pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,25 +19,25 @@ __all__ = ['SecretBackendCaArgs', 'SecretBackendCa']
20
19
  @pulumi.input_type
21
20
  class SecretBackendCaArgs:
22
21
  def __init__(__self__, *,
23
- backend: Optional[pulumi.Input[builtins.str]] = None,
24
- generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
25
- key_bits: Optional[pulumi.Input[builtins.int]] = None,
26
- key_type: Optional[pulumi.Input[builtins.str]] = None,
27
- namespace: Optional[pulumi.Input[builtins.str]] = None,
28
- private_key: Optional[pulumi.Input[builtins.str]] = None,
29
- public_key: Optional[pulumi.Input[builtins.str]] = None):
22
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
23
+ generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ key_bits: Optional[pulumi.Input[_builtins.int]] = None,
25
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
27
+ private_key: Optional[pulumi.Input[_builtins.str]] = None,
28
+ public_key: Optional[pulumi.Input[_builtins.str]] = None):
30
29
  """
31
30
  The set of arguments for constructing a SecretBackendCa resource.
32
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
33
- :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
34
- :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
35
- :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
36
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
31
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
32
+ :param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
33
+ :param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
34
+ :param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
36
  The value should not contain leading or trailing forward slashes.
38
37
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
38
  *Available only for Vault Enterprise*.
40
- :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
41
- :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
39
+ :param pulumi.Input[_builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
40
+ :param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
42
41
  """
43
42
  if backend is not None:
44
43
  pulumi.set(__self__, "backend", backend)
@@ -55,57 +54,57 @@ class SecretBackendCaArgs:
55
54
  if public_key is not None:
56
55
  pulumi.set(__self__, "public_key", public_key)
57
56
 
58
- @property
57
+ @_builtins.property
59
58
  @pulumi.getter
60
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
59
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
61
60
  """
62
61
  The path where the SSH secret backend is mounted. Defaults to 'ssh'
63
62
  """
64
63
  return pulumi.get(self, "backend")
65
64
 
66
65
  @backend.setter
67
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
66
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
68
67
  pulumi.set(self, "backend", value)
69
68
 
70
- @property
69
+ @_builtins.property
71
70
  @pulumi.getter(name="generateSigningKey")
72
- def generate_signing_key(self) -> Optional[pulumi.Input[builtins.bool]]:
71
+ def generate_signing_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
73
72
  """
74
73
  Whether Vault should generate the signing key pair internally. Defaults to true
75
74
  """
76
75
  return pulumi.get(self, "generate_signing_key")
77
76
 
78
77
  @generate_signing_key.setter
79
- def generate_signing_key(self, value: Optional[pulumi.Input[builtins.bool]]):
78
+ def generate_signing_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
80
79
  pulumi.set(self, "generate_signing_key", value)
81
80
 
82
- @property
81
+ @_builtins.property
83
82
  @pulumi.getter(name="keyBits")
84
- def key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
83
+ def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
85
84
  """
86
85
  Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
87
86
  """
88
87
  return pulumi.get(self, "key_bits")
89
88
 
90
89
  @key_bits.setter
91
- def key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
90
+ def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
92
91
  pulumi.set(self, "key_bits", value)
93
92
 
94
- @property
93
+ @_builtins.property
95
94
  @pulumi.getter(name="keyType")
96
- def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
95
+ def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
97
96
  """
98
97
  Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
99
98
  """
100
99
  return pulumi.get(self, "key_type")
101
100
 
102
101
  @key_type.setter
103
- def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
102
+ def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
104
103
  pulumi.set(self, "key_type", value)
105
104
 
106
- @property
105
+ @_builtins.property
107
106
  @pulumi.getter
108
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
107
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
109
108
  """
110
109
  The namespace to provision the resource in.
111
110
  The value should not contain leading or trailing forward slashes.
@@ -115,56 +114,56 @@ class SecretBackendCaArgs:
115
114
  return pulumi.get(self, "namespace")
116
115
 
117
116
  @namespace.setter
118
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
117
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
119
118
  pulumi.set(self, "namespace", value)
120
119
 
121
- @property
120
+ @_builtins.property
122
121
  @pulumi.getter(name="privateKey")
123
- def private_key(self) -> Optional[pulumi.Input[builtins.str]]:
122
+ def private_key(self) -> Optional[pulumi.Input[_builtins.str]]:
124
123
  """
125
124
  Private key part the SSH CA key pair; required if generate_signing_key is false.
126
125
  """
127
126
  return pulumi.get(self, "private_key")
128
127
 
129
128
  @private_key.setter
130
- def private_key(self, value: Optional[pulumi.Input[builtins.str]]):
129
+ def private_key(self, value: Optional[pulumi.Input[_builtins.str]]):
131
130
  pulumi.set(self, "private_key", value)
132
131
 
133
- @property
132
+ @_builtins.property
134
133
  @pulumi.getter(name="publicKey")
135
- def public_key(self) -> Optional[pulumi.Input[builtins.str]]:
134
+ def public_key(self) -> Optional[pulumi.Input[_builtins.str]]:
136
135
  """
137
136
  The public key part the SSH CA key pair; required if generate_signing_key is false.
138
137
  """
139
138
  return pulumi.get(self, "public_key")
140
139
 
141
140
  @public_key.setter
142
- def public_key(self, value: Optional[pulumi.Input[builtins.str]]):
141
+ def public_key(self, value: Optional[pulumi.Input[_builtins.str]]):
143
142
  pulumi.set(self, "public_key", value)
144
143
 
145
144
 
146
145
  @pulumi.input_type
147
146
  class _SecretBackendCaState:
148
147
  def __init__(__self__, *,
149
- backend: Optional[pulumi.Input[builtins.str]] = None,
150
- generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
151
- key_bits: Optional[pulumi.Input[builtins.int]] = None,
152
- key_type: Optional[pulumi.Input[builtins.str]] = None,
153
- namespace: Optional[pulumi.Input[builtins.str]] = None,
154
- private_key: Optional[pulumi.Input[builtins.str]] = None,
155
- public_key: Optional[pulumi.Input[builtins.str]] = None):
148
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
149
+ generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
150
+ key_bits: Optional[pulumi.Input[_builtins.int]] = None,
151
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
152
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
153
+ private_key: Optional[pulumi.Input[_builtins.str]] = None,
154
+ public_key: Optional[pulumi.Input[_builtins.str]] = None):
156
155
  """
157
156
  Input properties used for looking up and filtering SecretBackendCa resources.
158
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
159
- :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
160
- :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
161
- :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
162
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
157
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
158
+ :param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
159
+ :param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
160
+ :param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
161
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
163
162
  The value should not contain leading or trailing forward slashes.
164
163
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
165
164
  *Available only for Vault Enterprise*.
166
- :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
167
- :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
165
+ :param pulumi.Input[_builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
166
+ :param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
168
167
  """
169
168
  if backend is not None:
170
169
  pulumi.set(__self__, "backend", backend)
@@ -181,57 +180,57 @@ class _SecretBackendCaState:
181
180
  if public_key is not None:
182
181
  pulumi.set(__self__, "public_key", public_key)
183
182
 
184
- @property
183
+ @_builtins.property
185
184
  @pulumi.getter
186
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
185
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
187
186
  """
188
187
  The path where the SSH secret backend is mounted. Defaults to 'ssh'
189
188
  """
190
189
  return pulumi.get(self, "backend")
191
190
 
192
191
  @backend.setter
193
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
192
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
194
193
  pulumi.set(self, "backend", value)
195
194
 
196
- @property
195
+ @_builtins.property
197
196
  @pulumi.getter(name="generateSigningKey")
198
- def generate_signing_key(self) -> Optional[pulumi.Input[builtins.bool]]:
197
+ def generate_signing_key(self) -> Optional[pulumi.Input[_builtins.bool]]:
199
198
  """
200
199
  Whether Vault should generate the signing key pair internally. Defaults to true
201
200
  """
202
201
  return pulumi.get(self, "generate_signing_key")
203
202
 
204
203
  @generate_signing_key.setter
205
- def generate_signing_key(self, value: Optional[pulumi.Input[builtins.bool]]):
204
+ def generate_signing_key(self, value: Optional[pulumi.Input[_builtins.bool]]):
206
205
  pulumi.set(self, "generate_signing_key", value)
207
206
 
208
- @property
207
+ @_builtins.property
209
208
  @pulumi.getter(name="keyBits")
210
- def key_bits(self) -> Optional[pulumi.Input[builtins.int]]:
209
+ def key_bits(self) -> Optional[pulumi.Input[_builtins.int]]:
211
210
  """
212
211
  Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
213
212
  """
214
213
  return pulumi.get(self, "key_bits")
215
214
 
216
215
  @key_bits.setter
217
- def key_bits(self, value: Optional[pulumi.Input[builtins.int]]):
216
+ def key_bits(self, value: Optional[pulumi.Input[_builtins.int]]):
218
217
  pulumi.set(self, "key_bits", value)
219
218
 
220
- @property
219
+ @_builtins.property
221
220
  @pulumi.getter(name="keyType")
222
- def key_type(self) -> Optional[pulumi.Input[builtins.str]]:
221
+ def key_type(self) -> Optional[pulumi.Input[_builtins.str]]:
223
222
  """
224
223
  Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
225
224
  """
226
225
  return pulumi.get(self, "key_type")
227
226
 
228
227
  @key_type.setter
229
- def key_type(self, value: Optional[pulumi.Input[builtins.str]]):
228
+ def key_type(self, value: Optional[pulumi.Input[_builtins.str]]):
230
229
  pulumi.set(self, "key_type", value)
231
230
 
232
- @property
231
+ @_builtins.property
233
232
  @pulumi.getter
234
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
233
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
235
234
  """
236
235
  The namespace to provision the resource in.
237
236
  The value should not contain leading or trailing forward slashes.
@@ -241,31 +240,31 @@ class _SecretBackendCaState:
241
240
  return pulumi.get(self, "namespace")
242
241
 
243
242
  @namespace.setter
244
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
243
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
245
244
  pulumi.set(self, "namespace", value)
246
245
 
247
- @property
246
+ @_builtins.property
248
247
  @pulumi.getter(name="privateKey")
249
- def private_key(self) -> Optional[pulumi.Input[builtins.str]]:
248
+ def private_key(self) -> Optional[pulumi.Input[_builtins.str]]:
250
249
  """
251
250
  Private key part the SSH CA key pair; required if generate_signing_key is false.
252
251
  """
253
252
  return pulumi.get(self, "private_key")
254
253
 
255
254
  @private_key.setter
256
- def private_key(self, value: Optional[pulumi.Input[builtins.str]]):
255
+ def private_key(self, value: Optional[pulumi.Input[_builtins.str]]):
257
256
  pulumi.set(self, "private_key", value)
258
257
 
259
- @property
258
+ @_builtins.property
260
259
  @pulumi.getter(name="publicKey")
261
- def public_key(self) -> Optional[pulumi.Input[builtins.str]]:
260
+ def public_key(self) -> Optional[pulumi.Input[_builtins.str]]:
262
261
  """
263
262
  The public key part the SSH CA key pair; required if generate_signing_key is false.
264
263
  """
265
264
  return pulumi.get(self, "public_key")
266
265
 
267
266
  @public_key.setter
268
- def public_key(self, value: Optional[pulumi.Input[builtins.str]]):
267
+ def public_key(self, value: Optional[pulumi.Input[_builtins.str]]):
269
268
  pulumi.set(self, "public_key", value)
270
269
 
271
270
 
@@ -275,13 +274,13 @@ class SecretBackendCa(pulumi.CustomResource):
275
274
  def __init__(__self__,
276
275
  resource_name: str,
277
276
  opts: Optional[pulumi.ResourceOptions] = None,
278
- backend: Optional[pulumi.Input[builtins.str]] = None,
279
- generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
280
- key_bits: Optional[pulumi.Input[builtins.int]] = None,
281
- key_type: Optional[pulumi.Input[builtins.str]] = None,
282
- namespace: Optional[pulumi.Input[builtins.str]] = None,
283
- private_key: Optional[pulumi.Input[builtins.str]] = None,
284
- public_key: Optional[pulumi.Input[builtins.str]] = None,
277
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
278
+ generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
279
+ key_bits: Optional[pulumi.Input[_builtins.int]] = None,
280
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
281
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
282
+ private_key: Optional[pulumi.Input[_builtins.str]] = None,
283
+ public_key: Optional[pulumi.Input[_builtins.str]] = None,
285
284
  __props__=None):
286
285
  """
287
286
  Provides a resource to manage CA information in an SSH secret backend
@@ -307,16 +306,16 @@ class SecretBackendCa(pulumi.CustomResource):
307
306
 
308
307
  :param str resource_name: The name of the resource.
309
308
  :param pulumi.ResourceOptions opts: Options for the resource.
310
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
311
- :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
312
- :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
313
- :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
314
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
309
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
310
+ :param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
311
+ :param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
312
+ :param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
313
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
315
314
  The value should not contain leading or trailing forward slashes.
316
315
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
317
316
  *Available only for Vault Enterprise*.
318
- :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
319
- :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
317
+ :param pulumi.Input[_builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
318
+ :param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
320
319
  """
321
320
  ...
322
321
  @overload
@@ -361,13 +360,13 @@ class SecretBackendCa(pulumi.CustomResource):
361
360
  def _internal_init(__self__,
362
361
  resource_name: str,
363
362
  opts: Optional[pulumi.ResourceOptions] = None,
364
- backend: Optional[pulumi.Input[builtins.str]] = None,
365
- generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
366
- key_bits: Optional[pulumi.Input[builtins.int]] = None,
367
- key_type: Optional[pulumi.Input[builtins.str]] = None,
368
- namespace: Optional[pulumi.Input[builtins.str]] = None,
369
- private_key: Optional[pulumi.Input[builtins.str]] = None,
370
- public_key: Optional[pulumi.Input[builtins.str]] = None,
363
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
364
+ generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
365
+ key_bits: Optional[pulumi.Input[_builtins.int]] = None,
366
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
367
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
368
+ private_key: Optional[pulumi.Input[_builtins.str]] = None,
369
+ public_key: Optional[pulumi.Input[_builtins.str]] = None,
371
370
  __props__=None):
372
371
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
373
372
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -396,13 +395,13 @@ class SecretBackendCa(pulumi.CustomResource):
396
395
  def get(resource_name: str,
397
396
  id: pulumi.Input[str],
398
397
  opts: Optional[pulumi.ResourceOptions] = None,
399
- backend: Optional[pulumi.Input[builtins.str]] = None,
400
- generate_signing_key: Optional[pulumi.Input[builtins.bool]] = None,
401
- key_bits: Optional[pulumi.Input[builtins.int]] = None,
402
- key_type: Optional[pulumi.Input[builtins.str]] = None,
403
- namespace: Optional[pulumi.Input[builtins.str]] = None,
404
- private_key: Optional[pulumi.Input[builtins.str]] = None,
405
- public_key: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendCa':
398
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
399
+ generate_signing_key: Optional[pulumi.Input[_builtins.bool]] = None,
400
+ key_bits: Optional[pulumi.Input[_builtins.int]] = None,
401
+ key_type: Optional[pulumi.Input[_builtins.str]] = None,
402
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
403
+ private_key: Optional[pulumi.Input[_builtins.str]] = None,
404
+ public_key: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendCa':
406
405
  """
407
406
  Get an existing SecretBackendCa resource's state with the given name, id, and optional extra
408
407
  properties used to qualify the lookup.
@@ -410,16 +409,16 @@ class SecretBackendCa(pulumi.CustomResource):
410
409
  :param str resource_name: The unique name of the resulting resource.
411
410
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
412
411
  :param pulumi.ResourceOptions opts: Options for the resource.
413
- :param pulumi.Input[builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
414
- :param pulumi.Input[builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
415
- :param pulumi.Input[builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
416
- :param pulumi.Input[builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
417
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
412
+ :param pulumi.Input[_builtins.str] backend: The path where the SSH secret backend is mounted. Defaults to 'ssh'
413
+ :param pulumi.Input[_builtins.bool] generate_signing_key: Whether Vault should generate the signing key pair internally. Defaults to true
414
+ :param pulumi.Input[_builtins.int] key_bits: Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
415
+ :param pulumi.Input[_builtins.str] key_type: Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
416
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
418
417
  The value should not contain leading or trailing forward slashes.
419
418
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
420
419
  *Available only for Vault Enterprise*.
421
- :param pulumi.Input[builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
422
- :param pulumi.Input[builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
420
+ :param pulumi.Input[_builtins.str] private_key: Private key part the SSH CA key pair; required if generate_signing_key is false.
421
+ :param pulumi.Input[_builtins.str] public_key: The public key part the SSH CA key pair; required if generate_signing_key is false.
423
422
  """
424
423
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
425
424
 
@@ -434,41 +433,41 @@ class SecretBackendCa(pulumi.CustomResource):
434
433
  __props__.__dict__["public_key"] = public_key
435
434
  return SecretBackendCa(resource_name, opts=opts, __props__=__props__)
436
435
 
437
- @property
436
+ @_builtins.property
438
437
  @pulumi.getter
439
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
438
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
440
439
  """
441
440
  The path where the SSH secret backend is mounted. Defaults to 'ssh'
442
441
  """
443
442
  return pulumi.get(self, "backend")
444
443
 
445
- @property
444
+ @_builtins.property
446
445
  @pulumi.getter(name="generateSigningKey")
447
- def generate_signing_key(self) -> pulumi.Output[Optional[builtins.bool]]:
446
+ def generate_signing_key(self) -> pulumi.Output[Optional[_builtins.bool]]:
448
447
  """
449
448
  Whether Vault should generate the signing key pair internally. Defaults to true
450
449
  """
451
450
  return pulumi.get(self, "generate_signing_key")
452
451
 
453
- @property
452
+ @_builtins.property
454
453
  @pulumi.getter(name="keyBits")
455
- def key_bits(self) -> pulumi.Output[Optional[builtins.int]]:
454
+ def key_bits(self) -> pulumi.Output[Optional[_builtins.int]]:
456
455
  """
457
456
  Specifies the desired key bits for the generated SSH CA key when `generate_signing_key` is set to `true`.
458
457
  """
459
458
  return pulumi.get(self, "key_bits")
460
459
 
461
- @property
460
+ @_builtins.property
462
461
  @pulumi.getter(name="keyType")
463
- def key_type(self) -> pulumi.Output[Optional[builtins.str]]:
462
+ def key_type(self) -> pulumi.Output[Optional[_builtins.str]]:
464
463
  """
465
464
  Specifies the desired key type for the generated SSH CA key when `generate_signing_key` is set to `true`.
466
465
  """
467
466
  return pulumi.get(self, "key_type")
468
467
 
469
- @property
468
+ @_builtins.property
470
469
  @pulumi.getter
471
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
470
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
472
471
  """
473
472
  The namespace to provision the resource in.
474
473
  The value should not contain leading or trailing forward slashes.
@@ -477,17 +476,17 @@ class SecretBackendCa(pulumi.CustomResource):
477
476
  """
478
477
  return pulumi.get(self, "namespace")
479
478
 
480
- @property
479
+ @_builtins.property
481
480
  @pulumi.getter(name="privateKey")
482
- def private_key(self) -> pulumi.Output[builtins.str]:
481
+ def private_key(self) -> pulumi.Output[_builtins.str]:
483
482
  """
484
483
  Private key part the SSH CA key pair; required if generate_signing_key is false.
485
484
  """
486
485
  return pulumi.get(self, "private_key")
487
486
 
488
- @property
487
+ @_builtins.property
489
488
  @pulumi.getter(name="publicKey")
490
- def public_key(self) -> pulumi.Output[builtins.str]:
489
+ def public_key(self) -> pulumi.Output[_builtins.str]:
491
490
  """
492
491
  The public key part the SSH CA key pair; required if generate_signing_key is false.
493
492
  """