pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -53,32 +52,32 @@ class AuthBackendTune(dict):
53
52
  return super().get(key, default)
54
53
 
55
54
  def __init__(__self__, *,
56
- allowed_response_headers: Optional[Sequence[builtins.str]] = None,
57
- audit_non_hmac_request_keys: Optional[Sequence[builtins.str]] = None,
58
- audit_non_hmac_response_keys: Optional[Sequence[builtins.str]] = None,
59
- default_lease_ttl: Optional[builtins.str] = None,
60
- listing_visibility: Optional[builtins.str] = None,
61
- max_lease_ttl: Optional[builtins.str] = None,
62
- passthrough_request_headers: Optional[Sequence[builtins.str]] = None,
63
- token_type: Optional[builtins.str] = None):
64
- """
65
- :param Sequence[builtins.str] allowed_response_headers: List of headers to whitelist and allowing
55
+ allowed_response_headers: Optional[Sequence[_builtins.str]] = None,
56
+ audit_non_hmac_request_keys: Optional[Sequence[_builtins.str]] = None,
57
+ audit_non_hmac_response_keys: Optional[Sequence[_builtins.str]] = None,
58
+ default_lease_ttl: Optional[_builtins.str] = None,
59
+ listing_visibility: Optional[_builtins.str] = None,
60
+ max_lease_ttl: Optional[_builtins.str] = None,
61
+ passthrough_request_headers: Optional[Sequence[_builtins.str]] = None,
62
+ token_type: Optional[_builtins.str] = None):
63
+ """
64
+ :param Sequence[_builtins.str] allowed_response_headers: List of headers to whitelist and allowing
66
65
  a plugin to include them in the response.
67
- :param Sequence[builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
66
+ :param Sequence[_builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
68
67
  not be HMAC'd by audit devices in the request data object.
69
- :param Sequence[builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
68
+ :param Sequence[_builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
70
69
  not be HMAC'd by audit devices in the response data object.
71
- :param builtins.str default_lease_ttl: Specifies the default time-to-live.
70
+ :param _builtins.str default_lease_ttl: Specifies the default time-to-live.
72
71
  If set, this overrides the global default.
73
72
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
74
- :param builtins.str listing_visibility: Specifies whether to show this mount in
73
+ :param _builtins.str listing_visibility: Specifies whether to show this mount in
75
74
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
76
- :param builtins.str max_lease_ttl: Specifies the maximum time-to-live.
75
+ :param _builtins.str max_lease_ttl: Specifies the maximum time-to-live.
77
76
  If set, this overrides the global default.
78
77
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
79
- :param Sequence[builtins.str] passthrough_request_headers: List of headers to whitelist and
78
+ :param Sequence[_builtins.str] passthrough_request_headers: List of headers to whitelist and
80
79
  pass from the request to the backend.
81
- :param builtins.str token_type: Specifies the type of tokens that should be returned by
80
+ :param _builtins.str token_type: Specifies the type of tokens that should be returned by
82
81
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
83
82
  """
84
83
  if allowed_response_headers is not None:
@@ -98,36 +97,36 @@ class AuthBackendTune(dict):
98
97
  if token_type is not None:
99
98
  pulumi.set(__self__, "token_type", token_type)
100
99
 
101
- @property
100
+ @_builtins.property
102
101
  @pulumi.getter(name="allowedResponseHeaders")
103
- def allowed_response_headers(self) -> Optional[Sequence[builtins.str]]:
102
+ def allowed_response_headers(self) -> Optional[Sequence[_builtins.str]]:
104
103
  """
105
104
  List of headers to whitelist and allowing
106
105
  a plugin to include them in the response.
107
106
  """
108
107
  return pulumi.get(self, "allowed_response_headers")
109
108
 
110
- @property
109
+ @_builtins.property
111
110
  @pulumi.getter(name="auditNonHmacRequestKeys")
112
- def audit_non_hmac_request_keys(self) -> Optional[Sequence[builtins.str]]:
111
+ def audit_non_hmac_request_keys(self) -> Optional[Sequence[_builtins.str]]:
113
112
  """
114
113
  Specifies the list of keys that will
115
114
  not be HMAC'd by audit devices in the request data object.
116
115
  """
117
116
  return pulumi.get(self, "audit_non_hmac_request_keys")
118
117
 
119
- @property
118
+ @_builtins.property
120
119
  @pulumi.getter(name="auditNonHmacResponseKeys")
121
- def audit_non_hmac_response_keys(self) -> Optional[Sequence[builtins.str]]:
120
+ def audit_non_hmac_response_keys(self) -> Optional[Sequence[_builtins.str]]:
122
121
  """
123
122
  Specifies the list of keys that will
124
123
  not be HMAC'd by audit devices in the response data object.
125
124
  """
126
125
  return pulumi.get(self, "audit_non_hmac_response_keys")
127
126
 
128
- @property
127
+ @_builtins.property
129
128
  @pulumi.getter(name="defaultLeaseTtl")
130
- def default_lease_ttl(self) -> Optional[builtins.str]:
129
+ def default_lease_ttl(self) -> Optional[_builtins.str]:
131
130
  """
132
131
  Specifies the default time-to-live.
133
132
  If set, this overrides the global default.
@@ -135,18 +134,18 @@ class AuthBackendTune(dict):
135
134
  """
136
135
  return pulumi.get(self, "default_lease_ttl")
137
136
 
138
- @property
137
+ @_builtins.property
139
138
  @pulumi.getter(name="listingVisibility")
140
- def listing_visibility(self) -> Optional[builtins.str]:
139
+ def listing_visibility(self) -> Optional[_builtins.str]:
141
140
  """
142
141
  Specifies whether to show this mount in
143
142
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
144
143
  """
145
144
  return pulumi.get(self, "listing_visibility")
146
145
 
147
- @property
146
+ @_builtins.property
148
147
  @pulumi.getter(name="maxLeaseTtl")
149
- def max_lease_ttl(self) -> Optional[builtins.str]:
148
+ def max_lease_ttl(self) -> Optional[_builtins.str]:
150
149
  """
151
150
  Specifies the maximum time-to-live.
152
151
  If set, this overrides the global default.
@@ -154,18 +153,18 @@ class AuthBackendTune(dict):
154
153
  """
155
154
  return pulumi.get(self, "max_lease_ttl")
156
155
 
157
- @property
156
+ @_builtins.property
158
157
  @pulumi.getter(name="passthroughRequestHeaders")
159
- def passthrough_request_headers(self) -> Optional[Sequence[builtins.str]]:
158
+ def passthrough_request_headers(self) -> Optional[Sequence[_builtins.str]]:
160
159
  """
161
160
  List of headers to whitelist and
162
161
  pass from the request to the backend.
163
162
  """
164
163
  return pulumi.get(self, "passthrough_request_headers")
165
164
 
166
- @property
165
+ @_builtins.property
167
166
  @pulumi.getter(name="tokenType")
168
- def token_type(self) -> Optional[builtins.str]:
167
+ def token_type(self) -> Optional[_builtins.str]:
169
168
  """
170
169
  Specifies the type of tokens that should be returned by
171
170
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,20 +19,20 @@ __all__ = ['TeamArgs', 'Team']
20
19
  @pulumi.input_type
21
20
  class TeamArgs:
22
21
  def __init__(__self__, *,
23
- team: pulumi.Input[builtins.str],
24
- backend: Optional[pulumi.Input[builtins.str]] = None,
25
- namespace: Optional[pulumi.Input[builtins.str]] = None,
26
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
22
+ team: pulumi.Input[_builtins.str],
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
27
26
  """
28
27
  The set of arguments for constructing a Team resource.
29
- :param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
30
- :param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
28
+ :param pulumi.Input[_builtins.str] team: GitHub team name in "slugified" format.
29
+ :param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
31
30
  if not specified.
32
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
31
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
33
32
  The value should not contain leading or trailing forward slashes.
34
33
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
34
  *Available only for Vault Enterprise*.
36
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
35
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
37
36
  issued using this role.
38
37
  """
39
38
  pulumi.set(__self__, "team", team)
@@ -44,21 +43,21 @@ class TeamArgs:
44
43
  if policies is not None:
45
44
  pulumi.set(__self__, "policies", policies)
46
45
 
47
- @property
46
+ @_builtins.property
48
47
  @pulumi.getter
49
- def team(self) -> pulumi.Input[builtins.str]:
48
+ def team(self) -> pulumi.Input[_builtins.str]:
50
49
  """
51
50
  GitHub team name in "slugified" format.
52
51
  """
53
52
  return pulumi.get(self, "team")
54
53
 
55
54
  @team.setter
56
- def team(self, value: pulumi.Input[builtins.str]):
55
+ def team(self, value: pulumi.Input[_builtins.str]):
57
56
  pulumi.set(self, "team", value)
58
57
 
59
- @property
58
+ @_builtins.property
60
59
  @pulumi.getter
61
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
60
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
62
61
  """
63
62
  Path where the github auth backend is mounted. Defaults to `github`
64
63
  if not specified.
@@ -66,12 +65,12 @@ class TeamArgs:
66
65
  return pulumi.get(self, "backend")
67
66
 
68
67
  @backend.setter
69
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
68
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
70
69
  pulumi.set(self, "backend", value)
71
70
 
72
- @property
71
+ @_builtins.property
73
72
  @pulumi.getter
74
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
73
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
75
74
  """
76
75
  The namespace to provision the resource in.
77
76
  The value should not contain leading or trailing forward slashes.
@@ -81,12 +80,12 @@ class TeamArgs:
81
80
  return pulumi.get(self, "namespace")
82
81
 
83
82
  @namespace.setter
84
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
83
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
85
84
  pulumi.set(self, "namespace", value)
86
85
 
87
- @property
86
+ @_builtins.property
88
87
  @pulumi.getter
89
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
88
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
90
89
  """
91
90
  An array of strings specifying the policies to be set on tokens
92
91
  issued using this role.
@@ -94,28 +93,28 @@ class TeamArgs:
94
93
  return pulumi.get(self, "policies")
95
94
 
96
95
  @policies.setter
97
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
96
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
98
97
  pulumi.set(self, "policies", value)
99
98
 
100
99
 
101
100
  @pulumi.input_type
102
101
  class _TeamState:
103
102
  def __init__(__self__, *,
104
- backend: Optional[pulumi.Input[builtins.str]] = None,
105
- namespace: Optional[pulumi.Input[builtins.str]] = None,
106
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
107
- team: Optional[pulumi.Input[builtins.str]] = None):
103
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
104
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
105
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
106
+ team: Optional[pulumi.Input[_builtins.str]] = None):
108
107
  """
109
108
  Input properties used for looking up and filtering Team resources.
110
- :param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
109
+ :param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
111
110
  if not specified.
112
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
111
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
113
112
  The value should not contain leading or trailing forward slashes.
114
113
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
115
114
  *Available only for Vault Enterprise*.
116
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
115
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
117
116
  issued using this role.
118
- :param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
117
+ :param pulumi.Input[_builtins.str] team: GitHub team name in "slugified" format.
119
118
  """
120
119
  if backend is not None:
121
120
  pulumi.set(__self__, "backend", backend)
@@ -126,9 +125,9 @@ class _TeamState:
126
125
  if team is not None:
127
126
  pulumi.set(__self__, "team", team)
128
127
 
129
- @property
128
+ @_builtins.property
130
129
  @pulumi.getter
131
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
130
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
132
131
  """
133
132
  Path where the github auth backend is mounted. Defaults to `github`
134
133
  if not specified.
@@ -136,12 +135,12 @@ class _TeamState:
136
135
  return pulumi.get(self, "backend")
137
136
 
138
137
  @backend.setter
139
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
138
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
140
139
  pulumi.set(self, "backend", value)
141
140
 
142
- @property
141
+ @_builtins.property
143
142
  @pulumi.getter
144
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
143
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
145
144
  """
146
145
  The namespace to provision the resource in.
147
146
  The value should not contain leading or trailing forward slashes.
@@ -151,12 +150,12 @@ class _TeamState:
151
150
  return pulumi.get(self, "namespace")
152
151
 
153
152
  @namespace.setter
154
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
153
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
155
154
  pulumi.set(self, "namespace", value)
156
155
 
157
- @property
156
+ @_builtins.property
158
157
  @pulumi.getter
159
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
158
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
160
159
  """
161
160
  An array of strings specifying the policies to be set on tokens
162
161
  issued using this role.
@@ -164,19 +163,19 @@ class _TeamState:
164
163
  return pulumi.get(self, "policies")
165
164
 
166
165
  @policies.setter
167
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
166
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
168
167
  pulumi.set(self, "policies", value)
169
168
 
170
- @property
169
+ @_builtins.property
171
170
  @pulumi.getter
172
- def team(self) -> Optional[pulumi.Input[builtins.str]]:
171
+ def team(self) -> Optional[pulumi.Input[_builtins.str]]:
173
172
  """
174
173
  GitHub team name in "slugified" format.
175
174
  """
176
175
  return pulumi.get(self, "team")
177
176
 
178
177
  @team.setter
179
- def team(self, value: Optional[pulumi.Input[builtins.str]]):
178
+ def team(self, value: Optional[pulumi.Input[_builtins.str]]):
180
179
  pulumi.set(self, "team", value)
181
180
 
182
181
 
@@ -186,10 +185,10 @@ class Team(pulumi.CustomResource):
186
185
  def __init__(__self__,
187
186
  resource_name: str,
188
187
  opts: Optional[pulumi.ResourceOptions] = None,
189
- backend: Optional[pulumi.Input[builtins.str]] = None,
190
- namespace: Optional[pulumi.Input[builtins.str]] = None,
191
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
192
- team: Optional[pulumi.Input[builtins.str]] = None,
188
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
189
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
190
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
191
+ team: Optional[pulumi.Input[_builtins.str]] = None,
193
192
  __props__=None):
194
193
  """
195
194
  Manages policy mappings for Github Teams authenticated via Github. See the [Vault
@@ -222,15 +221,15 @@ class Team(pulumi.CustomResource):
222
221
 
223
222
  :param str resource_name: The name of the resource.
224
223
  :param pulumi.ResourceOptions opts: Options for the resource.
225
- :param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
224
+ :param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
226
225
  if not specified.
227
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
226
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
228
227
  The value should not contain leading or trailing forward slashes.
229
228
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
230
229
  *Available only for Vault Enterprise*.
231
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
230
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
232
231
  issued using this role.
233
- :param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
232
+ :param pulumi.Input[_builtins.str] team: GitHub team name in "slugified" format.
234
233
  """
235
234
  ...
236
235
  @overload
@@ -282,10 +281,10 @@ class Team(pulumi.CustomResource):
282
281
  def _internal_init(__self__,
283
282
  resource_name: str,
284
283
  opts: Optional[pulumi.ResourceOptions] = None,
285
- backend: Optional[pulumi.Input[builtins.str]] = None,
286
- namespace: Optional[pulumi.Input[builtins.str]] = None,
287
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
288
- team: Optional[pulumi.Input[builtins.str]] = None,
284
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
285
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
286
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
287
+ team: Optional[pulumi.Input[_builtins.str]] = None,
289
288
  __props__=None):
290
289
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
291
290
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -311,10 +310,10 @@ class Team(pulumi.CustomResource):
311
310
  def get(resource_name: str,
312
311
  id: pulumi.Input[str],
313
312
  opts: Optional[pulumi.ResourceOptions] = None,
314
- backend: Optional[pulumi.Input[builtins.str]] = None,
315
- namespace: Optional[pulumi.Input[builtins.str]] = None,
316
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
317
- team: Optional[pulumi.Input[builtins.str]] = None) -> 'Team':
313
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
314
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
315
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
316
+ team: Optional[pulumi.Input[_builtins.str]] = None) -> 'Team':
318
317
  """
319
318
  Get an existing Team resource's state with the given name, id, and optional extra
320
319
  properties used to qualify the lookup.
@@ -322,15 +321,15 @@ class Team(pulumi.CustomResource):
322
321
  :param str resource_name: The unique name of the resulting resource.
323
322
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
324
323
  :param pulumi.ResourceOptions opts: Options for the resource.
325
- :param pulumi.Input[builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
324
+ :param pulumi.Input[_builtins.str] backend: Path where the github auth backend is mounted. Defaults to `github`
326
325
  if not specified.
327
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
326
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
328
327
  The value should not contain leading or trailing forward slashes.
329
328
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
330
329
  *Available only for Vault Enterprise*.
331
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
330
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: An array of strings specifying the policies to be set on tokens
332
331
  issued using this role.
333
- :param pulumi.Input[builtins.str] team: GitHub team name in "slugified" format.
332
+ :param pulumi.Input[_builtins.str] team: GitHub team name in "slugified" format.
334
333
  """
335
334
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
336
335
 
@@ -342,18 +341,18 @@ class Team(pulumi.CustomResource):
342
341
  __props__.__dict__["team"] = team
343
342
  return Team(resource_name, opts=opts, __props__=__props__)
344
343
 
345
- @property
344
+ @_builtins.property
346
345
  @pulumi.getter
347
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
346
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
348
347
  """
349
348
  Path where the github auth backend is mounted. Defaults to `github`
350
349
  if not specified.
351
350
  """
352
351
  return pulumi.get(self, "backend")
353
352
 
354
- @property
353
+ @_builtins.property
355
354
  @pulumi.getter
356
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
355
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
357
356
  """
358
357
  The namespace to provision the resource in.
359
358
  The value should not contain leading or trailing forward slashes.
@@ -362,18 +361,18 @@ class Team(pulumi.CustomResource):
362
361
  """
363
362
  return pulumi.get(self, "namespace")
364
363
 
365
- @property
364
+ @_builtins.property
366
365
  @pulumi.getter
367
- def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
366
+ def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
368
367
  """
369
368
  An array of strings specifying the policies to be set on tokens
370
369
  issued using this role.
371
370
  """
372
371
  return pulumi.get(self, "policies")
373
372
 
374
- @property
373
+ @_builtins.property
375
374
  @pulumi.getter
376
- def team(self) -> pulumi.Output[builtins.str]:
375
+ def team(self) -> pulumi.Output[_builtins.str]:
377
376
  """
378
377
  GitHub team name in "slugified" format.
379
378
  """