pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,23 +19,23 @@ __all__ = ['AuthBackendUserArgs', 'AuthBackendUser']
20
19
  @pulumi.input_type
21
20
  class AuthBackendUserArgs:
22
21
  def __init__(__self__, *,
23
- username: pulumi.Input[builtins.str],
24
- backend: Optional[pulumi.Input[builtins.str]] = None,
25
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- namespace: Optional[pulumi.Input[builtins.str]] = None,
27
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
22
+ username: pulumi.Input[_builtins.str],
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
28
27
  """
29
28
  The set of arguments for constructing a AuthBackendUser resource.
30
- :param pulumi.Input[builtins.str] username: The LDAP username
31
- :param pulumi.Input[builtins.str] backend: Path to the authentication backend
29
+ :param pulumi.Input[_builtins.str] username: The LDAP username
30
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
32
31
 
33
32
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
34
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
35
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
33
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: Override LDAP groups which should be granted to user
34
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
36
35
  The value should not contain leading or trailing forward slashes.
37
36
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
37
  *Available only for Vault Enterprise*.
39
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
38
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to user
40
39
  """
41
40
  pulumi.set(__self__, "username", username)
42
41
  if backend is not None:
@@ -48,21 +47,21 @@ class AuthBackendUserArgs:
48
47
  if policies is not None:
49
48
  pulumi.set(__self__, "policies", policies)
50
49
 
51
- @property
50
+ @_builtins.property
52
51
  @pulumi.getter
53
- def username(self) -> pulumi.Input[builtins.str]:
52
+ def username(self) -> pulumi.Input[_builtins.str]:
54
53
  """
55
54
  The LDAP username
56
55
  """
57
56
  return pulumi.get(self, "username")
58
57
 
59
58
  @username.setter
60
- def username(self, value: pulumi.Input[builtins.str]):
59
+ def username(self, value: pulumi.Input[_builtins.str]):
61
60
  pulumi.set(self, "username", value)
62
61
 
63
- @property
62
+ @_builtins.property
64
63
  @pulumi.getter
65
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
64
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
66
65
  """
67
66
  Path to the authentication backend
68
67
 
@@ -71,24 +70,24 @@ class AuthBackendUserArgs:
71
70
  return pulumi.get(self, "backend")
72
71
 
73
72
  @backend.setter
74
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
73
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
75
74
  pulumi.set(self, "backend", value)
76
75
 
77
- @property
76
+ @_builtins.property
78
77
  @pulumi.getter
79
- def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
78
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
80
79
  """
81
80
  Override LDAP groups which should be granted to user
82
81
  """
83
82
  return pulumi.get(self, "groups")
84
83
 
85
84
  @groups.setter
86
- def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
85
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
87
86
  pulumi.set(self, "groups", value)
88
87
 
89
- @property
88
+ @_builtins.property
90
89
  @pulumi.getter
91
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
90
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
92
91
  """
93
92
  The namespace to provision the resource in.
94
93
  The value should not contain leading or trailing forward slashes.
@@ -98,42 +97,42 @@ class AuthBackendUserArgs:
98
97
  return pulumi.get(self, "namespace")
99
98
 
100
99
  @namespace.setter
101
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
100
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
102
101
  pulumi.set(self, "namespace", value)
103
102
 
104
- @property
103
+ @_builtins.property
105
104
  @pulumi.getter
106
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
105
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
107
106
  """
108
107
  Policies which should be granted to user
109
108
  """
110
109
  return pulumi.get(self, "policies")
111
110
 
112
111
  @policies.setter
113
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
112
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
114
113
  pulumi.set(self, "policies", value)
115
114
 
116
115
 
117
116
  @pulumi.input_type
118
117
  class _AuthBackendUserState:
119
118
  def __init__(__self__, *,
120
- backend: Optional[pulumi.Input[builtins.str]] = None,
121
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
122
- namespace: Optional[pulumi.Input[builtins.str]] = None,
123
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
124
- username: Optional[pulumi.Input[builtins.str]] = None):
119
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
120
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
121
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
122
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
123
+ username: Optional[pulumi.Input[_builtins.str]] = None):
125
124
  """
126
125
  Input properties used for looking up and filtering AuthBackendUser resources.
127
- :param pulumi.Input[builtins.str] backend: Path to the authentication backend
126
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
128
127
 
129
128
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
130
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
131
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
129
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: Override LDAP groups which should be granted to user
130
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
132
131
  The value should not contain leading or trailing forward slashes.
133
132
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
134
133
  *Available only for Vault Enterprise*.
135
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
136
- :param pulumi.Input[builtins.str] username: The LDAP username
134
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to user
135
+ :param pulumi.Input[_builtins.str] username: The LDAP username
137
136
  """
138
137
  if backend is not None:
139
138
  pulumi.set(__self__, "backend", backend)
@@ -146,9 +145,9 @@ class _AuthBackendUserState:
146
145
  if username is not None:
147
146
  pulumi.set(__self__, "username", username)
148
147
 
149
- @property
148
+ @_builtins.property
150
149
  @pulumi.getter
151
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
150
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
152
151
  """
153
152
  Path to the authentication backend
154
153
 
@@ -157,24 +156,24 @@ class _AuthBackendUserState:
157
156
  return pulumi.get(self, "backend")
158
157
 
159
158
  @backend.setter
160
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
159
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
161
160
  pulumi.set(self, "backend", value)
162
161
 
163
- @property
162
+ @_builtins.property
164
163
  @pulumi.getter
165
- def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
164
+ def groups(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
166
165
  """
167
166
  Override LDAP groups which should be granted to user
168
167
  """
169
168
  return pulumi.get(self, "groups")
170
169
 
171
170
  @groups.setter
172
- def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
171
+ def groups(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
173
172
  pulumi.set(self, "groups", value)
174
173
 
175
- @property
174
+ @_builtins.property
176
175
  @pulumi.getter
177
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
176
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
178
177
  """
179
178
  The namespace to provision the resource in.
180
179
  The value should not contain leading or trailing forward slashes.
@@ -184,31 +183,31 @@ class _AuthBackendUserState:
184
183
  return pulumi.get(self, "namespace")
185
184
 
186
185
  @namespace.setter
187
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
186
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
188
187
  pulumi.set(self, "namespace", value)
189
188
 
190
- @property
189
+ @_builtins.property
191
190
  @pulumi.getter
192
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
191
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
193
192
  """
194
193
  Policies which should be granted to user
195
194
  """
196
195
  return pulumi.get(self, "policies")
197
196
 
198
197
  @policies.setter
199
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
198
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
200
199
  pulumi.set(self, "policies", value)
201
200
 
202
- @property
201
+ @_builtins.property
203
202
  @pulumi.getter
204
- def username(self) -> Optional[pulumi.Input[builtins.str]]:
203
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
205
204
  """
206
205
  The LDAP username
207
206
  """
208
207
  return pulumi.get(self, "username")
209
208
 
210
209
  @username.setter
211
- def username(self, value: Optional[pulumi.Input[builtins.str]]):
210
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
212
211
  pulumi.set(self, "username", value)
213
212
 
214
213
 
@@ -218,11 +217,11 @@ class AuthBackendUser(pulumi.CustomResource):
218
217
  def __init__(__self__,
219
218
  resource_name: str,
220
219
  opts: Optional[pulumi.ResourceOptions] = None,
221
- backend: Optional[pulumi.Input[builtins.str]] = None,
222
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
223
- namespace: Optional[pulumi.Input[builtins.str]] = None,
224
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
225
- username: Optional[pulumi.Input[builtins.str]] = None,
220
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
221
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
222
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
223
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
224
+ username: Optional[pulumi.Input[_builtins.str]] = None,
226
225
  __props__=None):
227
226
  """
228
227
  Provides a resource to create a user in an [LDAP auth backend within Vault](https://www.vaultproject.io/docs/auth/ldap.html).
@@ -261,16 +260,16 @@ class AuthBackendUser(pulumi.CustomResource):
261
260
 
262
261
  :param str resource_name: The name of the resource.
263
262
  :param pulumi.ResourceOptions opts: Options for the resource.
264
- :param pulumi.Input[builtins.str] backend: Path to the authentication backend
263
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
265
264
 
266
265
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
267
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
268
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
266
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: Override LDAP groups which should be granted to user
267
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
269
268
  The value should not contain leading or trailing forward slashes.
270
269
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
271
270
  *Available only for Vault Enterprise*.
272
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
273
- :param pulumi.Input[builtins.str] username: The LDAP username
271
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to user
272
+ :param pulumi.Input[_builtins.str] username: The LDAP username
274
273
  """
275
274
  ...
276
275
  @overload
@@ -328,11 +327,11 @@ class AuthBackendUser(pulumi.CustomResource):
328
327
  def _internal_init(__self__,
329
328
  resource_name: str,
330
329
  opts: Optional[pulumi.ResourceOptions] = None,
331
- backend: Optional[pulumi.Input[builtins.str]] = None,
332
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
333
- namespace: Optional[pulumi.Input[builtins.str]] = None,
334
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
335
- username: Optional[pulumi.Input[builtins.str]] = None,
330
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
331
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
332
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
333
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
334
+ username: Optional[pulumi.Input[_builtins.str]] = None,
336
335
  __props__=None):
337
336
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
338
337
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -359,11 +358,11 @@ class AuthBackendUser(pulumi.CustomResource):
359
358
  def get(resource_name: str,
360
359
  id: pulumi.Input[str],
361
360
  opts: Optional[pulumi.ResourceOptions] = None,
362
- backend: Optional[pulumi.Input[builtins.str]] = None,
363
- groups: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
364
- namespace: Optional[pulumi.Input[builtins.str]] = None,
365
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
366
- username: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendUser':
361
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
362
+ groups: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
363
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
364
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
365
+ username: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendUser':
367
366
  """
368
367
  Get an existing AuthBackendUser resource's state with the given name, id, and optional extra
369
368
  properties used to qualify the lookup.
@@ -371,16 +370,16 @@ class AuthBackendUser(pulumi.CustomResource):
371
370
  :param str resource_name: The unique name of the resulting resource.
372
371
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
373
372
  :param pulumi.ResourceOptions opts: Options for the resource.
374
- :param pulumi.Input[builtins.str] backend: Path to the authentication backend
373
+ :param pulumi.Input[_builtins.str] backend: Path to the authentication backend
375
374
 
376
375
  For more details on the usage of each argument consult the [Vault LDAP API documentation](https://www.vaultproject.io/api-docs/auth/ldap).
377
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] groups: Override LDAP groups which should be granted to user
378
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
376
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] groups: Override LDAP groups which should be granted to user
377
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
379
378
  The value should not contain leading or trailing forward slashes.
380
379
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
381
380
  *Available only for Vault Enterprise*.
382
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: Policies which should be granted to user
383
- :param pulumi.Input[builtins.str] username: The LDAP username
381
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: Policies which should be granted to user
382
+ :param pulumi.Input[_builtins.str] username: The LDAP username
384
383
  """
385
384
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
386
385
 
@@ -393,9 +392,9 @@ class AuthBackendUser(pulumi.CustomResource):
393
392
  __props__.__dict__["username"] = username
394
393
  return AuthBackendUser(resource_name, opts=opts, __props__=__props__)
395
394
 
396
- @property
395
+ @_builtins.property
397
396
  @pulumi.getter
398
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
397
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
399
398
  """
400
399
  Path to the authentication backend
401
400
 
@@ -403,17 +402,17 @@ class AuthBackendUser(pulumi.CustomResource):
403
402
  """
404
403
  return pulumi.get(self, "backend")
405
404
 
406
- @property
405
+ @_builtins.property
407
406
  @pulumi.getter
408
- def groups(self) -> pulumi.Output[Sequence[builtins.str]]:
407
+ def groups(self) -> pulumi.Output[Sequence[_builtins.str]]:
409
408
  """
410
409
  Override LDAP groups which should be granted to user
411
410
  """
412
411
  return pulumi.get(self, "groups")
413
412
 
414
- @property
413
+ @_builtins.property
415
414
  @pulumi.getter
416
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
415
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
417
416
  """
418
417
  The namespace to provision the resource in.
419
418
  The value should not contain leading or trailing forward slashes.
@@ -422,17 +421,17 @@ class AuthBackendUser(pulumi.CustomResource):
422
421
  """
423
422
  return pulumi.get(self, "namespace")
424
423
 
425
- @property
424
+ @_builtins.property
426
425
  @pulumi.getter
427
- def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
426
+ def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
428
427
  """
429
428
  Policies which should be granted to user
430
429
  """
431
430
  return pulumi.get(self, "policies")
432
431
 
433
- @property
432
+ @_builtins.property
434
433
  @pulumi.getter
435
- def username(self) -> pulumi.Output[builtins.str]:
434
+ def username(self) -> pulumi.Output[_builtins.str]:
436
435
  """
437
436
  The LDAP username
438
437
  """
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -59,57 +58,57 @@ class GetDynamicCredentialsResult:
59
58
  raise TypeError("Expected argument 'username' to be a str")
60
59
  pulumi.set(__self__, "username", username)
61
60
 
62
- @property
61
+ @_builtins.property
63
62
  @pulumi.getter(name="distinguishedNames")
64
- def distinguished_names(self) -> Sequence[builtins.str]:
63
+ def distinguished_names(self) -> Sequence[_builtins.str]:
65
64
  return pulumi.get(self, "distinguished_names")
66
65
 
67
- @property
66
+ @_builtins.property
68
67
  @pulumi.getter
69
- def id(self) -> builtins.str:
68
+ def id(self) -> _builtins.str:
70
69
  """
71
70
  The provider-assigned unique ID for this managed resource.
72
71
  """
73
72
  return pulumi.get(self, "id")
74
73
 
75
- @property
74
+ @_builtins.property
76
75
  @pulumi.getter(name="leaseDuration")
77
- def lease_duration(self) -> builtins.int:
76
+ def lease_duration(self) -> _builtins.int:
78
77
  return pulumi.get(self, "lease_duration")
79
78
 
80
- @property
79
+ @_builtins.property
81
80
  @pulumi.getter(name="leaseId")
82
- def lease_id(self) -> builtins.str:
81
+ def lease_id(self) -> _builtins.str:
83
82
  return pulumi.get(self, "lease_id")
84
83
 
85
- @property
84
+ @_builtins.property
86
85
  @pulumi.getter(name="leaseRenewable")
87
- def lease_renewable(self) -> builtins.bool:
86
+ def lease_renewable(self) -> _builtins.bool:
88
87
  return pulumi.get(self, "lease_renewable")
89
88
 
90
- @property
89
+ @_builtins.property
91
90
  @pulumi.getter
92
- def mount(self) -> builtins.str:
91
+ def mount(self) -> _builtins.str:
93
92
  return pulumi.get(self, "mount")
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter
97
- def namespace(self) -> Optional[builtins.str]:
96
+ def namespace(self) -> Optional[_builtins.str]:
98
97
  return pulumi.get(self, "namespace")
99
98
 
100
- @property
99
+ @_builtins.property
101
100
  @pulumi.getter
102
- def password(self) -> builtins.str:
101
+ def password(self) -> _builtins.str:
103
102
  return pulumi.get(self, "password")
104
103
 
105
- @property
104
+ @_builtins.property
106
105
  @pulumi.getter(name="roleName")
107
- def role_name(self) -> builtins.str:
106
+ def role_name(self) -> _builtins.str:
108
107
  return pulumi.get(self, "role_name")
109
108
 
110
- @property
109
+ @_builtins.property
111
110
  @pulumi.getter
112
- def username(self) -> builtins.str:
111
+ def username(self) -> _builtins.str:
113
112
  return pulumi.get(self, "username")
114
113
 
115
114
 
@@ -131,9 +130,9 @@ class AwaitableGetDynamicCredentialsResult(GetDynamicCredentialsResult):
131
130
  username=self.username)
132
131
 
133
132
 
134
- def get_dynamic_credentials(mount: Optional[builtins.str] = None,
135
- namespace: Optional[builtins.str] = None,
136
- role_name: Optional[builtins.str] = None,
133
+ def get_dynamic_credentials(mount: Optional[_builtins.str] = None,
134
+ namespace: Optional[_builtins.str] = None,
135
+ role_name: Optional[_builtins.str] = None,
137
136
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetDynamicCredentialsResult:
138
137
  """
139
138
  Use this data source to access information about an existing resource.
@@ -156,9 +155,9 @@ def get_dynamic_credentials(mount: Optional[builtins.str] = None,
156
155
  password=pulumi.get(__ret__, 'password'),
157
156
  role_name=pulumi.get(__ret__, 'role_name'),
158
157
  username=pulumi.get(__ret__, 'username'))
159
- def get_dynamic_credentials_output(mount: Optional[pulumi.Input[builtins.str]] = None,
160
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
161
- role_name: Optional[pulumi.Input[builtins.str]] = None,
158
+ def get_dynamic_credentials_output(mount: Optional[pulumi.Input[_builtins.str]] = None,
159
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
160
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
162
161
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetDynamicCredentialsResult]:
163
162
  """
164
163
  Use this data source to access information about an existing resource.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -62,62 +61,62 @@ class GetStaticCredentialsResult:
62
61
  raise TypeError("Expected argument 'username' to be a str")
63
62
  pulumi.set(__self__, "username", username)
64
63
 
65
- @property
64
+ @_builtins.property
66
65
  @pulumi.getter
67
- def dn(self) -> builtins.str:
66
+ def dn(self) -> _builtins.str:
68
67
  return pulumi.get(self, "dn")
69
68
 
70
- @property
69
+ @_builtins.property
71
70
  @pulumi.getter
72
- def id(self) -> builtins.str:
71
+ def id(self) -> _builtins.str:
73
72
  """
74
73
  The provider-assigned unique ID for this managed resource.
75
74
  """
76
75
  return pulumi.get(self, "id")
77
76
 
78
- @property
77
+ @_builtins.property
79
78
  @pulumi.getter(name="lastPassword")
80
- def last_password(self) -> builtins.str:
79
+ def last_password(self) -> _builtins.str:
81
80
  return pulumi.get(self, "last_password")
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter(name="lastVaultRotation")
85
- def last_vault_rotation(self) -> builtins.str:
84
+ def last_vault_rotation(self) -> _builtins.str:
86
85
  return pulumi.get(self, "last_vault_rotation")
87
86
 
88
- @property
87
+ @_builtins.property
89
88
  @pulumi.getter
90
- def mount(self) -> builtins.str:
89
+ def mount(self) -> _builtins.str:
91
90
  return pulumi.get(self, "mount")
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter
95
- def namespace(self) -> Optional[builtins.str]:
94
+ def namespace(self) -> Optional[_builtins.str]:
96
95
  return pulumi.get(self, "namespace")
97
96
 
98
- @property
97
+ @_builtins.property
99
98
  @pulumi.getter
100
- def password(self) -> builtins.str:
99
+ def password(self) -> _builtins.str:
101
100
  return pulumi.get(self, "password")
102
101
 
103
- @property
102
+ @_builtins.property
104
103
  @pulumi.getter(name="roleName")
105
- def role_name(self) -> builtins.str:
104
+ def role_name(self) -> _builtins.str:
106
105
  return pulumi.get(self, "role_name")
107
106
 
108
- @property
107
+ @_builtins.property
109
108
  @pulumi.getter(name="rotationPeriod")
110
- def rotation_period(self) -> builtins.int:
109
+ def rotation_period(self) -> _builtins.int:
111
110
  return pulumi.get(self, "rotation_period")
112
111
 
113
- @property
112
+ @_builtins.property
114
113
  @pulumi.getter
115
- def ttl(self) -> builtins.int:
114
+ def ttl(self) -> _builtins.int:
116
115
  return pulumi.get(self, "ttl")
117
116
 
118
- @property
117
+ @_builtins.property
119
118
  @pulumi.getter
120
- def username(self) -> builtins.str:
119
+ def username(self) -> _builtins.str:
121
120
  return pulumi.get(self, "username")
122
121
 
123
122
 
@@ -140,9 +139,9 @@ class AwaitableGetStaticCredentialsResult(GetStaticCredentialsResult):
140
139
  username=self.username)
141
140
 
142
141
 
143
- def get_static_credentials(mount: Optional[builtins.str] = None,
144
- namespace: Optional[builtins.str] = None,
145
- role_name: Optional[builtins.str] = None,
142
+ def get_static_credentials(mount: Optional[_builtins.str] = None,
143
+ namespace: Optional[_builtins.str] = None,
144
+ role_name: Optional[_builtins.str] = None,
146
145
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetStaticCredentialsResult:
147
146
  """
148
147
  Use this data source to access information about an existing resource.
@@ -166,9 +165,9 @@ def get_static_credentials(mount: Optional[builtins.str] = None,
166
165
  rotation_period=pulumi.get(__ret__, 'rotation_period'),
167
166
  ttl=pulumi.get(__ret__, 'ttl'),
168
167
  username=pulumi.get(__ret__, 'username'))
169
- def get_static_credentials_output(mount: Optional[pulumi.Input[builtins.str]] = None,
170
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
171
- role_name: Optional[pulumi.Input[builtins.str]] = None,
168
+ def get_static_credentials_output(mount: Optional[pulumi.Input[_builtins.str]] = None,
169
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
170
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
172
171
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetStaticCredentialsResult]:
173
172
  """
174
173
  Use this data source to access information about an existing resource.