pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,20 +19,20 @@ __all__ = ['BackendAcmeEabArgs', 'BackendAcmeEab']
20
19
  @pulumi.input_type
21
20
  class BackendAcmeEabArgs:
22
21
  def __init__(__self__, *,
23
- backend: pulumi.Input[builtins.str],
24
- issuer: Optional[pulumi.Input[builtins.str]] = None,
25
- namespace: Optional[pulumi.Input[builtins.str]] = None,
26
- role: Optional[pulumi.Input[builtins.str]] = None):
22
+ backend: pulumi.Input[_builtins.str],
23
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ role: Optional[pulumi.Input[_builtins.str]] = None):
27
26
  """
28
27
  The set of arguments for constructing a BackendAcmeEab resource.
29
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
28
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
30
29
  create the EAB token within, with no leading or trailing `/`s.
31
- :param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
32
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
30
+ :param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
31
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
33
32
  The value should not contain leading or trailing forward slashes.
34
33
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
34
  *Available only for Vault Enterprise*.
36
- :param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
35
+ :param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
37
36
 
38
37
  **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
39
38
 
@@ -50,9 +49,9 @@ class BackendAcmeEabArgs:
50
49
  if role is not None:
51
50
  pulumi.set(__self__, "role", role)
52
51
 
53
- @property
52
+ @_builtins.property
54
53
  @pulumi.getter
55
- def backend(self) -> pulumi.Input[builtins.str]:
54
+ def backend(self) -> pulumi.Input[_builtins.str]:
56
55
  """
57
56
  The path to the PKI secret backend to
58
57
  create the EAB token within, with no leading or trailing `/`s.
@@ -60,24 +59,24 @@ class BackendAcmeEabArgs:
60
59
  return pulumi.get(self, "backend")
61
60
 
62
61
  @backend.setter
63
- def backend(self, value: pulumi.Input[builtins.str]):
62
+ def backend(self, value: pulumi.Input[_builtins.str]):
64
63
  pulumi.set(self, "backend", value)
65
64
 
66
- @property
65
+ @_builtins.property
67
66
  @pulumi.getter
68
- def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
67
+ def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
69
68
  """
70
69
  Create an EAB token that is specific to an issuer's ACME directory.
71
70
  """
72
71
  return pulumi.get(self, "issuer")
73
72
 
74
73
  @issuer.setter
75
- def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
74
+ def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
76
75
  pulumi.set(self, "issuer", value)
77
76
 
78
- @property
77
+ @_builtins.property
79
78
  @pulumi.getter
80
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
79
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
81
80
  """
82
81
  The namespace of the target resource.
83
82
  The value should not contain leading or trailing forward slashes.
@@ -87,12 +86,12 @@ class BackendAcmeEabArgs:
87
86
  return pulumi.get(self, "namespace")
88
87
 
89
88
  @namespace.setter
90
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
89
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
91
90
  pulumi.set(self, "namespace", value)
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter
95
- def role(self) -> Optional[pulumi.Input[builtins.str]]:
94
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
96
95
  """
97
96
  Create an EAB token that is specific to a role's ACME directory.
98
97
 
@@ -106,37 +105,37 @@ class BackendAcmeEabArgs:
106
105
  return pulumi.get(self, "role")
107
106
 
108
107
  @role.setter
109
- def role(self, value: Optional[pulumi.Input[builtins.str]]):
108
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
110
109
  pulumi.set(self, "role", value)
111
110
 
112
111
 
113
112
  @pulumi.input_type
114
113
  class _BackendAcmeEabState:
115
114
  def __init__(__self__, *,
116
- acme_directory: Optional[pulumi.Input[builtins.str]] = None,
117
- backend: Optional[pulumi.Input[builtins.str]] = None,
118
- created_on: Optional[pulumi.Input[builtins.str]] = None,
119
- eab_id: Optional[pulumi.Input[builtins.str]] = None,
120
- issuer: Optional[pulumi.Input[builtins.str]] = None,
121
- key: Optional[pulumi.Input[builtins.str]] = None,
122
- key_type: Optional[pulumi.Input[builtins.str]] = None,
123
- namespace: Optional[pulumi.Input[builtins.str]] = None,
124
- role: Optional[pulumi.Input[builtins.str]] = None):
115
+ acme_directory: Optional[pulumi.Input[_builtins.str]] = None,
116
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
117
+ created_on: Optional[pulumi.Input[_builtins.str]] = None,
118
+ eab_id: Optional[pulumi.Input[_builtins.str]] = None,
119
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
120
+ key: Optional[pulumi.Input[_builtins.str]] = None,
121
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
122
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
123
+ role: Optional[pulumi.Input[_builtins.str]] = None):
125
124
  """
126
125
  Input properties used for looking up and filtering BackendAcmeEab resources.
127
- :param pulumi.Input[builtins.str] acme_directory: The ACME directory to which the key belongs
128
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
126
+ :param pulumi.Input[_builtins.str] acme_directory: The ACME directory to which the key belongs
127
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
129
128
  create the EAB token within, with no leading or trailing `/`s.
130
- :param pulumi.Input[builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
131
- :param pulumi.Input[builtins.str] eab_id: The identifier of a specific ACME EAB token
132
- :param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
133
- :param pulumi.Input[builtins.str] key: The EAB token
134
- :param pulumi.Input[builtins.str] key_type: The key type of the EAB key
135
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
129
+ :param pulumi.Input[_builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
130
+ :param pulumi.Input[_builtins.str] eab_id: The identifier of a specific ACME EAB token
131
+ :param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
132
+ :param pulumi.Input[_builtins.str] key: The EAB token
133
+ :param pulumi.Input[_builtins.str] key_type: The key type of the EAB key
134
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
136
135
  The value should not contain leading or trailing forward slashes.
137
136
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
138
137
  *Available only for Vault Enterprise*.
139
- :param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
138
+ :param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
140
139
 
141
140
  **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
142
141
 
@@ -164,21 +163,21 @@ class _BackendAcmeEabState:
164
163
  if role is not None:
165
164
  pulumi.set(__self__, "role", role)
166
165
 
167
- @property
166
+ @_builtins.property
168
167
  @pulumi.getter(name="acmeDirectory")
169
- def acme_directory(self) -> Optional[pulumi.Input[builtins.str]]:
168
+ def acme_directory(self) -> Optional[pulumi.Input[_builtins.str]]:
170
169
  """
171
170
  The ACME directory to which the key belongs
172
171
  """
173
172
  return pulumi.get(self, "acme_directory")
174
173
 
175
174
  @acme_directory.setter
176
- def acme_directory(self, value: Optional[pulumi.Input[builtins.str]]):
175
+ def acme_directory(self, value: Optional[pulumi.Input[_builtins.str]]):
177
176
  pulumi.set(self, "acme_directory", value)
178
177
 
179
- @property
178
+ @_builtins.property
180
179
  @pulumi.getter
181
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
180
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
182
181
  """
183
182
  The path to the PKI secret backend to
184
183
  create the EAB token within, with no leading or trailing `/`s.
@@ -186,72 +185,72 @@ class _BackendAcmeEabState:
186
185
  return pulumi.get(self, "backend")
187
186
 
188
187
  @backend.setter
189
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
188
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
190
189
  pulumi.set(self, "backend", value)
191
190
 
192
- @property
191
+ @_builtins.property
193
192
  @pulumi.getter(name="createdOn")
194
- def created_on(self) -> Optional[pulumi.Input[builtins.str]]:
193
+ def created_on(self) -> Optional[pulumi.Input[_builtins.str]]:
195
194
  """
196
195
  An RFC3339 formatted date time when the EAB token was created
197
196
  """
198
197
  return pulumi.get(self, "created_on")
199
198
 
200
199
  @created_on.setter
201
- def created_on(self, value: Optional[pulumi.Input[builtins.str]]):
200
+ def created_on(self, value: Optional[pulumi.Input[_builtins.str]]):
202
201
  pulumi.set(self, "created_on", value)
203
202
 
204
- @property
203
+ @_builtins.property
205
204
  @pulumi.getter(name="eabId")
206
- def eab_id(self) -> Optional[pulumi.Input[builtins.str]]:
205
+ def eab_id(self) -> Optional[pulumi.Input[_builtins.str]]:
207
206
  """
208
207
  The identifier of a specific ACME EAB token
209
208
  """
210
209
  return pulumi.get(self, "eab_id")
211
210
 
212
211
  @eab_id.setter
213
- def eab_id(self, value: Optional[pulumi.Input[builtins.str]]):
212
+ def eab_id(self, value: Optional[pulumi.Input[_builtins.str]]):
214
213
  pulumi.set(self, "eab_id", value)
215
214
 
216
- @property
215
+ @_builtins.property
217
216
  @pulumi.getter
218
- def issuer(self) -> Optional[pulumi.Input[builtins.str]]:
217
+ def issuer(self) -> Optional[pulumi.Input[_builtins.str]]:
219
218
  """
220
219
  Create an EAB token that is specific to an issuer's ACME directory.
221
220
  """
222
221
  return pulumi.get(self, "issuer")
223
222
 
224
223
  @issuer.setter
225
- def issuer(self, value: Optional[pulumi.Input[builtins.str]]):
224
+ def issuer(self, value: Optional[pulumi.Input[_builtins.str]]):
226
225
  pulumi.set(self, "issuer", value)
227
226
 
228
- @property
227
+ @_builtins.property
229
228
  @pulumi.getter
230
- def key(self) -> Optional[pulumi.Input[builtins.str]]:
229
+ def key(self) -> Optional[pulumi.Input[_builtins.str]]:
231
230
  """
232
231
  The EAB token
233
232
  """
234
233
  return pulumi.get(self, "key")
235
234
 
236
235
  @key.setter
237
- def key(self, value: Optional[pulumi.Input[builtins.str]]):
236
+ def key(self, value: Optional[pulumi.Input[_builtins.str]]):
238
237
  pulumi.set(self, "key", value)
239
238
 
240
- @property
239
+ @_builtins.property
241
240
  @pulumi.getter(name="keyType")
242
- def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
241
+ def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
243
242
  """
244
243
  The key type of the EAB key
245
244
  """
246
245
  return pulumi.get(self, "key_type")
247
246
 
248
247
  @key_type.setter
249
- def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
248
+ def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
250
249
  pulumi.set(self, "key_type", value)
251
250
 
252
- @property
251
+ @_builtins.property
253
252
  @pulumi.getter
254
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
253
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
255
254
  """
256
255
  The namespace of the target resource.
257
256
  The value should not contain leading or trailing forward slashes.
@@ -261,12 +260,12 @@ class _BackendAcmeEabState:
261
260
  return pulumi.get(self, "namespace")
262
261
 
263
262
  @namespace.setter
264
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
263
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
265
264
  pulumi.set(self, "namespace", value)
266
265
 
267
- @property
266
+ @_builtins.property
268
267
  @pulumi.getter
269
- def role(self) -> Optional[pulumi.Input[builtins.str]]:
268
+ def role(self) -> Optional[pulumi.Input[_builtins.str]]:
270
269
  """
271
270
  Create an EAB token that is specific to a role's ACME directory.
272
271
 
@@ -280,7 +279,7 @@ class _BackendAcmeEabState:
280
279
  return pulumi.get(self, "role")
281
280
 
282
281
  @role.setter
283
- def role(self, value: Optional[pulumi.Input[builtins.str]]):
282
+ def role(self, value: Optional[pulumi.Input[_builtins.str]]):
284
283
  pulumi.set(self, "role", value)
285
284
 
286
285
 
@@ -290,10 +289,10 @@ class BackendAcmeEab(pulumi.CustomResource):
290
289
  def __init__(__self__,
291
290
  resource_name: str,
292
291
  opts: Optional[pulumi.ResourceOptions] = None,
293
- backend: Optional[pulumi.Input[builtins.str]] = None,
294
- issuer: Optional[pulumi.Input[builtins.str]] = None,
295
- namespace: Optional[pulumi.Input[builtins.str]] = None,
296
- role: Optional[pulumi.Input[builtins.str]] = None,
292
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
293
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
294
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
295
+ role: Optional[pulumi.Input[_builtins.str]] = None,
297
296
  __props__=None):
298
297
  """
299
298
  Allows creating ACME EAB (External Account Binding) tokens and deleting unused ones.
@@ -308,7 +307,7 @@ class BackendAcmeEab(pulumi.CustomResource):
308
307
  path="pki",
309
308
  type="pki",
310
309
  description="PKI secret engine mount")
311
- test_backend_acme_eab = vault.pki_secret.BackendAcmeEab("test", backend=test.path)
310
+ test_backend_acme_eab = vault.pkisecret.BackendAcmeEab("test", backend=test.path)
312
311
  ```
313
312
 
314
313
  ## Import
@@ -319,14 +318,14 @@ class BackendAcmeEab(pulumi.CustomResource):
319
318
 
320
319
  :param str resource_name: The name of the resource.
321
320
  :param pulumi.ResourceOptions opts: Options for the resource.
322
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
321
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
323
322
  create the EAB token within, with no leading or trailing `/`s.
324
- :param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
325
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
323
+ :param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
324
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
326
325
  The value should not contain leading or trailing forward slashes.
327
326
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
328
327
  *Available only for Vault Enterprise*.
329
- :param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
328
+ :param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
330
329
 
331
330
  **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
332
331
 
@@ -354,7 +353,7 @@ class BackendAcmeEab(pulumi.CustomResource):
354
353
  path="pki",
355
354
  type="pki",
356
355
  description="PKI secret engine mount")
357
- test_backend_acme_eab = vault.pki_secret.BackendAcmeEab("test", backend=test.path)
356
+ test_backend_acme_eab = vault.pkisecret.BackendAcmeEab("test", backend=test.path)
358
357
  ```
359
358
 
360
359
  ## Import
@@ -378,10 +377,10 @@ class BackendAcmeEab(pulumi.CustomResource):
378
377
  def _internal_init(__self__,
379
378
  resource_name: str,
380
379
  opts: Optional[pulumi.ResourceOptions] = None,
381
- backend: Optional[pulumi.Input[builtins.str]] = None,
382
- issuer: Optional[pulumi.Input[builtins.str]] = None,
383
- namespace: Optional[pulumi.Input[builtins.str]] = None,
384
- role: Optional[pulumi.Input[builtins.str]] = None,
380
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
381
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
382
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
383
+ role: Optional[pulumi.Input[_builtins.str]] = None,
385
384
  __props__=None):
386
385
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
387
386
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -414,15 +413,15 @@ class BackendAcmeEab(pulumi.CustomResource):
414
413
  def get(resource_name: str,
415
414
  id: pulumi.Input[str],
416
415
  opts: Optional[pulumi.ResourceOptions] = None,
417
- acme_directory: Optional[pulumi.Input[builtins.str]] = None,
418
- backend: Optional[pulumi.Input[builtins.str]] = None,
419
- created_on: Optional[pulumi.Input[builtins.str]] = None,
420
- eab_id: Optional[pulumi.Input[builtins.str]] = None,
421
- issuer: Optional[pulumi.Input[builtins.str]] = None,
422
- key: Optional[pulumi.Input[builtins.str]] = None,
423
- key_type: Optional[pulumi.Input[builtins.str]] = None,
424
- namespace: Optional[pulumi.Input[builtins.str]] = None,
425
- role: Optional[pulumi.Input[builtins.str]] = None) -> 'BackendAcmeEab':
416
+ acme_directory: Optional[pulumi.Input[_builtins.str]] = None,
417
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
418
+ created_on: Optional[pulumi.Input[_builtins.str]] = None,
419
+ eab_id: Optional[pulumi.Input[_builtins.str]] = None,
420
+ issuer: Optional[pulumi.Input[_builtins.str]] = None,
421
+ key: Optional[pulumi.Input[_builtins.str]] = None,
422
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
423
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
424
+ role: Optional[pulumi.Input[_builtins.str]] = None) -> 'BackendAcmeEab':
426
425
  """
427
426
  Get an existing BackendAcmeEab resource's state with the given name, id, and optional extra
428
427
  properties used to qualify the lookup.
@@ -430,19 +429,19 @@ class BackendAcmeEab(pulumi.CustomResource):
430
429
  :param str resource_name: The unique name of the resulting resource.
431
430
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
432
431
  :param pulumi.ResourceOptions opts: Options for the resource.
433
- :param pulumi.Input[builtins.str] acme_directory: The ACME directory to which the key belongs
434
- :param pulumi.Input[builtins.str] backend: The path to the PKI secret backend to
432
+ :param pulumi.Input[_builtins.str] acme_directory: The ACME directory to which the key belongs
433
+ :param pulumi.Input[_builtins.str] backend: The path to the PKI secret backend to
435
434
  create the EAB token within, with no leading or trailing `/`s.
436
- :param pulumi.Input[builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
437
- :param pulumi.Input[builtins.str] eab_id: The identifier of a specific ACME EAB token
438
- :param pulumi.Input[builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
439
- :param pulumi.Input[builtins.str] key: The EAB token
440
- :param pulumi.Input[builtins.str] key_type: The key type of the EAB key
441
- :param pulumi.Input[builtins.str] namespace: The namespace of the target resource.
435
+ :param pulumi.Input[_builtins.str] created_on: An RFC3339 formatted date time when the EAB token was created
436
+ :param pulumi.Input[_builtins.str] eab_id: The identifier of a specific ACME EAB token
437
+ :param pulumi.Input[_builtins.str] issuer: Create an EAB token that is specific to an issuer's ACME directory.
438
+ :param pulumi.Input[_builtins.str] key: The EAB token
439
+ :param pulumi.Input[_builtins.str] key_type: The key type of the EAB key
440
+ :param pulumi.Input[_builtins.str] namespace: The namespace of the target resource.
442
441
  The value should not contain leading or trailing forward slashes.
443
442
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
444
443
  *Available only for Vault Enterprise*.
445
- :param pulumi.Input[builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
444
+ :param pulumi.Input[_builtins.str] role: Create an EAB token that is specific to a role's ACME directory.
446
445
 
447
446
  **NOTE**: Within Vault ACME there are different ACME directories which an EAB token is associated with;
448
447
 
@@ -466,66 +465,66 @@ class BackendAcmeEab(pulumi.CustomResource):
466
465
  __props__.__dict__["role"] = role
467
466
  return BackendAcmeEab(resource_name, opts=opts, __props__=__props__)
468
467
 
469
- @property
468
+ @_builtins.property
470
469
  @pulumi.getter(name="acmeDirectory")
471
- def acme_directory(self) -> pulumi.Output[builtins.str]:
470
+ def acme_directory(self) -> pulumi.Output[_builtins.str]:
472
471
  """
473
472
  The ACME directory to which the key belongs
474
473
  """
475
474
  return pulumi.get(self, "acme_directory")
476
475
 
477
- @property
476
+ @_builtins.property
478
477
  @pulumi.getter
479
- def backend(self) -> pulumi.Output[builtins.str]:
478
+ def backend(self) -> pulumi.Output[_builtins.str]:
480
479
  """
481
480
  The path to the PKI secret backend to
482
481
  create the EAB token within, with no leading or trailing `/`s.
483
482
  """
484
483
  return pulumi.get(self, "backend")
485
484
 
486
- @property
485
+ @_builtins.property
487
486
  @pulumi.getter(name="createdOn")
488
- def created_on(self) -> pulumi.Output[builtins.str]:
487
+ def created_on(self) -> pulumi.Output[_builtins.str]:
489
488
  """
490
489
  An RFC3339 formatted date time when the EAB token was created
491
490
  """
492
491
  return pulumi.get(self, "created_on")
493
492
 
494
- @property
493
+ @_builtins.property
495
494
  @pulumi.getter(name="eabId")
496
- def eab_id(self) -> pulumi.Output[builtins.str]:
495
+ def eab_id(self) -> pulumi.Output[_builtins.str]:
497
496
  """
498
497
  The identifier of a specific ACME EAB token
499
498
  """
500
499
  return pulumi.get(self, "eab_id")
501
500
 
502
- @property
501
+ @_builtins.property
503
502
  @pulumi.getter
504
- def issuer(self) -> pulumi.Output[Optional[builtins.str]]:
503
+ def issuer(self) -> pulumi.Output[Optional[_builtins.str]]:
505
504
  """
506
505
  Create an EAB token that is specific to an issuer's ACME directory.
507
506
  """
508
507
  return pulumi.get(self, "issuer")
509
508
 
510
- @property
509
+ @_builtins.property
511
510
  @pulumi.getter
512
- def key(self) -> pulumi.Output[builtins.str]:
511
+ def key(self) -> pulumi.Output[_builtins.str]:
513
512
  """
514
513
  The EAB token
515
514
  """
516
515
  return pulumi.get(self, "key")
517
516
 
518
- @property
517
+ @_builtins.property
519
518
  @pulumi.getter(name="keyType")
520
- def key_type(self) -> pulumi.Output[builtins.str]:
519
+ def key_type(self) -> pulumi.Output[_builtins.str]:
521
520
  """
522
521
  The key type of the EAB key
523
522
  """
524
523
  return pulumi.get(self, "key_type")
525
524
 
526
- @property
525
+ @_builtins.property
527
526
  @pulumi.getter
528
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
527
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
529
528
  """
530
529
  The namespace of the target resource.
531
530
  The value should not contain leading or trailing forward slashes.
@@ -534,9 +533,9 @@ class BackendAcmeEab(pulumi.CustomResource):
534
533
  """
535
534
  return pulumi.get(self, "namespace")
536
535
 
537
- @property
536
+ @_builtins.property
538
537
  @pulumi.getter
539
- def role(self) -> pulumi.Output[Optional[builtins.str]]:
538
+ def role(self) -> pulumi.Output[Optional[_builtins.str]]:
540
539
  """
541
540
  Create an EAB token that is specific to a role's ACME directory.
542
541