pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,45 +19,45 @@ __all__ = ['SyncAwsDestinationArgs', 'SyncAwsDestination']
20
19
  @pulumi.input_type
21
20
  class SyncAwsDestinationArgs:
22
21
  def __init__(__self__, *,
23
- access_key_id: Optional[pulumi.Input[builtins.str]] = None,
24
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
25
- external_id: Optional[pulumi.Input[builtins.str]] = None,
26
- granularity: Optional[pulumi.Input[builtins.str]] = None,
27
- name: Optional[pulumi.Input[builtins.str]] = None,
28
- namespace: Optional[pulumi.Input[builtins.str]] = None,
29
- region: Optional[pulumi.Input[builtins.str]] = None,
30
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
31
- secret_access_key: Optional[pulumi.Input[builtins.str]] = None,
32
- secret_name_template: Optional[pulumi.Input[builtins.str]] = None):
22
+ access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
23
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
24
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
25
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
26
+ name: Optional[pulumi.Input[_builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
28
+ region: Optional[pulumi.Input[_builtins.str]] = None,
29
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
30
+ secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
31
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None):
33
32
  """
34
33
  The set of arguments for constructing a SyncAwsDestination resource.
35
- :param pulumi.Input[builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
34
+ :param pulumi.Input[_builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
36
35
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
37
36
  variable.
38
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
39
- :param pulumi.Input[builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
37
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
38
+ :param pulumi.Input[_builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
40
39
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
41
40
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
42
41
  relationship condition they set on AWS otherwise sync operations will start to fail due to client-side access
43
42
  denied errors. Ignored if the `role_arn` field is empty.
44
- :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
43
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
45
44
  at the destination. Supports `secret-path` and `secret-key`.
46
- :param pulumi.Input[builtins.str] name: Unique name of the AWS destination.
47
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
45
+ :param pulumi.Input[_builtins.str] name: Unique name of the AWS destination.
46
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
48
47
  The value should not contain leading or trailing forward slashes.
49
48
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
- :param pulumi.Input[builtins.str] region: Region where to manage the secrets manager entries.
49
+ :param pulumi.Input[_builtins.str] region: Region where to manage the secrets manager entries.
51
50
  Can be omitted and directly provided to Vault using the `AWS_REGION` environment
52
51
  variable.
53
- :param pulumi.Input[builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
52
+ :param pulumi.Input[_builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
54
53
  Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
55
54
  exist for Vault to be able to assume this role. The role can be in a different account.
56
55
  The value is mutable as long as the new role targets the same AWS account ID. If not, the BE will return an error.
57
56
  It is possible to provide both an access key pair and a role to assume.
58
- :param pulumi.Input[builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
57
+ :param pulumi.Input[_builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
59
58
  Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
60
59
  variable.
61
- :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
60
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
62
61
  Supports a subset of the Go Template syntax.
63
62
  """
64
63
  if access_key_id is not None:
@@ -82,9 +81,9 @@ class SyncAwsDestinationArgs:
82
81
  if secret_name_template is not None:
83
82
  pulumi.set(__self__, "secret_name_template", secret_name_template)
84
83
 
85
- @property
84
+ @_builtins.property
86
85
  @pulumi.getter(name="accessKeyId")
87
- def access_key_id(self) -> Optional[pulumi.Input[builtins.str]]:
86
+ def access_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
88
87
  """
89
88
  Access key id to authenticate against the AWS secrets manager.
90
89
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
@@ -93,24 +92,24 @@ class SyncAwsDestinationArgs:
93
92
  return pulumi.get(self, "access_key_id")
94
93
 
95
94
  @access_key_id.setter
96
- def access_key_id(self, value: Optional[pulumi.Input[builtins.str]]):
95
+ def access_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
97
96
  pulumi.set(self, "access_key_id", value)
98
97
 
99
- @property
98
+ @_builtins.property
100
99
  @pulumi.getter(name="customTags")
101
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
100
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
102
101
  """
103
102
  Custom tags to set on the secret managed at the destination.
104
103
  """
105
104
  return pulumi.get(self, "custom_tags")
106
105
 
107
106
  @custom_tags.setter
108
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
107
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
109
108
  pulumi.set(self, "custom_tags", value)
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter(name="externalId")
113
- def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
112
+ def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
114
113
  """
115
114
  Optional extra protection that must match the trust policy granting access to the
116
115
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
@@ -121,12 +120,12 @@ class SyncAwsDestinationArgs:
121
120
  return pulumi.get(self, "external_id")
122
121
 
123
122
  @external_id.setter
124
- def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
123
+ def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
125
124
  pulumi.set(self, "external_id", value)
126
125
 
127
- @property
126
+ @_builtins.property
128
127
  @pulumi.getter
129
- def granularity(self) -> Optional[pulumi.Input[builtins.str]]:
128
+ def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
130
129
  """
131
130
  Determines what level of information is synced as a distinct resource
132
131
  at the destination. Supports `secret-path` and `secret-key`.
@@ -134,24 +133,24 @@ class SyncAwsDestinationArgs:
134
133
  return pulumi.get(self, "granularity")
135
134
 
136
135
  @granularity.setter
137
- def granularity(self, value: Optional[pulumi.Input[builtins.str]]):
136
+ def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
138
137
  pulumi.set(self, "granularity", value)
139
138
 
140
- @property
139
+ @_builtins.property
141
140
  @pulumi.getter
142
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
141
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
143
142
  """
144
143
  Unique name of the AWS destination.
145
144
  """
146
145
  return pulumi.get(self, "name")
147
146
 
148
147
  @name.setter
149
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
148
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
150
149
  pulumi.set(self, "name", value)
151
150
 
152
- @property
151
+ @_builtins.property
153
152
  @pulumi.getter
154
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
153
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
155
154
  """
156
155
  The namespace to provision the resource in.
157
156
  The value should not contain leading or trailing forward slashes.
@@ -160,12 +159,12 @@ class SyncAwsDestinationArgs:
160
159
  return pulumi.get(self, "namespace")
161
160
 
162
161
  @namespace.setter
163
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
162
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
164
163
  pulumi.set(self, "namespace", value)
165
164
 
166
- @property
165
+ @_builtins.property
167
166
  @pulumi.getter
168
- def region(self) -> Optional[pulumi.Input[builtins.str]]:
167
+ def region(self) -> Optional[pulumi.Input[_builtins.str]]:
169
168
  """
170
169
  Region where to manage the secrets manager entries.
171
170
  Can be omitted and directly provided to Vault using the `AWS_REGION` environment
@@ -174,12 +173,12 @@ class SyncAwsDestinationArgs:
174
173
  return pulumi.get(self, "region")
175
174
 
176
175
  @region.setter
177
- def region(self, value: Optional[pulumi.Input[builtins.str]]):
176
+ def region(self, value: Optional[pulumi.Input[_builtins.str]]):
178
177
  pulumi.set(self, "region", value)
179
178
 
180
- @property
179
+ @_builtins.property
181
180
  @pulumi.getter(name="roleArn")
182
- def role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
181
+ def role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
183
182
  """
184
183
  Specifies a role to assume when connecting to AWS. When assuming a role,
185
184
  Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
@@ -190,12 +189,12 @@ class SyncAwsDestinationArgs:
190
189
  return pulumi.get(self, "role_arn")
191
190
 
192
191
  @role_arn.setter
193
- def role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
192
+ def role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
194
193
  pulumi.set(self, "role_arn", value)
195
194
 
196
- @property
195
+ @_builtins.property
197
196
  @pulumi.getter(name="secretAccessKey")
198
- def secret_access_key(self) -> Optional[pulumi.Input[builtins.str]]:
197
+ def secret_access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
199
198
  """
200
199
  Secret access key to authenticate against the AWS secrets manager.
201
200
  Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
@@ -204,12 +203,12 @@ class SyncAwsDestinationArgs:
204
203
  return pulumi.get(self, "secret_access_key")
205
204
 
206
205
  @secret_access_key.setter
207
- def secret_access_key(self, value: Optional[pulumi.Input[builtins.str]]):
206
+ def secret_access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
208
207
  pulumi.set(self, "secret_access_key", value)
209
208
 
210
- @property
209
+ @_builtins.property
211
210
  @pulumi.getter(name="secretNameTemplate")
212
- def secret_name_template(self) -> Optional[pulumi.Input[builtins.str]]:
211
+ def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
213
212
  """
214
213
  Template describing how to generate external secret names.
215
214
  Supports a subset of the Go Template syntax.
@@ -217,55 +216,55 @@ class SyncAwsDestinationArgs:
217
216
  return pulumi.get(self, "secret_name_template")
218
217
 
219
218
  @secret_name_template.setter
220
- def secret_name_template(self, value: Optional[pulumi.Input[builtins.str]]):
219
+ def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
221
220
  pulumi.set(self, "secret_name_template", value)
222
221
 
223
222
 
224
223
  @pulumi.input_type
225
224
  class _SyncAwsDestinationState:
226
225
  def __init__(__self__, *,
227
- access_key_id: Optional[pulumi.Input[builtins.str]] = None,
228
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
229
- external_id: Optional[pulumi.Input[builtins.str]] = None,
230
- granularity: Optional[pulumi.Input[builtins.str]] = None,
231
- name: Optional[pulumi.Input[builtins.str]] = None,
232
- namespace: Optional[pulumi.Input[builtins.str]] = None,
233
- region: Optional[pulumi.Input[builtins.str]] = None,
234
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
235
- secret_access_key: Optional[pulumi.Input[builtins.str]] = None,
236
- secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
237
- type: Optional[pulumi.Input[builtins.str]] = None):
226
+ access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
227
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
228
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
229
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
230
+ name: Optional[pulumi.Input[_builtins.str]] = None,
231
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
232
+ region: Optional[pulumi.Input[_builtins.str]] = None,
233
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
234
+ secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
235
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
236
+ type: Optional[pulumi.Input[_builtins.str]] = None):
238
237
  """
239
238
  Input properties used for looking up and filtering SyncAwsDestination resources.
240
- :param pulumi.Input[builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
239
+ :param pulumi.Input[_builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
241
240
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
242
241
  variable.
243
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
244
- :param pulumi.Input[builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
242
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
243
+ :param pulumi.Input[_builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
245
244
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
246
245
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
247
246
  relationship condition they set on AWS otherwise sync operations will start to fail due to client-side access
248
247
  denied errors. Ignored if the `role_arn` field is empty.
249
- :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
248
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
250
249
  at the destination. Supports `secret-path` and `secret-key`.
251
- :param pulumi.Input[builtins.str] name: Unique name of the AWS destination.
252
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
250
+ :param pulumi.Input[_builtins.str] name: Unique name of the AWS destination.
251
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
253
252
  The value should not contain leading or trailing forward slashes.
254
253
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
255
- :param pulumi.Input[builtins.str] region: Region where to manage the secrets manager entries.
254
+ :param pulumi.Input[_builtins.str] region: Region where to manage the secrets manager entries.
256
255
  Can be omitted and directly provided to Vault using the `AWS_REGION` environment
257
256
  variable.
258
- :param pulumi.Input[builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
257
+ :param pulumi.Input[_builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
259
258
  Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
260
259
  exist for Vault to be able to assume this role. The role can be in a different account.
261
260
  The value is mutable as long as the new role targets the same AWS account ID. If not, the BE will return an error.
262
261
  It is possible to provide both an access key pair and a role to assume.
263
- :param pulumi.Input[builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
262
+ :param pulumi.Input[_builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
264
263
  Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
265
264
  variable.
266
- :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
265
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
267
266
  Supports a subset of the Go Template syntax.
268
- :param pulumi.Input[builtins.str] type: The type of the secrets destination (`aws-sm`).
267
+ :param pulumi.Input[_builtins.str] type: The type of the secrets destination (`aws-sm`).
269
268
  """
270
269
  if access_key_id is not None:
271
270
  pulumi.set(__self__, "access_key_id", access_key_id)
@@ -290,9 +289,9 @@ class _SyncAwsDestinationState:
290
289
  if type is not None:
291
290
  pulumi.set(__self__, "type", type)
292
291
 
293
- @property
292
+ @_builtins.property
294
293
  @pulumi.getter(name="accessKeyId")
295
- def access_key_id(self) -> Optional[pulumi.Input[builtins.str]]:
294
+ def access_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
296
295
  """
297
296
  Access key id to authenticate against the AWS secrets manager.
298
297
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
@@ -301,24 +300,24 @@ class _SyncAwsDestinationState:
301
300
  return pulumi.get(self, "access_key_id")
302
301
 
303
302
  @access_key_id.setter
304
- def access_key_id(self, value: Optional[pulumi.Input[builtins.str]]):
303
+ def access_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
305
304
  pulumi.set(self, "access_key_id", value)
306
305
 
307
- @property
306
+ @_builtins.property
308
307
  @pulumi.getter(name="customTags")
309
- def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
308
+ def custom_tags(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
310
309
  """
311
310
  Custom tags to set on the secret managed at the destination.
312
311
  """
313
312
  return pulumi.get(self, "custom_tags")
314
313
 
315
314
  @custom_tags.setter
316
- def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
315
+ def custom_tags(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
317
316
  pulumi.set(self, "custom_tags", value)
318
317
 
319
- @property
318
+ @_builtins.property
320
319
  @pulumi.getter(name="externalId")
321
- def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
320
+ def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
322
321
  """
323
322
  Optional extra protection that must match the trust policy granting access to the
324
323
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
@@ -329,12 +328,12 @@ class _SyncAwsDestinationState:
329
328
  return pulumi.get(self, "external_id")
330
329
 
331
330
  @external_id.setter
332
- def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
331
+ def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
333
332
  pulumi.set(self, "external_id", value)
334
333
 
335
- @property
334
+ @_builtins.property
336
335
  @pulumi.getter
337
- def granularity(self) -> Optional[pulumi.Input[builtins.str]]:
336
+ def granularity(self) -> Optional[pulumi.Input[_builtins.str]]:
338
337
  """
339
338
  Determines what level of information is synced as a distinct resource
340
339
  at the destination. Supports `secret-path` and `secret-key`.
@@ -342,24 +341,24 @@ class _SyncAwsDestinationState:
342
341
  return pulumi.get(self, "granularity")
343
342
 
344
343
  @granularity.setter
345
- def granularity(self, value: Optional[pulumi.Input[builtins.str]]):
344
+ def granularity(self, value: Optional[pulumi.Input[_builtins.str]]):
346
345
  pulumi.set(self, "granularity", value)
347
346
 
348
- @property
347
+ @_builtins.property
349
348
  @pulumi.getter
350
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
349
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
351
350
  """
352
351
  Unique name of the AWS destination.
353
352
  """
354
353
  return pulumi.get(self, "name")
355
354
 
356
355
  @name.setter
357
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
356
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
358
357
  pulumi.set(self, "name", value)
359
358
 
360
- @property
359
+ @_builtins.property
361
360
  @pulumi.getter
362
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
361
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
363
362
  """
364
363
  The namespace to provision the resource in.
365
364
  The value should not contain leading or trailing forward slashes.
@@ -368,12 +367,12 @@ class _SyncAwsDestinationState:
368
367
  return pulumi.get(self, "namespace")
369
368
 
370
369
  @namespace.setter
371
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
370
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
372
371
  pulumi.set(self, "namespace", value)
373
372
 
374
- @property
373
+ @_builtins.property
375
374
  @pulumi.getter
376
- def region(self) -> Optional[pulumi.Input[builtins.str]]:
375
+ def region(self) -> Optional[pulumi.Input[_builtins.str]]:
377
376
  """
378
377
  Region where to manage the secrets manager entries.
379
378
  Can be omitted and directly provided to Vault using the `AWS_REGION` environment
@@ -382,12 +381,12 @@ class _SyncAwsDestinationState:
382
381
  return pulumi.get(self, "region")
383
382
 
384
383
  @region.setter
385
- def region(self, value: Optional[pulumi.Input[builtins.str]]):
384
+ def region(self, value: Optional[pulumi.Input[_builtins.str]]):
386
385
  pulumi.set(self, "region", value)
387
386
 
388
- @property
387
+ @_builtins.property
389
388
  @pulumi.getter(name="roleArn")
390
- def role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
389
+ def role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
391
390
  """
392
391
  Specifies a role to assume when connecting to AWS. When assuming a role,
393
392
  Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
@@ -398,12 +397,12 @@ class _SyncAwsDestinationState:
398
397
  return pulumi.get(self, "role_arn")
399
398
 
400
399
  @role_arn.setter
401
- def role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
400
+ def role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
402
401
  pulumi.set(self, "role_arn", value)
403
402
 
404
- @property
403
+ @_builtins.property
405
404
  @pulumi.getter(name="secretAccessKey")
406
- def secret_access_key(self) -> Optional[pulumi.Input[builtins.str]]:
405
+ def secret_access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
407
406
  """
408
407
  Secret access key to authenticate against the AWS secrets manager.
409
408
  Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
@@ -412,12 +411,12 @@ class _SyncAwsDestinationState:
412
411
  return pulumi.get(self, "secret_access_key")
413
412
 
414
413
  @secret_access_key.setter
415
- def secret_access_key(self, value: Optional[pulumi.Input[builtins.str]]):
414
+ def secret_access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
416
415
  pulumi.set(self, "secret_access_key", value)
417
416
 
418
- @property
417
+ @_builtins.property
419
418
  @pulumi.getter(name="secretNameTemplate")
420
- def secret_name_template(self) -> Optional[pulumi.Input[builtins.str]]:
419
+ def secret_name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
421
420
  """
422
421
  Template describing how to generate external secret names.
423
422
  Supports a subset of the Go Template syntax.
@@ -425,19 +424,19 @@ class _SyncAwsDestinationState:
425
424
  return pulumi.get(self, "secret_name_template")
426
425
 
427
426
  @secret_name_template.setter
428
- def secret_name_template(self, value: Optional[pulumi.Input[builtins.str]]):
427
+ def secret_name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
429
428
  pulumi.set(self, "secret_name_template", value)
430
429
 
431
- @property
430
+ @_builtins.property
432
431
  @pulumi.getter
433
- def type(self) -> Optional[pulumi.Input[builtins.str]]:
432
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
434
433
  """
435
434
  The type of the secrets destination (`aws-sm`).
436
435
  """
437
436
  return pulumi.get(self, "type")
438
437
 
439
438
  @type.setter
440
- def type(self, value: Optional[pulumi.Input[builtins.str]]):
439
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
441
440
  pulumi.set(self, "type", value)
442
441
 
443
442
 
@@ -447,16 +446,16 @@ class SyncAwsDestination(pulumi.CustomResource):
447
446
  def __init__(__self__,
448
447
  resource_name: str,
449
448
  opts: Optional[pulumi.ResourceOptions] = None,
450
- access_key_id: Optional[pulumi.Input[builtins.str]] = None,
451
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
452
- external_id: Optional[pulumi.Input[builtins.str]] = None,
453
- granularity: Optional[pulumi.Input[builtins.str]] = None,
454
- name: Optional[pulumi.Input[builtins.str]] = None,
455
- namespace: Optional[pulumi.Input[builtins.str]] = None,
456
- region: Optional[pulumi.Input[builtins.str]] = None,
457
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
458
- secret_access_key: Optional[pulumi.Input[builtins.str]] = None,
459
- secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
449
+ access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
450
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
451
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
452
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
453
+ name: Optional[pulumi.Input[_builtins.str]] = None,
454
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
455
+ region: Optional[pulumi.Input[_builtins.str]] = None,
456
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
457
+ secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
458
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
460
459
  __props__=None):
461
460
  """
462
461
  ## Example Usage
@@ -488,33 +487,33 @@ class SyncAwsDestination(pulumi.CustomResource):
488
487
 
489
488
  :param str resource_name: The name of the resource.
490
489
  :param pulumi.ResourceOptions opts: Options for the resource.
491
- :param pulumi.Input[builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
490
+ :param pulumi.Input[_builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
492
491
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
493
492
  variable.
494
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
495
- :param pulumi.Input[builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
493
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
494
+ :param pulumi.Input[_builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
496
495
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
497
496
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
498
497
  relationship condition they set on AWS otherwise sync operations will start to fail due to client-side access
499
498
  denied errors. Ignored if the `role_arn` field is empty.
500
- :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
499
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
501
500
  at the destination. Supports `secret-path` and `secret-key`.
502
- :param pulumi.Input[builtins.str] name: Unique name of the AWS destination.
503
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
501
+ :param pulumi.Input[_builtins.str] name: Unique name of the AWS destination.
502
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
504
503
  The value should not contain leading or trailing forward slashes.
505
504
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
506
- :param pulumi.Input[builtins.str] region: Region where to manage the secrets manager entries.
505
+ :param pulumi.Input[_builtins.str] region: Region where to manage the secrets manager entries.
507
506
  Can be omitted and directly provided to Vault using the `AWS_REGION` environment
508
507
  variable.
509
- :param pulumi.Input[builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
508
+ :param pulumi.Input[_builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
510
509
  Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
511
510
  exist for Vault to be able to assume this role. The role can be in a different account.
512
511
  The value is mutable as long as the new role targets the same AWS account ID. If not, the BE will return an error.
513
512
  It is possible to provide both an access key pair and a role to assume.
514
- :param pulumi.Input[builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
513
+ :param pulumi.Input[_builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
515
514
  Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
516
515
  variable.
517
- :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
516
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
518
517
  Supports a subset of the Go Template syntax.
519
518
  """
520
519
  ...
@@ -566,16 +565,16 @@ class SyncAwsDestination(pulumi.CustomResource):
566
565
  def _internal_init(__self__,
567
566
  resource_name: str,
568
567
  opts: Optional[pulumi.ResourceOptions] = None,
569
- access_key_id: Optional[pulumi.Input[builtins.str]] = None,
570
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
571
- external_id: Optional[pulumi.Input[builtins.str]] = None,
572
- granularity: Optional[pulumi.Input[builtins.str]] = None,
573
- name: Optional[pulumi.Input[builtins.str]] = None,
574
- namespace: Optional[pulumi.Input[builtins.str]] = None,
575
- region: Optional[pulumi.Input[builtins.str]] = None,
576
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
577
- secret_access_key: Optional[pulumi.Input[builtins.str]] = None,
578
- secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
568
+ access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
569
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
570
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
571
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
572
+ name: Optional[pulumi.Input[_builtins.str]] = None,
573
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
574
+ region: Optional[pulumi.Input[_builtins.str]] = None,
575
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
576
+ secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
577
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
579
578
  __props__=None):
580
579
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
581
580
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -608,17 +607,17 @@ class SyncAwsDestination(pulumi.CustomResource):
608
607
  def get(resource_name: str,
609
608
  id: pulumi.Input[str],
610
609
  opts: Optional[pulumi.ResourceOptions] = None,
611
- access_key_id: Optional[pulumi.Input[builtins.str]] = None,
612
- custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
613
- external_id: Optional[pulumi.Input[builtins.str]] = None,
614
- granularity: Optional[pulumi.Input[builtins.str]] = None,
615
- name: Optional[pulumi.Input[builtins.str]] = None,
616
- namespace: Optional[pulumi.Input[builtins.str]] = None,
617
- region: Optional[pulumi.Input[builtins.str]] = None,
618
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
619
- secret_access_key: Optional[pulumi.Input[builtins.str]] = None,
620
- secret_name_template: Optional[pulumi.Input[builtins.str]] = None,
621
- type: Optional[pulumi.Input[builtins.str]] = None) -> 'SyncAwsDestination':
610
+ access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
611
+ custom_tags: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
612
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
613
+ granularity: Optional[pulumi.Input[_builtins.str]] = None,
614
+ name: Optional[pulumi.Input[_builtins.str]] = None,
615
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
616
+ region: Optional[pulumi.Input[_builtins.str]] = None,
617
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
618
+ secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
619
+ secret_name_template: Optional[pulumi.Input[_builtins.str]] = None,
620
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'SyncAwsDestination':
622
621
  """
623
622
  Get an existing SyncAwsDestination resource's state with the given name, id, and optional extra
624
623
  properties used to qualify the lookup.
@@ -626,35 +625,35 @@ class SyncAwsDestination(pulumi.CustomResource):
626
625
  :param str resource_name: The unique name of the resulting resource.
627
626
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
628
627
  :param pulumi.ResourceOptions opts: Options for the resource.
629
- :param pulumi.Input[builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
628
+ :param pulumi.Input[_builtins.str] access_key_id: Access key id to authenticate against the AWS secrets manager.
630
629
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
631
630
  variable.
632
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
633
- :param pulumi.Input[builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
631
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] custom_tags: Custom tags to set on the secret managed at the destination.
632
+ :param pulumi.Input[_builtins.str] external_id: Optional extra protection that must match the trust policy granting access to the
634
633
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
635
634
  The field is mutable with no special condition, but users must be careful that the new value fits with the trust
636
635
  relationship condition they set on AWS otherwise sync operations will start to fail due to client-side access
637
636
  denied errors. Ignored if the `role_arn` field is empty.
638
- :param pulumi.Input[builtins.str] granularity: Determines what level of information is synced as a distinct resource
637
+ :param pulumi.Input[_builtins.str] granularity: Determines what level of information is synced as a distinct resource
639
638
  at the destination. Supports `secret-path` and `secret-key`.
640
- :param pulumi.Input[builtins.str] name: Unique name of the AWS destination.
641
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
639
+ :param pulumi.Input[_builtins.str] name: Unique name of the AWS destination.
640
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
642
641
  The value should not contain leading or trailing forward slashes.
643
642
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
644
- :param pulumi.Input[builtins.str] region: Region where to manage the secrets manager entries.
643
+ :param pulumi.Input[_builtins.str] region: Region where to manage the secrets manager entries.
645
644
  Can be omitted and directly provided to Vault using the `AWS_REGION` environment
646
645
  variable.
647
- :param pulumi.Input[builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
646
+ :param pulumi.Input[_builtins.str] role_arn: Specifies a role to assume when connecting to AWS. When assuming a role,
648
647
  Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
649
648
  exist for Vault to be able to assume this role. The role can be in a different account.
650
649
  The value is mutable as long as the new role targets the same AWS account ID. If not, the BE will return an error.
651
650
  It is possible to provide both an access key pair and a role to assume.
652
- :param pulumi.Input[builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
651
+ :param pulumi.Input[_builtins.str] secret_access_key: Secret access key to authenticate against the AWS secrets manager.
653
652
  Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
654
653
  variable.
655
- :param pulumi.Input[builtins.str] secret_name_template: Template describing how to generate external secret names.
654
+ :param pulumi.Input[_builtins.str] secret_name_template: Template describing how to generate external secret names.
656
655
  Supports a subset of the Go Template syntax.
657
- :param pulumi.Input[builtins.str] type: The type of the secrets destination (`aws-sm`).
656
+ :param pulumi.Input[_builtins.str] type: The type of the secrets destination (`aws-sm`).
658
657
  """
659
658
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
660
659
 
@@ -673,9 +672,9 @@ class SyncAwsDestination(pulumi.CustomResource):
673
672
  __props__.__dict__["type"] = type
674
673
  return SyncAwsDestination(resource_name, opts=opts, __props__=__props__)
675
674
 
676
- @property
675
+ @_builtins.property
677
676
  @pulumi.getter(name="accessKeyId")
678
- def access_key_id(self) -> pulumi.Output[Optional[builtins.str]]:
677
+ def access_key_id(self) -> pulumi.Output[Optional[_builtins.str]]:
679
678
  """
680
679
  Access key id to authenticate against the AWS secrets manager.
681
680
  Can be omitted and directly provided to Vault using the `AWS_ACCESS_KEY_ID` environment
@@ -683,17 +682,17 @@ class SyncAwsDestination(pulumi.CustomResource):
683
682
  """
684
683
  return pulumi.get(self, "access_key_id")
685
684
 
686
- @property
685
+ @_builtins.property
687
686
  @pulumi.getter(name="customTags")
688
- def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
687
+ def custom_tags(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
689
688
  """
690
689
  Custom tags to set on the secret managed at the destination.
691
690
  """
692
691
  return pulumi.get(self, "custom_tags")
693
692
 
694
- @property
693
+ @_builtins.property
695
694
  @pulumi.getter(name="externalId")
696
- def external_id(self) -> pulumi.Output[Optional[builtins.str]]:
695
+ def external_id(self) -> pulumi.Output[Optional[_builtins.str]]:
697
696
  """
698
697
  Optional extra protection that must match the trust policy granting access to the
699
698
  AWS IAM role ARN. We recommend using a different random UUID per destination. The value is generated by users.
@@ -703,26 +702,26 @@ class SyncAwsDestination(pulumi.CustomResource):
703
702
  """
704
703
  return pulumi.get(self, "external_id")
705
704
 
706
- @property
705
+ @_builtins.property
707
706
  @pulumi.getter
708
- def granularity(self) -> pulumi.Output[Optional[builtins.str]]:
707
+ def granularity(self) -> pulumi.Output[Optional[_builtins.str]]:
709
708
  """
710
709
  Determines what level of information is synced as a distinct resource
711
710
  at the destination. Supports `secret-path` and `secret-key`.
712
711
  """
713
712
  return pulumi.get(self, "granularity")
714
713
 
715
- @property
714
+ @_builtins.property
716
715
  @pulumi.getter
717
- def name(self) -> pulumi.Output[builtins.str]:
716
+ def name(self) -> pulumi.Output[_builtins.str]:
718
717
  """
719
718
  Unique name of the AWS destination.
720
719
  """
721
720
  return pulumi.get(self, "name")
722
721
 
723
- @property
722
+ @_builtins.property
724
723
  @pulumi.getter
725
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
724
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
726
725
  """
727
726
  The namespace to provision the resource in.
728
727
  The value should not contain leading or trailing forward slashes.
@@ -730,9 +729,9 @@ class SyncAwsDestination(pulumi.CustomResource):
730
729
  """
731
730
  return pulumi.get(self, "namespace")
732
731
 
733
- @property
732
+ @_builtins.property
734
733
  @pulumi.getter
735
- def region(self) -> pulumi.Output[Optional[builtins.str]]:
734
+ def region(self) -> pulumi.Output[Optional[_builtins.str]]:
736
735
  """
737
736
  Region where to manage the secrets manager entries.
738
737
  Can be omitted and directly provided to Vault using the `AWS_REGION` environment
@@ -740,9 +739,9 @@ class SyncAwsDestination(pulumi.CustomResource):
740
739
  """
741
740
  return pulumi.get(self, "region")
742
741
 
743
- @property
742
+ @_builtins.property
744
743
  @pulumi.getter(name="roleArn")
745
- def role_arn(self) -> pulumi.Output[Optional[builtins.str]]:
744
+ def role_arn(self) -> pulumi.Output[Optional[_builtins.str]]:
746
745
  """
747
746
  Specifies a role to assume when connecting to AWS. When assuming a role,
748
747
  Vault uses temporary STS credentials to authenticate. An initial session with the proper trust relationship must
@@ -752,9 +751,9 @@ class SyncAwsDestination(pulumi.CustomResource):
752
751
  """
753
752
  return pulumi.get(self, "role_arn")
754
753
 
755
- @property
754
+ @_builtins.property
756
755
  @pulumi.getter(name="secretAccessKey")
757
- def secret_access_key(self) -> pulumi.Output[Optional[builtins.str]]:
756
+ def secret_access_key(self) -> pulumi.Output[Optional[_builtins.str]]:
758
757
  """
759
758
  Secret access key to authenticate against the AWS secrets manager.
760
759
  Can be omitted and directly provided to Vault using the `AWS_SECRET_ACCESS_KEY` environment
@@ -762,18 +761,18 @@ class SyncAwsDestination(pulumi.CustomResource):
762
761
  """
763
762
  return pulumi.get(self, "secret_access_key")
764
763
 
765
- @property
764
+ @_builtins.property
766
765
  @pulumi.getter(name="secretNameTemplate")
767
- def secret_name_template(self) -> pulumi.Output[builtins.str]:
766
+ def secret_name_template(self) -> pulumi.Output[_builtins.str]:
768
767
  """
769
768
  Template describing how to generate external secret names.
770
769
  Supports a subset of the Go Template syntax.
771
770
  """
772
771
  return pulumi.get(self, "secret_name_template")
773
772
 
774
- @property
773
+ @_builtins.property
775
774
  @pulumi.getter
776
- def type(self) -> pulumi.Output[builtins.str]:
775
+ def type(self) -> pulumi.Output[_builtins.str]:
777
776
  """
778
777
  The type of the secrets destination (`aws-sm`).
779
778
  """