pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -77,30 +76,30 @@ class GetBackendIssuerResult:
77
76
  raise TypeError("Expected argument 'usage' to be a str")
78
77
  pulumi.set(__self__, "usage", usage)
79
78
 
80
- @property
79
+ @_builtins.property
81
80
  @pulumi.getter
82
- def backend(self) -> builtins.str:
81
+ def backend(self) -> _builtins.str:
83
82
  return pulumi.get(self, "backend")
84
83
 
85
- @property
84
+ @_builtins.property
86
85
  @pulumi.getter(name="caChains")
87
- def ca_chains(self) -> Sequence[builtins.str]:
86
+ def ca_chains(self) -> Sequence[_builtins.str]:
88
87
  """
89
88
  The CA chain as a list of format specific certificates.
90
89
  """
91
90
  return pulumi.get(self, "ca_chains")
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter
95
- def certificate(self) -> builtins.str:
94
+ def certificate(self) -> _builtins.str:
96
95
  """
97
96
  Certificate associated with this issuer.
98
97
  """
99
98
  return pulumi.get(self, "certificate")
100
99
 
101
- @property
100
+ @_builtins.property
102
101
  @pulumi.getter(name="disableCriticalExtensionChecks")
103
- def disable_critical_extension_checks(self) -> Optional[builtins.bool]:
102
+ def disable_critical_extension_checks(self) -> Optional[_builtins.bool]:
104
103
  """
105
104
  This determines whether this
106
105
  issuer is able to issue certificates where the chain of trust (including the
@@ -108,9 +107,9 @@ class GetBackendIssuerResult:
108
107
  """
109
108
  return pulumi.get(self, "disable_critical_extension_checks")
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter(name="disableNameChecks")
113
- def disable_name_checks(self) -> Optional[builtins.bool]:
112
+ def disable_name_checks(self) -> Optional[_builtins.bool]:
114
113
  """
115
114
  This determines whether this issuer is able
116
115
  to issue certificates where the chain of trust (including the final issued
@@ -119,9 +118,9 @@ class GetBackendIssuerResult:
119
118
  """
120
119
  return pulumi.get(self, "disable_name_checks")
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter(name="disableNameConstraintChecks")
124
- def disable_name_constraint_checks(self) -> Optional[builtins.bool]:
123
+ def disable_name_constraint_checks(self) -> Optional[_builtins.bool]:
125
124
  """
126
125
  This determines whether this
127
126
  issuer is able to issue certificates where the chain of trust (including the
@@ -130,9 +129,9 @@ class GetBackendIssuerResult:
130
129
  """
131
130
  return pulumi.get(self, "disable_name_constraint_checks")
132
131
 
133
- @property
132
+ @_builtins.property
134
133
  @pulumi.getter(name="disablePathLengthChecks")
135
- def disable_path_length_checks(self) -> Optional[builtins.bool]:
134
+ def disable_path_length_checks(self) -> Optional[_builtins.bool]:
136
135
  """
137
136
  This determines whether this issuer
138
137
  is able to issue certificates where the chain of trust (including the final
@@ -141,68 +140,68 @@ class GetBackendIssuerResult:
141
140
  """
142
141
  return pulumi.get(self, "disable_path_length_checks")
143
142
 
144
- @property
143
+ @_builtins.property
145
144
  @pulumi.getter
146
- def id(self) -> builtins.str:
145
+ def id(self) -> _builtins.str:
147
146
  """
148
147
  The provider-assigned unique ID for this managed resource.
149
148
  """
150
149
  return pulumi.get(self, "id")
151
150
 
152
- @property
151
+ @_builtins.property
153
152
  @pulumi.getter(name="issuerId")
154
- def issuer_id(self) -> builtins.str:
153
+ def issuer_id(self) -> _builtins.str:
155
154
  """
156
155
  ID of the issuer.
157
156
  """
158
157
  return pulumi.get(self, "issuer_id")
159
158
 
160
- @property
159
+ @_builtins.property
161
160
  @pulumi.getter(name="issuerName")
162
- def issuer_name(self) -> builtins.str:
161
+ def issuer_name(self) -> _builtins.str:
163
162
  """
164
163
  Name of the issuer.
165
164
  """
166
165
  return pulumi.get(self, "issuer_name")
167
166
 
168
- @property
167
+ @_builtins.property
169
168
  @pulumi.getter(name="issuerRef")
170
- def issuer_ref(self) -> builtins.str:
169
+ def issuer_ref(self) -> _builtins.str:
171
170
  return pulumi.get(self, "issuer_ref")
172
171
 
173
- @property
172
+ @_builtins.property
174
173
  @pulumi.getter(name="keyId")
175
- def key_id(self) -> builtins.str:
174
+ def key_id(self) -> _builtins.str:
176
175
  """
177
176
  ID of the key used by the issuer.
178
177
  """
179
178
  return pulumi.get(self, "key_id")
180
179
 
181
- @property
180
+ @_builtins.property
182
181
  @pulumi.getter(name="leafNotAfterBehavior")
183
- def leaf_not_after_behavior(self) -> builtins.str:
182
+ def leaf_not_after_behavior(self) -> _builtins.str:
184
183
  """
185
184
  Behavior of a leaf's NotAfter field during issuance.
186
185
  """
187
186
  return pulumi.get(self, "leaf_not_after_behavior")
188
187
 
189
- @property
188
+ @_builtins.property
190
189
  @pulumi.getter(name="manualChains")
191
- def manual_chains(self) -> Sequence[builtins.str]:
190
+ def manual_chains(self) -> Sequence[_builtins.str]:
192
191
  """
193
192
  Chain of issuer references to build this issuer's computed
194
193
  CAChain field from, when non-empty.
195
194
  """
196
195
  return pulumi.get(self, "manual_chains")
197
196
 
198
- @property
197
+ @_builtins.property
199
198
  @pulumi.getter
200
- def namespace(self) -> Optional[builtins.str]:
199
+ def namespace(self) -> Optional[_builtins.str]:
201
200
  return pulumi.get(self, "namespace")
202
201
 
203
- @property
202
+ @_builtins.property
204
203
  @pulumi.getter
205
- def usage(self) -> builtins.str:
204
+ def usage(self) -> _builtins.str:
206
205
  """
207
206
  Allowed usages for this issuer.
208
207
  """
@@ -233,13 +232,13 @@ class AwaitableGetBackendIssuerResult(GetBackendIssuerResult):
233
232
  usage=self.usage)
234
233
 
235
234
 
236
- def get_backend_issuer(backend: Optional[builtins.str] = None,
237
- disable_critical_extension_checks: Optional[builtins.bool] = None,
238
- disable_name_checks: Optional[builtins.bool] = None,
239
- disable_name_constraint_checks: Optional[builtins.bool] = None,
240
- disable_path_length_checks: Optional[builtins.bool] = None,
241
- issuer_ref: Optional[builtins.str] = None,
242
- namespace: Optional[builtins.str] = None,
235
+ def get_backend_issuer(backend: Optional[_builtins.str] = None,
236
+ disable_critical_extension_checks: Optional[_builtins.bool] = None,
237
+ disable_name_checks: Optional[_builtins.bool] = None,
238
+ disable_name_constraint_checks: Optional[_builtins.bool] = None,
239
+ disable_path_length_checks: Optional[_builtins.bool] = None,
240
+ issuer_ref: Optional[_builtins.str] = None,
241
+ namespace: Optional[_builtins.str] = None,
243
242
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuerResult:
244
243
  """
245
244
  ## Example Usage
@@ -252,7 +251,7 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
252
251
  path="pki",
253
252
  type="pki",
254
253
  description="PKI secret engine mount")
255
- root = vault.pki_secret.SecretBackendRootCert("root",
254
+ root = vault.pkisecret.SecretBackendRootCert("root",
256
255
  backend=pki.path,
257
256
  type="internal",
258
257
  common_name="example",
@@ -263,25 +262,25 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
263
262
  ```
264
263
 
265
264
 
266
- :param builtins.str backend: The path to the PKI secret backend to
265
+ :param _builtins.str backend: The path to the PKI secret backend to
267
266
  read the issuer from, with no leading or trailing `/`s.
268
- :param builtins.bool disable_critical_extension_checks: This determines whether this
267
+ :param _builtins.bool disable_critical_extension_checks: This determines whether this
269
268
  issuer is able to issue certificates where the chain of trust (including the
270
269
  issued certificate) contain critical extensions not processed by Vault.
271
- :param builtins.bool disable_name_checks: This determines whether this issuer is able
270
+ :param _builtins.bool disable_name_checks: This determines whether this issuer is able
272
271
  to issue certificates where the chain of trust (including the final issued
273
272
  certificate) contains a link in which the subject of the issuing certificate
274
273
  does not match the named issuer of the certificate it signed.
275
- :param builtins.bool disable_name_constraint_checks: This determines whether this
274
+ :param _builtins.bool disable_name_constraint_checks: This determines whether this
276
275
  issuer is able to issue certificates where the chain of trust (including the
277
276
  final issued certificate) violates the name constraints critical extension of
278
277
  one of the issuer certificates in the chain.
279
- :param builtins.bool disable_path_length_checks: This determines whether this issuer
278
+ :param _builtins.bool disable_path_length_checks: This determines whether this issuer
280
279
  is able to issue certificates where the chain of trust (including the final
281
280
  issued certificate) is longer than allowed by a certificate authority in that
282
281
  chain.
283
- :param builtins.str issuer_ref: Reference to an existing issuer.
284
- :param builtins.str namespace: The namespace of the target resource.
282
+ :param _builtins.str issuer_ref: Reference to an existing issuer.
283
+ :param _builtins.str namespace: The namespace of the target resource.
285
284
  The value should not contain leading or trailing forward slashes.
286
285
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
287
286
  *Available only for Vault Enterprise*.
@@ -314,13 +313,13 @@ def get_backend_issuer(backend: Optional[builtins.str] = None,
314
313
  manual_chains=pulumi.get(__ret__, 'manual_chains'),
315
314
  namespace=pulumi.get(__ret__, 'namespace'),
316
315
  usage=pulumi.get(__ret__, 'usage'))
317
- def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = None,
318
- disable_critical_extension_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
319
- disable_name_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
320
- disable_name_constraint_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
321
- disable_path_length_checks: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
322
- issuer_ref: Optional[pulumi.Input[builtins.str]] = None,
323
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
316
+ def get_backend_issuer_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
317
+ disable_critical_extension_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
318
+ disable_name_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
319
+ disable_name_constraint_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
320
+ disable_path_length_checks: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
321
+ issuer_ref: Optional[pulumi.Input[_builtins.str]] = None,
322
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
324
323
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuerResult]:
325
324
  """
326
325
  ## Example Usage
@@ -333,7 +332,7 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = No
333
332
  path="pki",
334
333
  type="pki",
335
334
  description="PKI secret engine mount")
336
- root = vault.pki_secret.SecretBackendRootCert("root",
335
+ root = vault.pkisecret.SecretBackendRootCert("root",
337
336
  backend=pki.path,
338
337
  type="internal",
339
338
  common_name="example",
@@ -344,25 +343,25 @@ def get_backend_issuer_output(backend: Optional[pulumi.Input[builtins.str]] = No
344
343
  ```
345
344
 
346
345
 
347
- :param builtins.str backend: The path to the PKI secret backend to
346
+ :param _builtins.str backend: The path to the PKI secret backend to
348
347
  read the issuer from, with no leading or trailing `/`s.
349
- :param builtins.bool disable_critical_extension_checks: This determines whether this
348
+ :param _builtins.bool disable_critical_extension_checks: This determines whether this
350
349
  issuer is able to issue certificates where the chain of trust (including the
351
350
  issued certificate) contain critical extensions not processed by Vault.
352
- :param builtins.bool disable_name_checks: This determines whether this issuer is able
351
+ :param _builtins.bool disable_name_checks: This determines whether this issuer is able
353
352
  to issue certificates where the chain of trust (including the final issued
354
353
  certificate) contains a link in which the subject of the issuing certificate
355
354
  does not match the named issuer of the certificate it signed.
356
- :param builtins.bool disable_name_constraint_checks: This determines whether this
355
+ :param _builtins.bool disable_name_constraint_checks: This determines whether this
357
356
  issuer is able to issue certificates where the chain of trust (including the
358
357
  final issued certificate) violates the name constraints critical extension of
359
358
  one of the issuer certificates in the chain.
360
- :param builtins.bool disable_path_length_checks: This determines whether this issuer
359
+ :param _builtins.bool disable_path_length_checks: This determines whether this issuer
361
360
  is able to issue certificates where the chain of trust (including the final
362
361
  issued certificate) is longer than allowed by a certificate authority in that
363
362
  chain.
364
- :param builtins.str issuer_ref: Reference to an existing issuer.
365
- :param builtins.str namespace: The namespace of the target resource.
363
+ :param _builtins.str issuer_ref: Reference to an existing issuer.
364
+ :param _builtins.str namespace: The namespace of the target resource.
366
365
  The value should not contain leading or trailing forward slashes.
367
366
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
368
367
  *Available only for Vault Enterprise*.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -47,46 +46,46 @@ class GetBackendIssuersResult:
47
46
  raise TypeError("Expected argument 'namespace' to be a str")
48
47
  pulumi.set(__self__, "namespace", namespace)
49
48
 
50
- @property
49
+ @_builtins.property
51
50
  @pulumi.getter
52
- def backend(self) -> builtins.str:
51
+ def backend(self) -> _builtins.str:
53
52
  return pulumi.get(self, "backend")
54
53
 
55
- @property
54
+ @_builtins.property
56
55
  @pulumi.getter
57
- def id(self) -> builtins.str:
56
+ def id(self) -> _builtins.str:
58
57
  """
59
58
  The provider-assigned unique ID for this managed resource.
60
59
  """
61
60
  return pulumi.get(self, "id")
62
61
 
63
- @property
62
+ @_builtins.property
64
63
  @pulumi.getter(name="keyInfo")
65
- def key_info(self) -> Mapping[str, builtins.str]:
64
+ def key_info(self) -> Mapping[str, _builtins.str]:
66
65
  """
67
66
  Map of issuer strings read from Vault.
68
67
  """
69
68
  return pulumi.get(self, "key_info")
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter(name="keyInfoJson")
73
- def key_info_json(self) -> builtins.str:
72
+ def key_info_json(self) -> _builtins.str:
74
73
  """
75
74
  JSON-encoded issuer data read from Vault.
76
75
  """
77
76
  return pulumi.get(self, "key_info_json")
78
77
 
79
- @property
78
+ @_builtins.property
80
79
  @pulumi.getter
81
- def keys(self) -> Sequence[builtins.str]:
80
+ def keys(self) -> Sequence[_builtins.str]:
82
81
  """
83
82
  Keys used by issuers under the backend path.
84
83
  """
85
84
  return pulumi.get(self, "keys")
86
85
 
87
- @property
86
+ @_builtins.property
88
87
  @pulumi.getter
89
- def namespace(self) -> Optional[builtins.str]:
88
+ def namespace(self) -> Optional[_builtins.str]:
90
89
  return pulumi.get(self, "namespace")
91
90
 
92
91
 
@@ -104,8 +103,8 @@ class AwaitableGetBackendIssuersResult(GetBackendIssuersResult):
104
103
  namespace=self.namespace)
105
104
 
106
105
 
107
- def get_backend_issuers(backend: Optional[builtins.str] = None,
108
- namespace: Optional[builtins.str] = None,
106
+ def get_backend_issuers(backend: Optional[_builtins.str] = None,
107
+ namespace: Optional[_builtins.str] = None,
109
108
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendIssuersResult:
110
109
  """
111
110
  ## Example Usage
@@ -118,7 +117,7 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
118
117
  path="pki",
119
118
  type="pki",
120
119
  description="PKI secret engine mount")
121
- root = vault.pki_secret.SecretBackendRootCert("root",
120
+ root = vault.pkisecret.SecretBackendRootCert("root",
122
121
  backend=pki.path,
123
122
  type="internal",
124
123
  common_name="example",
@@ -128,9 +127,9 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
128
127
  ```
129
128
 
130
129
 
131
- :param builtins.str backend: The path to the PKI secret backend to
130
+ :param _builtins.str backend: The path to the PKI secret backend to
132
131
  read the issuers from, with no leading or trailing `/`s.
133
- :param builtins.str namespace: The namespace of the target resource.
132
+ :param _builtins.str namespace: The namespace of the target resource.
134
133
  The value should not contain leading or trailing forward slashes.
135
134
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
136
135
  *Available only for Vault Enterprise*.
@@ -148,8 +147,8 @@ def get_backend_issuers(backend: Optional[builtins.str] = None,
148
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
149
148
  keys=pulumi.get(__ret__, 'keys'),
150
149
  namespace=pulumi.get(__ret__, 'namespace'))
151
- def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = None,
152
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
150
+ def get_backend_issuers_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
151
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
153
152
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendIssuersResult]:
154
153
  """
155
154
  ## Example Usage
@@ -162,7 +161,7 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = N
162
161
  path="pki",
163
162
  type="pki",
164
163
  description="PKI secret engine mount")
165
- root = vault.pki_secret.SecretBackendRootCert("root",
164
+ root = vault.pkisecret.SecretBackendRootCert("root",
166
165
  backend=pki.path,
167
166
  type="internal",
168
167
  common_name="example",
@@ -172,9 +171,9 @@ def get_backend_issuers_output(backend: Optional[pulumi.Input[builtins.str]] = N
172
171
  ```
173
172
 
174
173
 
175
- :param builtins.str backend: The path to the PKI secret backend to
174
+ :param _builtins.str backend: The path to the PKI secret backend to
176
175
  read the issuers from, with no leading or trailing `/`s.
177
- :param builtins.str namespace: The namespace of the target resource.
176
+ :param _builtins.str namespace: The namespace of the target resource.
178
177
  The value should not contain leading or trailing forward slashes.
179
178
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
180
179
  *Available only for Vault Enterprise*.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -50,51 +49,51 @@ class GetBackendKeyResult:
50
49
  raise TypeError("Expected argument 'namespace' to be a str")
51
50
  pulumi.set(__self__, "namespace", namespace)
52
51
 
53
- @property
52
+ @_builtins.property
54
53
  @pulumi.getter
55
- def backend(self) -> builtins.str:
54
+ def backend(self) -> _builtins.str:
56
55
  return pulumi.get(self, "backend")
57
56
 
58
- @property
57
+ @_builtins.property
59
58
  @pulumi.getter
60
- def id(self) -> builtins.str:
59
+ def id(self) -> _builtins.str:
61
60
  """
62
61
  The provider-assigned unique ID for this managed resource.
63
62
  """
64
63
  return pulumi.get(self, "id")
65
64
 
66
- @property
65
+ @_builtins.property
67
66
  @pulumi.getter(name="keyId")
68
- def key_id(self) -> builtins.str:
67
+ def key_id(self) -> _builtins.str:
69
68
  """
70
69
  ID of the key.
71
70
  """
72
71
  return pulumi.get(self, "key_id")
73
72
 
74
- @property
73
+ @_builtins.property
75
74
  @pulumi.getter(name="keyName")
76
- def key_name(self) -> builtins.str:
75
+ def key_name(self) -> _builtins.str:
77
76
  """
78
77
  Name of the key.
79
78
  """
80
79
  return pulumi.get(self, "key_name")
81
80
 
82
- @property
81
+ @_builtins.property
83
82
  @pulumi.getter(name="keyRef")
84
- def key_ref(self) -> builtins.str:
83
+ def key_ref(self) -> _builtins.str:
85
84
  return pulumi.get(self, "key_ref")
86
85
 
87
- @property
86
+ @_builtins.property
88
87
  @pulumi.getter(name="keyType")
89
- def key_type(self) -> builtins.str:
88
+ def key_type(self) -> _builtins.str:
90
89
  """
91
90
  Type of the key.
92
91
  """
93
92
  return pulumi.get(self, "key_type")
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter
97
- def namespace(self) -> Optional[builtins.str]:
96
+ def namespace(self) -> Optional[_builtins.str]:
98
97
  return pulumi.get(self, "namespace")
99
98
 
100
99
 
@@ -113,9 +112,9 @@ class AwaitableGetBackendKeyResult(GetBackendKeyResult):
113
112
  namespace=self.namespace)
114
113
 
115
114
 
116
- def get_backend_key(backend: Optional[builtins.str] = None,
117
- key_ref: Optional[builtins.str] = None,
118
- namespace: Optional[builtins.str] = None,
115
+ def get_backend_key(backend: Optional[_builtins.str] = None,
116
+ key_ref: Optional[_builtins.str] = None,
117
+ namespace: Optional[_builtins.str] = None,
119
118
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeyResult:
120
119
  """
121
120
  ## Example Usage
@@ -128,7 +127,7 @@ def get_backend_key(backend: Optional[builtins.str] = None,
128
127
  path="pki",
129
128
  type="pki",
130
129
  description="PKI secret engine mount")
131
- key = vault.pki_secret.SecretBackendKey("key",
130
+ key = vault.pkisecret.SecretBackendKey("key",
132
131
  backend=pki.path,
133
132
  type="internal",
134
133
  key_name="example",
@@ -139,10 +138,10 @@ def get_backend_key(backend: Optional[builtins.str] = None,
139
138
  ```
140
139
 
141
140
 
142
- :param builtins.str backend: The path to the PKI secret backend to
141
+ :param _builtins.str backend: The path to the PKI secret backend to
143
142
  read the key from, with no leading or trailing `/`s.
144
- :param builtins.str key_ref: Reference to an existing key.
145
- :param builtins.str namespace: The namespace of the target resource.
143
+ :param _builtins.str key_ref: Reference to an existing key.
144
+ :param _builtins.str namespace: The namespace of the target resource.
146
145
  The value should not contain leading or trailing forward slashes.
147
146
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
148
147
  *Available only for Vault Enterprise*.
@@ -162,9 +161,9 @@ def get_backend_key(backend: Optional[builtins.str] = None,
162
161
  key_ref=pulumi.get(__ret__, 'key_ref'),
163
162
  key_type=pulumi.get(__ret__, 'key_type'),
164
163
  namespace=pulumi.get(__ret__, 'namespace'))
165
- def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
166
- key_ref: Optional[pulumi.Input[builtins.str]] = None,
167
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
164
+ def get_backend_key_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
165
+ key_ref: Optional[pulumi.Input[_builtins.str]] = None,
166
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
168
167
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeyResult]:
169
168
  """
170
169
  ## Example Usage
@@ -177,7 +176,7 @@ def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
177
176
  path="pki",
178
177
  type="pki",
179
178
  description="PKI secret engine mount")
180
- key = vault.pki_secret.SecretBackendKey("key",
179
+ key = vault.pkisecret.SecretBackendKey("key",
181
180
  backend=pki.path,
182
181
  type="internal",
183
182
  key_name="example",
@@ -188,10 +187,10 @@ def get_backend_key_output(backend: Optional[pulumi.Input[builtins.str]] = None,
188
187
  ```
189
188
 
190
189
 
191
- :param builtins.str backend: The path to the PKI secret backend to
190
+ :param _builtins.str backend: The path to the PKI secret backend to
192
191
  read the key from, with no leading or trailing `/`s.
193
- :param builtins.str key_ref: Reference to an existing key.
194
- :param builtins.str namespace: The namespace of the target resource.
192
+ :param _builtins.str key_ref: Reference to an existing key.
193
+ :param _builtins.str namespace: The namespace of the target resource.
195
194
  The value should not contain leading or trailing forward slashes.
196
195
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
197
196
  *Available only for Vault Enterprise*.