pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,16 +19,16 @@ __all__ = ['RgpPolicyArgs', 'RgpPolicy']
20
19
  @pulumi.input_type
21
20
  class RgpPolicyArgs:
22
21
  def __init__(__self__, *,
23
- enforcement_level: pulumi.Input[builtins.str],
24
- policy: pulumi.Input[builtins.str],
25
- name: Optional[pulumi.Input[builtins.str]] = None,
26
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ enforcement_level: pulumi.Input[_builtins.str],
23
+ policy: pulumi.Input[_builtins.str],
24
+ name: Optional[pulumi.Input[_builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
27
26
  """
28
27
  The set of arguments for constructing a RgpPolicy resource.
29
- :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
30
- :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
31
- :param pulumi.Input[builtins.str] name: The name of the policy
32
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
28
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
29
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
30
+ :param pulumi.Input[_builtins.str] name: The name of the policy
31
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
33
32
  The value should not contain leading or trailing forward slashes.
34
33
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
34
  *Available only for Vault Enterprise*.
@@ -41,45 +40,45 @@ class RgpPolicyArgs:
41
40
  if namespace is not None:
42
41
  pulumi.set(__self__, "namespace", namespace)
43
42
 
44
- @property
43
+ @_builtins.property
45
44
  @pulumi.getter(name="enforcementLevel")
46
- def enforcement_level(self) -> pulumi.Input[builtins.str]:
45
+ def enforcement_level(self) -> pulumi.Input[_builtins.str]:
47
46
  """
48
47
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
49
48
  """
50
49
  return pulumi.get(self, "enforcement_level")
51
50
 
52
51
  @enforcement_level.setter
53
- def enforcement_level(self, value: pulumi.Input[builtins.str]):
52
+ def enforcement_level(self, value: pulumi.Input[_builtins.str]):
54
53
  pulumi.set(self, "enforcement_level", value)
55
54
 
56
- @property
55
+ @_builtins.property
57
56
  @pulumi.getter
58
- def policy(self) -> pulumi.Input[builtins.str]:
57
+ def policy(self) -> pulumi.Input[_builtins.str]:
59
58
  """
60
59
  String containing a Sentinel policy
61
60
  """
62
61
  return pulumi.get(self, "policy")
63
62
 
64
63
  @policy.setter
65
- def policy(self, value: pulumi.Input[builtins.str]):
64
+ def policy(self, value: pulumi.Input[_builtins.str]):
66
65
  pulumi.set(self, "policy", value)
67
66
 
68
- @property
67
+ @_builtins.property
69
68
  @pulumi.getter
70
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
69
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
71
70
  """
72
71
  The name of the policy
73
72
  """
74
73
  return pulumi.get(self, "name")
75
74
 
76
75
  @name.setter
77
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
76
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
78
77
  pulumi.set(self, "name", value)
79
78
 
80
- @property
79
+ @_builtins.property
81
80
  @pulumi.getter
82
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
81
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
83
82
  """
84
83
  The namespace to provision the resource in.
85
84
  The value should not contain leading or trailing forward slashes.
@@ -89,26 +88,26 @@ class RgpPolicyArgs:
89
88
  return pulumi.get(self, "namespace")
90
89
 
91
90
  @namespace.setter
92
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
91
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
93
92
  pulumi.set(self, "namespace", value)
94
93
 
95
94
 
96
95
  @pulumi.input_type
97
96
  class _RgpPolicyState:
98
97
  def __init__(__self__, *,
99
- enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
100
- name: Optional[pulumi.Input[builtins.str]] = None,
101
- namespace: Optional[pulumi.Input[builtins.str]] = None,
102
- policy: Optional[pulumi.Input[builtins.str]] = None):
98
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
99
+ name: Optional[pulumi.Input[_builtins.str]] = None,
100
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
101
+ policy: Optional[pulumi.Input[_builtins.str]] = None):
103
102
  """
104
103
  Input properties used for looking up and filtering RgpPolicy resources.
105
- :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
106
- :param pulumi.Input[builtins.str] name: The name of the policy
107
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
104
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
105
+ :param pulumi.Input[_builtins.str] name: The name of the policy
106
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
108
107
  The value should not contain leading or trailing forward slashes.
109
108
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
110
109
  *Available only for Vault Enterprise*.
111
- :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
110
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
112
111
  """
113
112
  if enforcement_level is not None:
114
113
  pulumi.set(__self__, "enforcement_level", enforcement_level)
@@ -119,33 +118,33 @@ class _RgpPolicyState:
119
118
  if policy is not None:
120
119
  pulumi.set(__self__, "policy", policy)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter(name="enforcementLevel")
124
- def enforcement_level(self) -> Optional[pulumi.Input[builtins.str]]:
123
+ def enforcement_level(self) -> Optional[pulumi.Input[_builtins.str]]:
125
124
  """
126
125
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
127
126
  """
128
127
  return pulumi.get(self, "enforcement_level")
129
128
 
130
129
  @enforcement_level.setter
131
- def enforcement_level(self, value: Optional[pulumi.Input[builtins.str]]):
130
+ def enforcement_level(self, value: Optional[pulumi.Input[_builtins.str]]):
132
131
  pulumi.set(self, "enforcement_level", value)
133
132
 
134
- @property
133
+ @_builtins.property
135
134
  @pulumi.getter
136
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
135
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
137
136
  """
138
137
  The name of the policy
139
138
  """
140
139
  return pulumi.get(self, "name")
141
140
 
142
141
  @name.setter
143
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
142
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
144
143
  pulumi.set(self, "name", value)
145
144
 
146
- @property
145
+ @_builtins.property
147
146
  @pulumi.getter
148
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
147
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
149
148
  """
150
149
  The namespace to provision the resource in.
151
150
  The value should not contain leading or trailing forward slashes.
@@ -155,19 +154,19 @@ class _RgpPolicyState:
155
154
  return pulumi.get(self, "namespace")
156
155
 
157
156
  @namespace.setter
158
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
157
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
159
158
  pulumi.set(self, "namespace", value)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter
163
- def policy(self) -> Optional[pulumi.Input[builtins.str]]:
162
+ def policy(self) -> Optional[pulumi.Input[_builtins.str]]:
164
163
  """
165
164
  String containing a Sentinel policy
166
165
  """
167
166
  return pulumi.get(self, "policy")
168
167
 
169
168
  @policy.setter
170
- def policy(self, value: Optional[pulumi.Input[builtins.str]]):
169
+ def policy(self, value: Optional[pulumi.Input[_builtins.str]]):
171
170
  pulumi.set(self, "policy", value)
172
171
 
173
172
 
@@ -177,10 +176,10 @@ class RgpPolicy(pulumi.CustomResource):
177
176
  def __init__(__self__,
178
177
  resource_name: str,
179
178
  opts: Optional[pulumi.ResourceOptions] = None,
180
- enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
181
- name: Optional[pulumi.Input[builtins.str]] = None,
182
- namespace: Optional[pulumi.Input[builtins.str]] = None,
183
- policy: Optional[pulumi.Input[builtins.str]] = None,
179
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
180
+ name: Optional[pulumi.Input[_builtins.str]] = None,
181
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
182
+ policy: Optional[pulumi.Input[_builtins.str]] = None,
184
183
  __props__=None):
185
184
  """
186
185
  Provides a resource to manage Role Governing Policy (RGP) via [Sentinel](https://www.vaultproject.io/docs/enterprise/sentinel/index.html).
@@ -204,13 +203,13 @@ class RgpPolicy(pulumi.CustomResource):
204
203
 
205
204
  :param str resource_name: The name of the resource.
206
205
  :param pulumi.ResourceOptions opts: Options for the resource.
207
- :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
208
- :param pulumi.Input[builtins.str] name: The name of the policy
209
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
206
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
207
+ :param pulumi.Input[_builtins.str] name: The name of the policy
208
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
210
209
  The value should not contain leading or trailing forward slashes.
211
210
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
212
211
  *Available only for Vault Enterprise*.
213
- :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
212
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
214
213
  """
215
214
  ...
216
215
  @overload
@@ -253,10 +252,10 @@ class RgpPolicy(pulumi.CustomResource):
253
252
  def _internal_init(__self__,
254
253
  resource_name: str,
255
254
  opts: Optional[pulumi.ResourceOptions] = None,
256
- enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
257
- name: Optional[pulumi.Input[builtins.str]] = None,
258
- namespace: Optional[pulumi.Input[builtins.str]] = None,
259
- policy: Optional[pulumi.Input[builtins.str]] = None,
255
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
256
+ name: Optional[pulumi.Input[_builtins.str]] = None,
257
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
258
+ policy: Optional[pulumi.Input[_builtins.str]] = None,
260
259
  __props__=None):
261
260
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
262
261
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -284,10 +283,10 @@ class RgpPolicy(pulumi.CustomResource):
284
283
  def get(resource_name: str,
285
284
  id: pulumi.Input[str],
286
285
  opts: Optional[pulumi.ResourceOptions] = None,
287
- enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
288
- name: Optional[pulumi.Input[builtins.str]] = None,
289
- namespace: Optional[pulumi.Input[builtins.str]] = None,
290
- policy: Optional[pulumi.Input[builtins.str]] = None) -> 'RgpPolicy':
286
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
287
+ name: Optional[pulumi.Input[_builtins.str]] = None,
288
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
289
+ policy: Optional[pulumi.Input[_builtins.str]] = None) -> 'RgpPolicy':
291
290
  """
292
291
  Get an existing RgpPolicy resource's state with the given name, id, and optional extra
293
292
  properties used to qualify the lookup.
@@ -295,13 +294,13 @@ class RgpPolicy(pulumi.CustomResource):
295
294
  :param str resource_name: The unique name of the resulting resource.
296
295
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
297
296
  :param pulumi.ResourceOptions opts: Options for the resource.
298
- :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
299
- :param pulumi.Input[builtins.str] name: The name of the policy
300
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
297
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
298
+ :param pulumi.Input[_builtins.str] name: The name of the policy
299
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
301
300
  The value should not contain leading or trailing forward slashes.
302
301
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
303
302
  *Available only for Vault Enterprise*.
304
- :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
303
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
305
304
  """
306
305
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
307
306
 
@@ -313,25 +312,25 @@ class RgpPolicy(pulumi.CustomResource):
313
312
  __props__.__dict__["policy"] = policy
314
313
  return RgpPolicy(resource_name, opts=opts, __props__=__props__)
315
314
 
316
- @property
315
+ @_builtins.property
317
316
  @pulumi.getter(name="enforcementLevel")
318
- def enforcement_level(self) -> pulumi.Output[builtins.str]:
317
+ def enforcement_level(self) -> pulumi.Output[_builtins.str]:
319
318
  """
320
319
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
321
320
  """
322
321
  return pulumi.get(self, "enforcement_level")
323
322
 
324
- @property
323
+ @_builtins.property
325
324
  @pulumi.getter
326
- def name(self) -> pulumi.Output[builtins.str]:
325
+ def name(self) -> pulumi.Output[_builtins.str]:
327
326
  """
328
327
  The name of the policy
329
328
  """
330
329
  return pulumi.get(self, "name")
331
330
 
332
- @property
331
+ @_builtins.property
333
332
  @pulumi.getter
334
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
333
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
335
334
  """
336
335
  The namespace to provision the resource in.
337
336
  The value should not contain leading or trailing forward slashes.
@@ -340,9 +339,9 @@ class RgpPolicy(pulumi.CustomResource):
340
339
  """
341
340
  return pulumi.get(self, "namespace")
342
341
 
343
- @property
342
+ @_builtins.property
344
343
  @pulumi.getter
345
- def policy(self) -> pulumi.Output[builtins.str]:
344
+ def policy(self) -> pulumi.Output[_builtins.str]:
346
345
  """
347
346
  String containing a Sentinel policy
348
347
  """
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members: