pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,20 +19,20 @@ __all__ = ['AuthBackendStsRoleArgs', 'AuthBackendStsRole']
20
19
  @pulumi.input_type
21
20
  class AuthBackendStsRoleArgs:
22
21
  def __init__(__self__, *,
23
- account_id: pulumi.Input[builtins.str],
24
- sts_role: pulumi.Input[builtins.str],
25
- backend: Optional[pulumi.Input[builtins.str]] = None,
26
- external_id: Optional[pulumi.Input[builtins.str]] = None,
27
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ account_id: pulumi.Input[_builtins.str],
23
+ sts_role: pulumi.Input[_builtins.str],
24
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
25
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
28
27
  """
29
28
  The set of arguments for constructing a AuthBackendStsRole resource.
30
- :param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
31
- :param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
29
+ :param pulumi.Input[_builtins.str] account_id: The AWS account ID to configure the STS role for.
30
+ :param pulumi.Input[_builtins.str] sts_role: The STS role to assume when verifying requests made
32
31
  by EC2 instances in the account specified by `account_id`.
33
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
32
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
34
33
  mounted at. Defaults to `aws`.
35
- :param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
36
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
34
+ :param pulumi.Input[_builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
36
  The value should not contain leading or trailing forward slashes.
38
37
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
38
  *Available only for Vault Enterprise*.
@@ -47,21 +46,21 @@ class AuthBackendStsRoleArgs:
47
46
  if namespace is not None:
48
47
  pulumi.set(__self__, "namespace", namespace)
49
48
 
50
- @property
49
+ @_builtins.property
51
50
  @pulumi.getter(name="accountId")
52
- def account_id(self) -> pulumi.Input[builtins.str]:
51
+ def account_id(self) -> pulumi.Input[_builtins.str]:
53
52
  """
54
53
  The AWS account ID to configure the STS role for.
55
54
  """
56
55
  return pulumi.get(self, "account_id")
57
56
 
58
57
  @account_id.setter
59
- def account_id(self, value: pulumi.Input[builtins.str]):
58
+ def account_id(self, value: pulumi.Input[_builtins.str]):
60
59
  pulumi.set(self, "account_id", value)
61
60
 
62
- @property
61
+ @_builtins.property
63
62
  @pulumi.getter(name="stsRole")
64
- def sts_role(self) -> pulumi.Input[builtins.str]:
63
+ def sts_role(self) -> pulumi.Input[_builtins.str]:
65
64
  """
66
65
  The STS role to assume when verifying requests made
67
66
  by EC2 instances in the account specified by `account_id`.
@@ -69,12 +68,12 @@ class AuthBackendStsRoleArgs:
69
68
  return pulumi.get(self, "sts_role")
70
69
 
71
70
  @sts_role.setter
72
- def sts_role(self, value: pulumi.Input[builtins.str]):
71
+ def sts_role(self, value: pulumi.Input[_builtins.str]):
73
72
  pulumi.set(self, "sts_role", value)
74
73
 
75
- @property
74
+ @_builtins.property
76
75
  @pulumi.getter
77
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
76
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
78
77
  """
79
78
  The path the AWS auth backend being configured was
80
79
  mounted at. Defaults to `aws`.
@@ -82,24 +81,24 @@ class AuthBackendStsRoleArgs:
82
81
  return pulumi.get(self, "backend")
83
82
 
84
83
  @backend.setter
85
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
84
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
86
85
  pulumi.set(self, "backend", value)
87
86
 
88
- @property
87
+ @_builtins.property
89
88
  @pulumi.getter(name="externalId")
90
- def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
89
+ def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
91
90
  """
92
91
  External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
93
92
  """
94
93
  return pulumi.get(self, "external_id")
95
94
 
96
95
  @external_id.setter
97
- def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
96
+ def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
98
97
  pulumi.set(self, "external_id", value)
99
98
 
100
- @property
99
+ @_builtins.property
101
100
  @pulumi.getter
102
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
101
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
103
102
  """
104
103
  The namespace to provision the resource in.
105
104
  The value should not contain leading or trailing forward slashes.
@@ -109,29 +108,29 @@ class AuthBackendStsRoleArgs:
109
108
  return pulumi.get(self, "namespace")
110
109
 
111
110
  @namespace.setter
112
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
111
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
113
112
  pulumi.set(self, "namespace", value)
114
113
 
115
114
 
116
115
  @pulumi.input_type
117
116
  class _AuthBackendStsRoleState:
118
117
  def __init__(__self__, *,
119
- account_id: Optional[pulumi.Input[builtins.str]] = None,
120
- backend: Optional[pulumi.Input[builtins.str]] = None,
121
- external_id: Optional[pulumi.Input[builtins.str]] = None,
122
- namespace: Optional[pulumi.Input[builtins.str]] = None,
123
- sts_role: Optional[pulumi.Input[builtins.str]] = None):
118
+ account_id: Optional[pulumi.Input[_builtins.str]] = None,
119
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
120
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
121
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
122
+ sts_role: Optional[pulumi.Input[_builtins.str]] = None):
124
123
  """
125
124
  Input properties used for looking up and filtering AuthBackendStsRole resources.
126
- :param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
127
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
125
+ :param pulumi.Input[_builtins.str] account_id: The AWS account ID to configure the STS role for.
126
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
128
127
  mounted at. Defaults to `aws`.
129
- :param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
130
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
128
+ :param pulumi.Input[_builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
129
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
131
130
  The value should not contain leading or trailing forward slashes.
132
131
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
133
132
  *Available only for Vault Enterprise*.
134
- :param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
133
+ :param pulumi.Input[_builtins.str] sts_role: The STS role to assume when verifying requests made
135
134
  by EC2 instances in the account specified by `account_id`.
136
135
  """
137
136
  if account_id is not None:
@@ -145,21 +144,21 @@ class _AuthBackendStsRoleState:
145
144
  if sts_role is not None:
146
145
  pulumi.set(__self__, "sts_role", sts_role)
147
146
 
148
- @property
147
+ @_builtins.property
149
148
  @pulumi.getter(name="accountId")
150
- def account_id(self) -> Optional[pulumi.Input[builtins.str]]:
149
+ def account_id(self) -> Optional[pulumi.Input[_builtins.str]]:
151
150
  """
152
151
  The AWS account ID to configure the STS role for.
153
152
  """
154
153
  return pulumi.get(self, "account_id")
155
154
 
156
155
  @account_id.setter
157
- def account_id(self, value: Optional[pulumi.Input[builtins.str]]):
156
+ def account_id(self, value: Optional[pulumi.Input[_builtins.str]]):
158
157
  pulumi.set(self, "account_id", value)
159
158
 
160
- @property
159
+ @_builtins.property
161
160
  @pulumi.getter
162
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
161
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
163
162
  """
164
163
  The path the AWS auth backend being configured was
165
164
  mounted at. Defaults to `aws`.
@@ -167,24 +166,24 @@ class _AuthBackendStsRoleState:
167
166
  return pulumi.get(self, "backend")
168
167
 
169
168
  @backend.setter
170
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
169
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
171
170
  pulumi.set(self, "backend", value)
172
171
 
173
- @property
172
+ @_builtins.property
174
173
  @pulumi.getter(name="externalId")
175
- def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
174
+ def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
176
175
  """
177
176
  External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
178
177
  """
179
178
  return pulumi.get(self, "external_id")
180
179
 
181
180
  @external_id.setter
182
- def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
181
+ def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
183
182
  pulumi.set(self, "external_id", value)
184
183
 
185
- @property
184
+ @_builtins.property
186
185
  @pulumi.getter
187
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
186
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
188
187
  """
189
188
  The namespace to provision the resource in.
190
189
  The value should not contain leading or trailing forward slashes.
@@ -194,12 +193,12 @@ class _AuthBackendStsRoleState:
194
193
  return pulumi.get(self, "namespace")
195
194
 
196
195
  @namespace.setter
197
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
196
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
198
197
  pulumi.set(self, "namespace", value)
199
198
 
200
- @property
199
+ @_builtins.property
201
200
  @pulumi.getter(name="stsRole")
202
- def sts_role(self) -> Optional[pulumi.Input[builtins.str]]:
201
+ def sts_role(self) -> Optional[pulumi.Input[_builtins.str]]:
203
202
  """
204
203
  The STS role to assume when verifying requests made
205
204
  by EC2 instances in the account specified by `account_id`.
@@ -207,7 +206,7 @@ class _AuthBackendStsRoleState:
207
206
  return pulumi.get(self, "sts_role")
208
207
 
209
208
  @sts_role.setter
210
- def sts_role(self, value: Optional[pulumi.Input[builtins.str]]):
209
+ def sts_role(self, value: Optional[pulumi.Input[_builtins.str]]):
211
210
  pulumi.set(self, "sts_role", value)
212
211
 
213
212
 
@@ -217,11 +216,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
217
216
  def __init__(__self__,
218
217
  resource_name: str,
219
218
  opts: Optional[pulumi.ResourceOptions] = None,
220
- account_id: Optional[pulumi.Input[builtins.str]] = None,
221
- backend: Optional[pulumi.Input[builtins.str]] = None,
222
- external_id: Optional[pulumi.Input[builtins.str]] = None,
223
- namespace: Optional[pulumi.Input[builtins.str]] = None,
224
- sts_role: Optional[pulumi.Input[builtins.str]] = None,
219
+ account_id: Optional[pulumi.Input[_builtins.str]] = None,
220
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
221
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
222
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
223
+ sts_role: Optional[pulumi.Input[_builtins.str]] = None,
225
224
  __props__=None):
226
225
  """
227
226
  ## Example Usage
@@ -247,15 +246,15 @@ class AuthBackendStsRole(pulumi.CustomResource):
247
246
 
248
247
  :param str resource_name: The name of the resource.
249
248
  :param pulumi.ResourceOptions opts: Options for the resource.
250
- :param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
251
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
249
+ :param pulumi.Input[_builtins.str] account_id: The AWS account ID to configure the STS role for.
250
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
252
251
  mounted at. Defaults to `aws`.
253
- :param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
254
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
252
+ :param pulumi.Input[_builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
253
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
255
254
  The value should not contain leading or trailing forward slashes.
256
255
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
257
256
  *Available only for Vault Enterprise*.
258
- :param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
257
+ :param pulumi.Input[_builtins.str] sts_role: The STS role to assume when verifying requests made
259
258
  by EC2 instances in the account specified by `account_id`.
260
259
  """
261
260
  ...
@@ -301,11 +300,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
301
300
  def _internal_init(__self__,
302
301
  resource_name: str,
303
302
  opts: Optional[pulumi.ResourceOptions] = None,
304
- account_id: Optional[pulumi.Input[builtins.str]] = None,
305
- backend: Optional[pulumi.Input[builtins.str]] = None,
306
- external_id: Optional[pulumi.Input[builtins.str]] = None,
307
- namespace: Optional[pulumi.Input[builtins.str]] = None,
308
- sts_role: Optional[pulumi.Input[builtins.str]] = None,
303
+ account_id: Optional[pulumi.Input[_builtins.str]] = None,
304
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
305
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
306
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
307
+ sts_role: Optional[pulumi.Input[_builtins.str]] = None,
309
308
  __props__=None):
310
309
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
311
310
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -334,11 +333,11 @@ class AuthBackendStsRole(pulumi.CustomResource):
334
333
  def get(resource_name: str,
335
334
  id: pulumi.Input[str],
336
335
  opts: Optional[pulumi.ResourceOptions] = None,
337
- account_id: Optional[pulumi.Input[builtins.str]] = None,
338
- backend: Optional[pulumi.Input[builtins.str]] = None,
339
- external_id: Optional[pulumi.Input[builtins.str]] = None,
340
- namespace: Optional[pulumi.Input[builtins.str]] = None,
341
- sts_role: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendStsRole':
336
+ account_id: Optional[pulumi.Input[_builtins.str]] = None,
337
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
338
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
339
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
340
+ sts_role: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendStsRole':
342
341
  """
343
342
  Get an existing AuthBackendStsRole resource's state with the given name, id, and optional extra
344
343
  properties used to qualify the lookup.
@@ -346,15 +345,15 @@ class AuthBackendStsRole(pulumi.CustomResource):
346
345
  :param str resource_name: The unique name of the resulting resource.
347
346
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
348
347
  :param pulumi.ResourceOptions opts: Options for the resource.
349
- :param pulumi.Input[builtins.str] account_id: The AWS account ID to configure the STS role for.
350
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
348
+ :param pulumi.Input[_builtins.str] account_id: The AWS account ID to configure the STS role for.
349
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
351
350
  mounted at. Defaults to `aws`.
352
- :param pulumi.Input[builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
353
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
351
+ :param pulumi.Input[_builtins.str] external_id: External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
352
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
354
353
  The value should not contain leading or trailing forward slashes.
355
354
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
356
355
  *Available only for Vault Enterprise*.
357
- :param pulumi.Input[builtins.str] sts_role: The STS role to assume when verifying requests made
356
+ :param pulumi.Input[_builtins.str] sts_role: The STS role to assume when verifying requests made
358
357
  by EC2 instances in the account specified by `account_id`.
359
358
  """
360
359
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -368,34 +367,34 @@ class AuthBackendStsRole(pulumi.CustomResource):
368
367
  __props__.__dict__["sts_role"] = sts_role
369
368
  return AuthBackendStsRole(resource_name, opts=opts, __props__=__props__)
370
369
 
371
- @property
370
+ @_builtins.property
372
371
  @pulumi.getter(name="accountId")
373
- def account_id(self) -> pulumi.Output[builtins.str]:
372
+ def account_id(self) -> pulumi.Output[_builtins.str]:
374
373
  """
375
374
  The AWS account ID to configure the STS role for.
376
375
  """
377
376
  return pulumi.get(self, "account_id")
378
377
 
379
- @property
378
+ @_builtins.property
380
379
  @pulumi.getter
381
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
380
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
382
381
  """
383
382
  The path the AWS auth backend being configured was
384
383
  mounted at. Defaults to `aws`.
385
384
  """
386
385
  return pulumi.get(self, "backend")
387
386
 
388
- @property
387
+ @_builtins.property
389
388
  @pulumi.getter(name="externalId")
390
- def external_id(self) -> pulumi.Output[Optional[builtins.str]]:
389
+ def external_id(self) -> pulumi.Output[Optional[_builtins.str]]:
391
390
  """
392
391
  External ID expected by the STS role. The associated STS role must be configured to require the external ID. Requires Vault 1.17+.
393
392
  """
394
393
  return pulumi.get(self, "external_id")
395
394
 
396
- @property
395
+ @_builtins.property
397
396
  @pulumi.getter
398
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
397
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
399
398
  """
400
399
  The namespace to provision the resource in.
401
400
  The value should not contain leading or trailing forward slashes.
@@ -404,9 +403,9 @@ class AuthBackendStsRole(pulumi.CustomResource):
404
403
  """
405
404
  return pulumi.get(self, "namespace")
406
405
 
407
- @property
406
+ @_builtins.property
408
407
  @pulumi.getter(name="stsRole")
409
- def sts_role(self) -> pulumi.Output[builtins.str]:
408
+ def sts_role(self) -> pulumi.Output[_builtins.str]:
410
409
  """
411
410
  The STS role to assume when verifying requests made
412
411
  by EC2 instances in the account specified by `account_id`.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -74,30 +73,30 @@ class GetAccessCredentialsResult:
74
73
  raise TypeError("Expected argument 'type' to be a str")
75
74
  pulumi.set(__self__, "type", type)
76
75
 
77
- @property
76
+ @_builtins.property
78
77
  @pulumi.getter(name="accessKey")
79
- def access_key(self) -> builtins.str:
78
+ def access_key(self) -> _builtins.str:
80
79
  """
81
80
  The AWS Access Key ID returned by Vault.
82
81
  """
83
82
  return pulumi.get(self, "access_key")
84
83
 
85
- @property
84
+ @_builtins.property
86
85
  @pulumi.getter
87
- def backend(self) -> builtins.str:
86
+ def backend(self) -> _builtins.str:
88
87
  return pulumi.get(self, "backend")
89
88
 
90
- @property
89
+ @_builtins.property
91
90
  @pulumi.getter
92
- def id(self) -> builtins.str:
91
+ def id(self) -> _builtins.str:
93
92
  """
94
93
  The provider-assigned unique ID for this managed resource.
95
94
  """
96
95
  return pulumi.get(self, "id")
97
96
 
98
- @property
97
+ @_builtins.property
99
98
  @pulumi.getter(name="leaseDuration")
100
- def lease_duration(self) -> builtins.int:
99
+ def lease_duration(self) -> _builtins.int:
101
100
  """
102
101
  The duration of the secret lease, in seconds relative
103
102
  to the time the data was requested. Once this time has passed any plan
@@ -105,68 +104,68 @@ class GetAccessCredentialsResult:
105
104
  """
106
105
  return pulumi.get(self, "lease_duration")
107
106
 
108
- @property
107
+ @_builtins.property
109
108
  @pulumi.getter(name="leaseId")
110
- def lease_id(self) -> builtins.str:
109
+ def lease_id(self) -> _builtins.str:
111
110
  """
112
111
  The lease identifier assigned by Vault.
113
112
  """
114
113
  return pulumi.get(self, "lease_id")
115
114
 
116
- @property
115
+ @_builtins.property
117
116
  @pulumi.getter(name="leaseRenewable")
118
- def lease_renewable(self) -> builtins.bool:
117
+ def lease_renewable(self) -> _builtins.bool:
119
118
  return pulumi.get(self, "lease_renewable")
120
119
 
121
- @property
120
+ @_builtins.property
122
121
  @pulumi.getter(name="leaseStartTime")
123
- def lease_start_time(self) -> builtins.str:
122
+ def lease_start_time(self) -> _builtins.str:
124
123
  return pulumi.get(self, "lease_start_time")
125
124
 
126
- @property
125
+ @_builtins.property
127
126
  @pulumi.getter
128
- def namespace(self) -> Optional[builtins.str]:
127
+ def namespace(self) -> Optional[_builtins.str]:
129
128
  return pulumi.get(self, "namespace")
130
129
 
131
- @property
130
+ @_builtins.property
132
131
  @pulumi.getter
133
- def region(self) -> Optional[builtins.str]:
132
+ def region(self) -> Optional[_builtins.str]:
134
133
  return pulumi.get(self, "region")
135
134
 
136
- @property
135
+ @_builtins.property
137
136
  @pulumi.getter
138
- def role(self) -> builtins.str:
137
+ def role(self) -> _builtins.str:
139
138
  return pulumi.get(self, "role")
140
139
 
141
- @property
140
+ @_builtins.property
142
141
  @pulumi.getter(name="roleArn")
143
- def role_arn(self) -> Optional[builtins.str]:
142
+ def role_arn(self) -> Optional[_builtins.str]:
144
143
  return pulumi.get(self, "role_arn")
145
144
 
146
- @property
145
+ @_builtins.property
147
146
  @pulumi.getter(name="secretKey")
148
- def secret_key(self) -> builtins.str:
147
+ def secret_key(self) -> _builtins.str:
149
148
  """
150
149
  The AWS Secret Key returned by Vault.
151
150
  """
152
151
  return pulumi.get(self, "secret_key")
153
152
 
154
- @property
153
+ @_builtins.property
155
154
  @pulumi.getter(name="securityToken")
156
- def security_token(self) -> builtins.str:
155
+ def security_token(self) -> _builtins.str:
157
156
  """
158
157
  The STS token returned by Vault, if any.
159
158
  """
160
159
  return pulumi.get(self, "security_token")
161
160
 
162
- @property
161
+ @_builtins.property
163
162
  @pulumi.getter
164
- def ttl(self) -> Optional[builtins.str]:
163
+ def ttl(self) -> Optional[_builtins.str]:
165
164
  return pulumi.get(self, "ttl")
166
165
 
167
- @property
166
+ @_builtins.property
168
167
  @pulumi.getter
169
- def type(self) -> Optional[builtins.str]:
168
+ def type(self) -> Optional[_builtins.str]:
170
169
  return pulumi.get(self, "type")
171
170
 
172
171
 
@@ -193,34 +192,34 @@ class AwaitableGetAccessCredentialsResult(GetAccessCredentialsResult):
193
192
  type=self.type)
194
193
 
195
194
 
196
- def get_access_credentials(backend: Optional[builtins.str] = None,
197
- namespace: Optional[builtins.str] = None,
198
- region: Optional[builtins.str] = None,
199
- role: Optional[builtins.str] = None,
200
- role_arn: Optional[builtins.str] = None,
201
- ttl: Optional[builtins.str] = None,
202
- type: Optional[builtins.str] = None,
195
+ def get_access_credentials(backend: Optional[_builtins.str] = None,
196
+ namespace: Optional[_builtins.str] = None,
197
+ region: Optional[_builtins.str] = None,
198
+ role: Optional[_builtins.str] = None,
199
+ role_arn: Optional[_builtins.str] = None,
200
+ ttl: Optional[_builtins.str] = None,
201
+ type: Optional[_builtins.str] = None,
203
202
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
204
203
  """
205
204
  ## Example Usage
206
205
 
207
206
 
208
- :param builtins.str backend: The path to the AWS secret backend to
207
+ :param _builtins.str backend: The path to the AWS secret backend to
209
208
  read credentials from, with no leading or trailing `/`s.
210
- :param builtins.str namespace: The namespace of the target resource.
209
+ :param _builtins.str namespace: The namespace of the target resource.
211
210
  The value should not contain leading or trailing forward slashes.
212
211
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
213
212
  *Available only for Vault Enterprise*.
214
- :param builtins.str region: The region the read credentials belong to.
215
- :param builtins.str role: The name of the AWS secret backend role to read
213
+ :param _builtins.str region: The region the read credentials belong to.
214
+ :param _builtins.str role: The name of the AWS secret backend role to read
216
215
  credentials from, with no leading or trailing `/`s.
217
- :param builtins.str role_arn: The specific AWS ARN to use
216
+ :param _builtins.str role_arn: The specific AWS ARN to use
218
217
  from the configured role. If the role does not have multiple ARNs, this does
219
218
  not need to be specified.
220
- :param builtins.str ttl: Specifies the TTL for the use of the STS token. This
219
+ :param _builtins.str ttl: Specifies the TTL for the use of the STS token. This
221
220
  is specified as a string with a duration suffix. Valid only when
222
221
  `credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
223
- :param builtins.str type: The type of credentials to read. Defaults
222
+ :param _builtins.str type: The type of credentials to read. Defaults
224
223
  to `"creds"`, which just returns an AWS Access Key ID and Secret
225
224
  Key. Can also be set to `"sts"`, which will return a security token
226
225
  in addition to the keys.
@@ -252,34 +251,34 @@ def get_access_credentials(backend: Optional[builtins.str] = None,
252
251
  security_token=pulumi.get(__ret__, 'security_token'),
253
252
  ttl=pulumi.get(__ret__, 'ttl'),
254
253
  type=pulumi.get(__ret__, 'type'))
255
- def get_access_credentials_output(backend: Optional[pulumi.Input[builtins.str]] = None,
256
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
257
- region: Optional[pulumi.Input[Optional[builtins.str]]] = None,
258
- role: Optional[pulumi.Input[builtins.str]] = None,
259
- role_arn: Optional[pulumi.Input[Optional[builtins.str]]] = None,
260
- ttl: Optional[pulumi.Input[Optional[builtins.str]]] = None,
261
- type: Optional[pulumi.Input[Optional[builtins.str]]] = None,
254
+ def get_access_credentials_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
255
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
256
+ region: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
257
+ role: Optional[pulumi.Input[_builtins.str]] = None,
258
+ role_arn: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
259
+ ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
260
+ type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
262
261
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
263
262
  """
264
263
  ## Example Usage
265
264
 
266
265
 
267
- :param builtins.str backend: The path to the AWS secret backend to
266
+ :param _builtins.str backend: The path to the AWS secret backend to
268
267
  read credentials from, with no leading or trailing `/`s.
269
- :param builtins.str namespace: The namespace of the target resource.
268
+ :param _builtins.str namespace: The namespace of the target resource.
270
269
  The value should not contain leading or trailing forward slashes.
271
270
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
272
271
  *Available only for Vault Enterprise*.
273
- :param builtins.str region: The region the read credentials belong to.
274
- :param builtins.str role: The name of the AWS secret backend role to read
272
+ :param _builtins.str region: The region the read credentials belong to.
273
+ :param _builtins.str role: The name of the AWS secret backend role to read
275
274
  credentials from, with no leading or trailing `/`s.
276
- :param builtins.str role_arn: The specific AWS ARN to use
275
+ :param _builtins.str role_arn: The specific AWS ARN to use
277
276
  from the configured role. If the role does not have multiple ARNs, this does
278
277
  not need to be specified.
279
- :param builtins.str ttl: Specifies the TTL for the use of the STS token. This
278
+ :param _builtins.str ttl: Specifies the TTL for the use of the STS token. This
280
279
  is specified as a string with a duration suffix. Valid only when
281
280
  `credential_type` of the connected `aws.SecretBackendRole` resource is `assumed_role` or `federation_token`
282
- :param builtins.str type: The type of credentials to read. Defaults
281
+ :param _builtins.str type: The type of credentials to read. Defaults
283
282
  to `"creds"`, which just returns an AWS Access Key ID and Secret
284
283
  Key. Can also be set to `"sts"`, which will return a security token
285
284
  in addition to the keys.