self) -> Optional[pulumi.Input[builtins.str]]:
164
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
166
165
  """
167
166
  URL of the root of the target Vault server.
168
167
  """
169
168
  return pulumi.get(self, "address")
170
169
 
171
170
  @address.setter
172
- def address(self, value: Optional[pulumi.Input[builtins.str]]):
171
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
173
172
  pulumi.set(self, "address", value)
174
173
 
175
- @property
174
+ @_builtins.property
176
175
  @pulumi.getter(name="authLogin")
177
176
  def auth_login(self) -> Optional[pulumi.Input['ProviderAuthLoginArgs']]:
178
177
  """
@@ -184,7 +183,7 @@ class ProviderArgs:
184
183
  def auth_login(self, value: Optional[pulumi.Input['ProviderAuthLoginArgs']]):
185
184
  pulumi.set(self, "auth_login", value)
186
185
 
187
- @property
186
+ @_builtins.property
188
187
  @pulumi.getter(name="authLoginAws")
189
188
  def auth_login_aws(self) -> Optional[pulumi.Input['ProviderAuthLoginAwsArgs']]:
190
189
  """
@@ -196,7 +195,7 @@ class ProviderArgs:
196
195
  def auth_login_aws(self, value: Optional[pulumi.Input['ProviderAuthLoginAwsArgs']]):
197
196
  pulumi.set(self, "auth_login_aws", value)
198
197
 
199
- @property
198
+ @_builtins.property
200
199
  @pulumi.getter(name="authLoginAzure")
201
200
  def auth_login_azure(self) -> Optional[pulumi.Input['ProviderAuthLoginAzureArgs']]:
202
201
  """
@@ -208,7 +207,7 @@ class ProviderArgs:
208
207
  def auth_login_azure(self, value: Optional[pulumi.Input['ProviderAuthLoginAzureArgs']]):
209
208
  pulumi.set(self, "auth_login_azure", value)
210
209
 
211
- @property
210
+ @_builtins.property
212
211
  @pulumi.getter(name="authLoginCert")
213
212
  def auth_login_cert(self) -> Optional[pulumi.Input['ProviderAuthLoginCertArgs']]:
214
213
  """
@@ -220,7 +219,7 @@ class ProviderArgs:
220
219
  def auth_login_cert(self, value: Optional[pulumi.Input['ProviderAuthLoginCertArgs']]):
221
220
  pulumi.set(self, "auth_login_cert", value)
222
221
 
223
- @property
222
+ @_builtins.property
224
223
  @pulumi.getter(name="authLoginGcp")
225
224
  def auth_login_gcp(self) -> Optional[pulumi.Input['ProviderAuthLoginGcpArgs']]:
226
225
  """
@@ -232,7 +231,7 @@ class ProviderArgs:
232
231
  def auth_login_gcp(self, value: Optional[pulumi.Input['ProviderAuthLoginGcpArgs']]):
233
232
  pulumi.set(self, "auth_login_gcp", value)
234
233
 
235
- @property
234
+ @_builtins.property
236
235
  @pulumi.getter(name="authLoginJwt")
237
236
  def auth_login_jwt(self) -> Optional[pulumi.Input['ProviderAuthLoginJwtArgs']]:
238
237
  """
@@ -244,7 +243,7 @@ class ProviderArgs:
244
243
  def auth_login_jwt(self, value: Optional[pulumi.Input['ProviderAuthLoginJwtArgs']]):
245
244
  pulumi.set(self, "auth_login_jwt", value)
246
245
 
247
- @property
246
+ @_builtins.property
248
247
  @pulumi.getter(name="authLoginKerberos")
249
248
  def auth_login_kerberos(self) -> Optional[pulumi.Input['ProviderAuthLoginKerberosArgs']]:
250
249
  """
@@ -256,7 +255,7 @@ class ProviderArgs:
256
255
  def auth_login_kerberos(self, value: Optional[pulumi.Input['ProviderAuthLoginKerberosArgs']]):
257
256
  pulumi.set(self, "auth_login_kerberos", value)
258
257
 
259
- @property
258
+ @_builtins.property
260
259
  @pulumi.getter(name="authLoginOci")
261
260
  def auth_login_oci(self) -> Optional[pulumi.Input['ProviderAuthLoginOciArgs']]:
262
261
  """
@@ -268,7 +267,7 @@ class ProviderArgs:
268
267
  def auth_login_oci(self, value: Optional[pulumi.Input['ProviderAuthLoginOciArgs']]):
269
268
  pulumi.set(self, "auth_login_oci", value)
270
269
 
271
- @property
270
+ @_builtins.property
272
271
  @pulumi.getter(name="authLoginOidc")
273
272
  def auth_login_oidc(self) -> Optional[pulumi.Input['ProviderAuthLoginOidcArgs']]:
274
273
  """
@@ -280,7 +279,7 @@ class ProviderArgs:
280
279
  def auth_login_oidc(self, value: Optional[pulumi.Input['ProviderAuthLoginOidcArgs']]):
281
280
  pulumi.set(self, "auth_login_oidc", value)
282
281
 
283
- @property
282
+ @_builtins.property
284
283
  @pulumi.getter(name="authLoginRadius")
285
284
  def auth_login_radius(self) -> Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']]:
286
285
  """
@@ -292,7 +291,7 @@ class ProviderArgs:
292
291
  def auth_login_radius(self, value: Optional[pulumi.Input['ProviderAuthLoginRadiusArgs']]):
293
292
  pulumi.set(self, "auth_login_radius", value)
294
293
 
295
- @property
294
+ @_builtins.property
296
295
  @pulumi.getter(name="authLoginTokenFile")
297
296
  def auth_login_token_file(self) -> Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']]:
298
297
  """
@@ -304,7 +303,7 @@ class ProviderArgs:
304
303
  def auth_login_token_file(self, value: Optional[pulumi.Input['ProviderAuthLoginTokenFileArgs']]):
305
304
  pulumi.set(self, "auth_login_token_file", value)
306
305
 
307
- @property
306
+ @_builtins.property
308
307
  @pulumi.getter(name="authLoginUserpass")
309
308
  def auth_login_userpass(self) -> Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']]:
310
309
  """
@@ -316,31 +315,31 @@ class ProviderArgs:
316
315
  def auth_login_userpass(self, value: Optional[pulumi.Input['ProviderAuthLoginUserpassArgs']]):
317
316
  pulumi.set(self, "auth_login_userpass", value)
318
317
 
319
- @property
318
+ @_builtins.property
320
319
  @pulumi.getter(name="caCertDir")
321
- def ca_cert_dir(self) -> Optional[pulumi.Input[builtins.str]]:
320
+ def ca_cert_dir(self) -> Optional[pulumi.Input[_builtins.str]]:
322
321
  """
323
322
  Path to directory containing CA certificate files to validate the server's certificate.
324
323
  """
325
324
  return pulumi.get(self, "ca_cert_dir")
326
325
 
327
326
  @ca_cert_dir.setter
328
- def ca_cert_dir(self, value: Optional[pulumi.Input[builtins.str]]):
327
+ def ca_cert_dir(self, value: Optional[pulumi.Input[_builtins.str]]):
329
328
  pulumi.set(self, "ca_cert_dir", value)
330
329
 
331
- @property
330
+ @_builtins.property
332
331
  @pulumi.getter(name="caCertFile")
333
- def ca_cert_file(self) -> Optional[pulumi.Input[builtins.str]]:
332
+ def ca_cert_file(self) -> Optional[pulumi.Input[_builtins.str]]:
334
333
  """
335
334
  Path to a CA certificate file to validate the server's certificate.
336
335
  """
337
336
  return pulumi.get(self, "ca_cert_file")
338
337
 
339
338
  @ca_cert_file.setter
340
- def ca_cert_file(self, value: Optional[pulumi.Input[builtins.str]]):
339
+ def ca_cert_file(self, value: Optional[pulumi.Input[_builtins.str]]):
341
340
  pulumi.set(self, "ca_cert_file", value)
342
341
 
343
- @property
342
+ @_builtins.property
344
343
  @pulumi.getter(name="clientAuth")
345
344
  def client_auth(self) -> Optional[pulumi.Input['ProviderClientAuthArgs']]:
346
345
  """
@@ -352,7 +351,7 @@ class ProviderArgs:
352
351
  def client_auth(self, value: Optional[pulumi.Input['ProviderClientAuthArgs']]):
353
352
  pulumi.set(self, "client_auth", value)
354
353
 
355
- @property
354
+ @_builtins.property
356
355
  @pulumi.getter
357
356
  def headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]]:
358
357
  """
@@ -364,57 +363,57 @@ class ProviderArgs:
364
363
  def headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['ProviderHeaderArgs']]]]):
365
364
  pulumi.set(self, "headers", value)
366
365
 
367
- @property
366
+ @_builtins.property
368
367
  @pulumi.getter(name="maxLeaseTtlSeconds")
369
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
368
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
370
369
  """
371
370
  Maximum TTL for secret leases requested by this provider.
372
371
  """
373
372
  return pulumi.get(self, "max_lease_ttl_seconds")
374
373
 
375
374
  @max_lease_ttl_seconds.setter
376
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
375
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
377
376
  pulumi.set(self, "max_lease_ttl_seconds", value)
378
377
 
379
- @property
378
+ @_builtins.property
380
379
  @pulumi.getter(name="maxRetries")
381
- def max_retries(self) -> Optional[pulumi.Input[builtins.int]]:
380
+ def max_retries(self) -> Optional[pulumi.Input[_builtins.int]]:
382
381
  """
383
382
  Maximum number of retries when a 5xx error code is encountered.
384
383
  """
385
384
  return pulumi.get(self, "max_retries")
386
385
 
387
386
  @max_retries.setter
388
- def max_retries(self, value: Optional[pulumi.Input[builtins.int]]):
387
+ def max_retries(self, value: Optional[pulumi.Input[_builtins.int]]):
389
388
  pulumi.set(self, "max_retries", value)
390
389
 
391
- @property
390
+ @_builtins.property
392
391
  @pulumi.getter(name="maxRetriesCcc")
393
- def max_retries_ccc(self) -> Optional[pulumi.Input[builtins.int]]:
392
+ def max_retries_ccc(self) -> Optional[pulumi.Input[_builtins.int]]:
394
393
  """
395
394
  Maximum number of retries for Client Controlled Consistency related operations
396
395
  """
397
396
  return pulumi.get(self, "max_retries_ccc")
398
397
 
399
398
  @max_retries_ccc.setter
400
- def max_retries_ccc(self, value: Optional[pulumi.Input[builtins.int]]):
399
+ def max_retries_ccc(self, value: Optional[pulumi.Input[_builtins.int]]):
401
400
  pulumi.set(self, "max_retries_ccc", value)
402
401
 
403
- @property
402
+ @_builtins.property
404
403
  @pulumi.getter
405
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
404
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
406
405
  """
407
406
  The namespace to use. Available only for Vault Enterprise.
408
407
  """
409
408
  return pulumi.get(self, "namespace")
410
409
 
411
410
  @namespace.setter
412
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
411
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
413
412
  pulumi.set(self, "namespace", value)
414
413
 
415
- @property
414
+ @_builtins.property
416
415
  @pulumi.getter(name="setNamespaceFromToken")
417
- def set_namespace_from_token(self) -> Optional[pulumi.Input[builtins.bool]]:
416
+ def set_namespace_from_token(self) -> Optional[pulumi.Input[_builtins.bool]]:
418
417
  """
419
418
  In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
420
419
  token namespace as the root namespace for all resources.
@@ -422,91 +421,91 @@ class ProviderArgs:
422
421
  return pulumi.get(self, "set_namespace_from_token")
423
422
 
424
423
  @set_namespace_from_token.setter
425
- def set_namespace_from_token(self, value: Optional[pulumi.Input[builtins.bool]]):
424
+ def set_namespace_from_token(self, value: Optional[pulumi.Input[_builtins.bool]]):
426
425
  pulumi.set(self, "set_namespace_from_token", value)
427
426
 
428
- @property
427
+ @_builtins.property
429
428
  @pulumi.getter(name="skipChildToken")
430
- def skip_child_token(self) -> Optional[pulumi.Input[builtins.bool]]:
429
+ def skip_child_token(self) -> Optional[pulumi.Input[_builtins.bool]]:
431
430
  """
432
431
  Set this to true to prevent the creation of ephemeral child token used by this provider.
433
432
  """
434
433
  return pulumi.get(self, "skip_child_token")
435
434
 
436
435
  @skip_child_token.setter
437
- def skip_child_token(self, value: Optional[pulumi.Input[builtins.bool]]):
436
+ def skip_child_token(self, value: Optional[pulumi.Input[_builtins.bool]]):
438
437
  pulumi.set(self, "skip_child_token", value)
439
438
 
440
- @property
439
+ @_builtins.property
441
440
  @pulumi.getter(name="skipGetVaultVersion")
442
- def skip_get_vault_version(self) -> Optional[pulumi.Input[builtins.bool]]:
441
+ def skip_get_vault_version(self) -> Optional[pulumi.Input[_builtins.bool]]:
443
442
  """
444
443
  Skip the dynamic fetching of the Vault server version.
445
444
  """
446
445
  return pulumi.get(self, "skip_get_vault_version")
447
446
 
448
447
  @skip_get_vault_version.setter
449
- def skip_get_vault_version(self, value: Optional[pulumi.Input[builtins.bool]]):
448
+ def skip_get_vault_version(self, value: Optional[pulumi.Input[_builtins.bool]]):
450
449
  pulumi.set(self, "skip_get_vault_version", value)
451
450
 
452
- @property
451
+ @_builtins.property
453
452
  @pulumi.getter(name="skipTlsVerify")
454
- def skip_tls_verify(self) -> Optional[pulumi.Input[builtins.bool]]:
453
+ def skip_tls_verify(self) -> Optional[pulumi.Input[_builtins.bool]]:
455
454
  """
456
455
  Set this to true only if the target Vault server is an insecure development instance.
457
456
  """
458
457
  return pulumi.get(self, "skip_tls_verify")
459
458
 
460
459
  @skip_tls_verify.setter
461
- def skip_tls_verify(self, value: Optional[pulumi.Input[builtins.bool]]):
460
+ def skip_tls_verify(self, value: Optional[pulumi.Input[_builtins.bool]]):
462
461
  pulumi.set(self, "skip_tls_verify", value)
463
462
 
464
- @property
463
+ @_builtins.property
465
464
  @pulumi.getter(name="tlsServerName")
466
- def tls_server_name(self) -> Optional[pulumi.Input[builtins.str]]:
465
+ def tls_server_name(self) -> Optional[pulumi.Input[_builtins.str]]:
467
466
  """
468
467
  Name to use as the SNI host when connecting via TLS.
469
468
  """
470
469
  return pulumi.get(self, "tls_server_name")
471
470
 
472
471
  @tls_server_name.setter
473
- def tls_server_name(self, value: Optional[pulumi.Input[builtins.str]]):
472
+ def tls_server_name(self, value: Optional[pulumi.Input[_builtins.str]]):
474
473
  pulumi.set(self, "tls_server_name", value)
475
474
 
476
- @property
475
+ @_builtins.property
477
476
  @pulumi.getter
478
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
477
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
479
478
  """
480
479
  Token to use to authenticate to Vault.
481
480
  """
482
481
  return pulumi.get(self, "token")
483
482
 
484
483
  @token.setter
485
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
484
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
486
485
  pulumi.set(self, "token", value)
487
486
 
488
- @property
487
+ @_builtins.property
489
488
  @pulumi.getter(name="tokenName")
490
- def token_name(self) -> Optional[pulumi.Input[builtins.str]]:
489
+ def token_name(self) -> Optional[pulumi.Input[_builtins.str]]:
491
490
  """
492
491
  Token name to use for creating the Vault child token.
493
492
  """
494
493
  return pulumi.get(self, "token_name")
495
494
 
496
495
  @token_name.setter
497
- def token_name(self, value: Optional[pulumi.Input[builtins.str]]):
496
+ def token_name(self, value: Optional[pulumi.Input[_builtins.str]]):
498
497
  pulumi.set(self, "token_name", value)
499
498
 
500
- @property
499
+ @_builtins.property
501
500
  @pulumi.getter(name="vaultVersionOverride")
502
- def vault_version_override(self) -> Optional[pulumi.Input[builtins.str]]:
501
+ def vault_version_override(self) -> Optional[pulumi.Input[_builtins.str]]:
503
502
  """
504
503
  Override the Vault server version, which is normally determined dynamically from the target Vault server
505
504
  """
506
505
  return pulumi.get(self, "vault_version_override")
507
506
 
508
507
  @vault_version_override.setter
509
- def vault_version_override(self, value: Optional[pulumi.Input[builtins.str]]):
508
+ def vault_version_override(self, value: Optional[pulumi.Input[_builtins.str]]):
510
509
  pulumi.set(self, "vault_version_override", value)
511
510
 
512
511
 
@@ -516,8 +515,8 @@ class Provider(pulumi.ProviderResource):
516
515
  def __init__(__self__,
517
516
  resource_name: str,
518
517
  opts: Optional[pulumi.ResourceOptions] = None,
519
- add_address_to_env: Optional[pulumi.Input[builtins.str]] = None,
520
- address: Optional[pulumi.Input[builtins.str]] = None,
518
+ add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
519
+ address: Optional[pulumi.Input[_builtins.str]] = None,
521
520
  auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
522
521
  auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
523
522
  auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
@@ -530,22 +529,22 @@ class Provider(pulumi.ProviderResource):
530
529
  auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
531
530
  auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
532
531
  auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
533
- ca_cert_dir: Optional[pulumi.Input[builtins.str]] = None,
534
- ca_cert_file: Optional[pulumi.Input[builtins.str]] = None,
532
+ ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
533
+ ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
535
534
  client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
536
535
  headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
537
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
538
- max_retries: Optional[pulumi.Input[builtins.int]] = None,
539
- max_retries_ccc: Optional[pulumi.Input[builtins.int]] = None,
540
- namespace: Optional[pulumi.Input[builtins.str]] = None,
541
- set_namespace_from_token: Optional[pulumi.Input[builtins.bool]] = None,
542
- skip_child_token: Optional[pulumi.Input[builtins.bool]] = None,
543
- skip_get_vault_version: Optional[pulumi.Input[builtins.bool]] = None,
544
- skip_tls_verify: Optional[pulumi.Input[builtins.bool]] = None,
545
- tls_server_name: Optional[pulumi.Input[builtins.str]] = None,
546
- token: Optional[pulumi.Input[builtins.str]] = None,
547
- token_name: Optional[pulumi.Input[builtins.str]] = None,
548
- vault_version_override: Optional[pulumi.Input[builtins.str]] = None,
536
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
537
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
538
+ max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
539
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
540
+ set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
541
+ skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
542
+ skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
543
+ skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
544
+ tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
545
+ token: Optional[pulumi.Input[_builtins.str]] = None,
546
+ token_name: Optional[pulumi.Input[_builtins.str]] = None,
547
+ vault_version_override: Optional[pulumi.Input[_builtins.str]] = None,
549
548
  __props__=None):
550
549
  """
551
550
  The provider type for the vault package. By default, resources use package-wide configuration
@@ -555,7 +554,7 @@ class Provider(pulumi.ProviderResource):
555
554
 
556
555
  :param str resource_name: The name of the resource.
557
556
  :param pulumi.ResourceOptions opts: Options for the resource.
558
- :param pulumi.Input[builtins.str] address: URL of the root of the target Vault server.
557
+ :param pulumi.Input[_builtins.str] address: URL of the root of the target Vault server.
559
558
  :param pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']] auth_login: Login to vault with an existing auth method using auth/<mount>/login
560
559
  :param pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']] auth_login_aws: Login to vault using the AWS method
561
560
  :param pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']] auth_login_azure: Login to vault using the azure method
@@ -568,23 +567,23 @@ class Provider(pulumi.ProviderResource):
568
567
  :param pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']] auth_login_radius: Login to vault using the radius method
569
568
  :param pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']] auth_login_token_file: Login to vault using
570
569
  :param pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']] auth_login_userpass: Login to vault using the userpass method
571
- :param pulumi.Input[builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
572
- :param pulumi.Input[builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
570
+ :param pulumi.Input[_builtins.str] ca_cert_dir: Path to directory containing CA certificate files to validate the server's certificate.
571
+ :param pulumi.Input[_builtins.str] ca_cert_file: Path to a CA certificate file to validate the server's certificate.
573
572
  :param pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']] client_auth: Client authentication credentials.
574
573
  :param pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]] headers: The headers to send with each Vault request.
575
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
576
- :param pulumi.Input[builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
577
- :param pulumi.Input[builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
578
- :param pulumi.Input[builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
579
- :param pulumi.Input[builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
574
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum TTL for secret leases requested by this provider.
575
+ :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries when a 5xx error code is encountered.
576
+ :param pulumi.Input[_builtins.int] max_retries_ccc: Maximum number of retries for Client Controlled Consistency related operations
577
+ :param pulumi.Input[_builtins.str] namespace: The namespace to use. Available only for Vault Enterprise.
578
+ :param pulumi.Input[_builtins.bool] set_namespace_from_token: In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the
580
579
  token namespace as the root namespace for all resources.
581
- :param pulumi.Input[builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
582
- :param pulumi.Input[builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
583
- :param pulumi.Input[builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
584
- :param pulumi.Input[builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
585
- :param pulumi.Input[builtins.str] token: Token to use to authenticate to Vault.
586
- :param pulumi.Input[builtins.str] token_name: Token name to use for creating the Vault child token.
587
- :param pulumi.Input[builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
580
+ :param pulumi.Input[_builtins.bool] skip_child_token: Set this to true to prevent the creation of ephemeral child token used by this provider.
581
+ :param pulumi.Input[_builtins.bool] skip_get_vault_version: Skip the dynamic fetching of the Vault server version.
582
+ :param pulumi.Input[_builtins.bool] skip_tls_verify: Set this to true only if the target Vault server is an insecure development instance.
583
+ :param pulumi.Input[_builtins.str] tls_server_name: Name to use as the SNI host when connecting via TLS.
584
+ :param pulumi.Input[_builtins.str] token: Token to use to authenticate to Vault.
585
+ :param pulumi.Input[_builtins.str] token_name: Token name to use for creating the Vault child token.
586
+ :param pulumi.Input[_builtins.str] vault_version_override: Override the Vault server version, which is normally determined dynamically from the target Vault server
588
587
  """
589
588
  ...
590
589
  @overload
@@ -613,8 +612,8 @@ class Provider(pulumi.ProviderResource):
613
612
  def _internal_init(__self__,
614
613
  resource_name: str,
615
614
  opts: Optional[pulumi.ResourceOptions] = None,
616
- add_address_to_env: Optional[pulumi.Input[builtins.str]] = None,
617
- address: Optional[pulumi.Input[builtins.str]] = None,
615
+ add_address_to_env: Optional[pulumi.Input[_builtins.str]] = None,
616
+ address: Optional[pulumi.Input[_builtins.str]] = None,
618
617
  auth_login: Optional[pulumi.Input[Union['ProviderAuthLoginArgs', 'ProviderAuthLoginArgsDict']]] = None,
619
618
  auth_login_aws: Optional[pulumi.Input[Union['ProviderAuthLoginAwsArgs', 'ProviderAuthLoginAwsArgsDict']]] = None,
620
619
  auth_login_azure: Optional[pulumi.Input[Union['ProviderAuthLoginAzureArgs', 'ProviderAuthLoginAzureArgsDict']]] = None,
@@ -627,22 +626,22 @@ class Provider(pulumi.ProviderResource):
627
626
  auth_login_radius: Optional[pulumi.Input[Union['ProviderAuthLoginRadiusArgs', 'ProviderAuthLoginRadiusArgsDict']]] = None,
628
627
  auth_login_token_file: Optional[pulumi.Input[Union['ProviderAuthLoginTokenFileArgs', 'ProviderAuthLoginTokenFileArgsDict']]] = None,
629
628
  auth_login_userpass: Optional[pulumi.Input[Union['ProviderAuthLoginUserpassArgs', 'ProviderAuthLoginUserpassArgsDict']]] = None,
630
- ca_cert_dir: Optional[pulumi.Input[builtins.str]] = None,
631
- ca_cert_file: Optional[pulumi.Input[builtins.str]] = None,
629
+ ca_cert_dir: Optional[pulumi.Input[_builtins.str]] = None,
630
+ ca_cert_file: Optional[pulumi.Input[_builtins.str]] = None,
632
631
  client_auth: Optional[pulumi.Input[Union['ProviderClientAuthArgs', 'ProviderClientAuthArgsDict']]] = None,
633
632
  headers: Optional[pulumi.Input[Sequence[pulumi.Input[Union['ProviderHeaderArgs', 'ProviderHeaderArgsDict']]]]] = None,
634
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
635
- max_retries: Optional[pulumi.Input[builtins.int]] = None,
636
- max_retries_ccc: Optional[pulumi.Input[builtins.int]] = None,
637
- namespace: Optional[pulumi.Input[builtins.str]] = None,
638
- set_namespace_from_token: Optional[pulumi.Input[builtins.bool]] = None,
639
- skip_child_token: Optional[pulumi.Input[builtins.bool]] = None,
640
- skip_get_vault_version: Optional[pulumi.Input[builtins.bool]] = None,
641
- skip_tls_verify: Optional[pulumi.Input[builtins.bool]] = None,
642
- tls_server_name: Optional[pulumi.Input[builtins.str]] = None,
643
- token: Optional[pulumi.Input[builtins.str]] = None,
644
- token_name: Optional[pulumi.Input[builtins.str]] = None,
645
- vault_version_override: Optional[pulumi.Input[builtins.str]] = None,
633
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
634
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
635
+ max_retries_ccc: Optional[pulumi.Input[_builtins.int]] = None,
636
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
637
+ set_namespace_from_token: Optional[pulumi.Input[_builtins.bool]] = None,
638
+ skip_child_token: Optional[pulumi.Input[_builtins.bool]] = None,
639
+ skip_get_vault_version: Optional[pulumi.Input[_builtins.bool]] = None,
640
+ skip_tls_verify: Optional[pulumi.Input[_builtins.bool]] = None,
641
+ tls_server_name: Optional[pulumi.Input[_builtins.str]] = None,
642
+ token: Optional[pulumi.Input[_builtins.str]] = None,
643
+ token_name: Optional[pulumi.Input[_builtins.str]] = None,
644
+ vault_version_override: Optional[pulumi.Input[_builtins.str]] = None,
646
645
  __props__=None):
647
646
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
648
647
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -694,70 +693,70 @@ class Provider(pulumi.ProviderResource):
694
693
  __props__,
695
694
  opts)
696
695
 
697
- @property
696
+ @_builtins.property
698
697
  @pulumi.getter(name="addAddressToEnv")
699
- def add_address_to_env(self) -> pulumi.Output[Optional[builtins.str]]:
698
+ def add_address_to_env(self) -> pulumi.Output[Optional[_builtins.str]]:
700
699
  return pulumi.get(self, "add_address_to_env")
701
700
 
702
- @property
701
+ @_builtins.property
703
702
  @pulumi.getter
704
- def address(self) -> pulumi.Output[Optional[builtins.str]]:
703
+ def address(self) -> pulumi.Output[Optional[_builtins.str]]:
705
704
  """
706
705
  URL of the root of the target Vault server.
707
706
  """
708
707
  return pulumi.get(self, "address")
709
708
 
710
- @property
709
+ @_builtins.property
711
710
  @pulumi.getter(name="caCertDir")
712
- def ca_cert_dir(self) -> pulumi.Output[Optional[builtins.str]]:
711
+ def ca_cert_dir(self) -> pulumi.Output[Optional[_builtins.str]]:
713
712
  """
714
713
  Path to directory containing CA certificate files to validate the server's certificate.
715
714
  """
716
715
  return pulumi.get(self, "ca_cert_dir")
717
716
 
718
- @property
717
+ @_builtins.property
719
718
  @pulumi.getter(name="caCertFile")
720
- def ca_cert_file(self) -> pulumi.Output[Optional[builtins.str]]:
719
+ def ca_cert_file(self) -> pulumi.Output[Optional[_builtins.str]]:
721
720
  """
722
721
  Path to a CA certificate file to validate the server's certificate.
723
722
  """
724
723
  return pulumi.get(self, "ca_cert_file")
725
724
 
726
- @property
725
+ @_builtins.property
727
726
  @pulumi.getter
728
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
727
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
729
728
  """
730
729
  The namespace to use. Available only for Vault Enterprise.
731
730
  """
732
731
  return pulumi.get(self, "namespace")
733
732
 
734
- @property
733
+ @_builtins.property
735
734
  @pulumi.getter(name="tlsServerName")
736
- def tls_server_name(self) -> pulumi.Output[Optional[builtins.str]]:
735
+ def tls_server_name(self) -> pulumi.Output[Optional[_builtins.str]]:
737
736
  """
738
737
  Name to use as the SNI host when connecting via TLS.
739
738
  """
740
739
  return pulumi.get(self, "tls_server_name")
741
740
 
742
- @property
741
+ @_builtins.property
743
742
  @pulumi.getter
744
- def token(self) -> pulumi.Output[Optional[builtins.str]]:
743
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
745
744
  """
746
745
  Token to use to authenticate to Vault.
747
746
  """
748
747
  return pulumi.get(self, "token")
749
748
 
750
- @property
749
+ @_builtins.property
751
750
  @pulumi.getter(name="tokenName")
752
- def token_name(self) -> pulumi.Output[Optional[builtins.str]]:
751
+ def token_name(self) -> pulumi.Output[Optional[_builtins.str]]:
753
752
  """
754
753
  Token name to use for creating the Vault child token.
755
754
  """
756
755
  return pulumi.get(self, "token_name")
757
756
 
758
- @property
757
+ @_builtins.property
759
758
  @pulumi.getter(name="vaultVersionOverride")
760
- def vault_version_override(self) -> pulumi.Output[Optional[builtins.str]]:
759
+ def vault_version_override(self) -> pulumi.Output[Optional[_builtins.str]]:
761
760
  """
762
761
  Override the Vault server version, which is normally determined dynamically from the target Vault server
763
762
  """
@@ -770,7 +769,7 @@ class Provider(pulumi.ProviderResource):
770
769
  raise TypeError("Expected argument 'result' to be a dict")
771
770
  pulumi.set(__self__, "result", result)
772
771
 
773
- @property
772
+ @_builtins.property
774
773
  @pulumi.getter
775
774
  def result(self) -> Mapping[str, Any]:
776
775
  return pulumi.get(self, "result")