pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -80,43 +79,43 @@ class GetAccessCredentialsResult:
80
79
  raise TypeError("Expected argument 'validate_creds' to be a bool")
81
80
  pulumi.set(__self__, "validate_creds", validate_creds)
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter
85
- def backend(self) -> builtins.str:
84
+ def backend(self) -> _builtins.str:
86
85
  return pulumi.get(self, "backend")
87
86
 
88
- @property
87
+ @_builtins.property
89
88
  @pulumi.getter(name="clientId")
90
- def client_id(self) -> builtins.str:
89
+ def client_id(self) -> _builtins.str:
91
90
  """
92
91
  The client id for credentials to query the Azure APIs.
93
92
  """
94
93
  return pulumi.get(self, "client_id")
95
94
 
96
- @property
95
+ @_builtins.property
97
96
  @pulumi.getter(name="clientSecret")
98
- def client_secret(self) -> builtins.str:
97
+ def client_secret(self) -> _builtins.str:
99
98
  """
100
99
  The client secret for credentials to query the Azure APIs.
101
100
  """
102
101
  return pulumi.get(self, "client_secret")
103
102
 
104
- @property
103
+ @_builtins.property
105
104
  @pulumi.getter
106
- def environment(self) -> Optional[builtins.str]:
105
+ def environment(self) -> Optional[_builtins.str]:
107
106
  return pulumi.get(self, "environment")
108
107
 
109
- @property
108
+ @_builtins.property
110
109
  @pulumi.getter
111
- def id(self) -> builtins.str:
110
+ def id(self) -> _builtins.str:
112
111
  """
113
112
  The provider-assigned unique ID for this managed resource.
114
113
  """
115
114
  return pulumi.get(self, "id")
116
115
 
117
- @property
116
+ @_builtins.property
118
117
  @pulumi.getter(name="leaseDuration")
119
- def lease_duration(self) -> builtins.int:
118
+ def lease_duration(self) -> _builtins.int:
120
119
  """
121
120
  The duration of the secret lease, in seconds relative
122
121
  to the time the data was requested. Once this time has passed any plan
@@ -124,62 +123,62 @@ class GetAccessCredentialsResult:
124
123
  """
125
124
  return pulumi.get(self, "lease_duration")
126
125
 
127
- @property
126
+ @_builtins.property
128
127
  @pulumi.getter(name="leaseId")
129
- def lease_id(self) -> builtins.str:
128
+ def lease_id(self) -> _builtins.str:
130
129
  """
131
130
  The lease identifier assigned by Vault.
132
131
  """
133
132
  return pulumi.get(self, "lease_id")
134
133
 
135
- @property
134
+ @_builtins.property
136
135
  @pulumi.getter(name="leaseRenewable")
137
- def lease_renewable(self) -> builtins.bool:
136
+ def lease_renewable(self) -> _builtins.bool:
138
137
  return pulumi.get(self, "lease_renewable")
139
138
 
140
- @property
139
+ @_builtins.property
141
140
  @pulumi.getter(name="leaseStartTime")
142
- def lease_start_time(self) -> builtins.str:
141
+ def lease_start_time(self) -> _builtins.str:
143
142
  return pulumi.get(self, "lease_start_time")
144
143
 
145
- @property
144
+ @_builtins.property
146
145
  @pulumi.getter(name="maxCredValidationSeconds")
147
- def max_cred_validation_seconds(self) -> Optional[builtins.int]:
146
+ def max_cred_validation_seconds(self) -> Optional[_builtins.int]:
148
147
  return pulumi.get(self, "max_cred_validation_seconds")
149
148
 
150
- @property
149
+ @_builtins.property
151
150
  @pulumi.getter
152
- def namespace(self) -> Optional[builtins.str]:
151
+ def namespace(self) -> Optional[_builtins.str]:
153
152
  return pulumi.get(self, "namespace")
154
153
 
155
- @property
154
+ @_builtins.property
156
155
  @pulumi.getter(name="numSecondsBetweenTests")
157
- def num_seconds_between_tests(self) -> Optional[builtins.int]:
156
+ def num_seconds_between_tests(self) -> Optional[_builtins.int]:
158
157
  return pulumi.get(self, "num_seconds_between_tests")
159
158
 
160
- @property
159
+ @_builtins.property
161
160
  @pulumi.getter(name="numSequentialSuccesses")
162
- def num_sequential_successes(self) -> Optional[builtins.int]:
161
+ def num_sequential_successes(self) -> Optional[_builtins.int]:
163
162
  return pulumi.get(self, "num_sequential_successes")
164
163
 
165
- @property
164
+ @_builtins.property
166
165
  @pulumi.getter
167
- def role(self) -> builtins.str:
166
+ def role(self) -> _builtins.str:
168
167
  return pulumi.get(self, "role")
169
168
 
170
- @property
169
+ @_builtins.property
171
170
  @pulumi.getter(name="subscriptionId")
172
- def subscription_id(self) -> Optional[builtins.str]:
171
+ def subscription_id(self) -> Optional[_builtins.str]:
173
172
  return pulumi.get(self, "subscription_id")
174
173
 
175
- @property
174
+ @_builtins.property
176
175
  @pulumi.getter(name="tenantId")
177
- def tenant_id(self) -> Optional[builtins.str]:
176
+ def tenant_id(self) -> Optional[_builtins.str]:
178
177
  return pulumi.get(self, "tenant_id")
179
178
 
180
- @property
179
+ @_builtins.property
181
180
  @pulumi.getter(name="validateCreds")
182
- def validate_creds(self) -> Optional[builtins.bool]:
181
+ def validate_creds(self) -> Optional[_builtins.bool]:
183
182
  return pulumi.get(self, "validate_creds")
184
183
 
185
184
 
@@ -208,16 +207,16 @@ class AwaitableGetAccessCredentialsResult(GetAccessCredentialsResult):
208
207
  validate_creds=self.validate_creds)
209
208
 
210
209
 
211
- def get_access_credentials(backend: Optional[builtins.str] = None,
212
- environment: Optional[builtins.str] = None,
213
- max_cred_validation_seconds: Optional[builtins.int] = None,
214
- namespace: Optional[builtins.str] = None,
215
- num_seconds_between_tests: Optional[builtins.int] = None,
216
- num_sequential_successes: Optional[builtins.int] = None,
217
- role: Optional[builtins.str] = None,
218
- subscription_id: Optional[builtins.str] = None,
219
- tenant_id: Optional[builtins.str] = None,
220
- validate_creds: Optional[builtins.bool] = None,
210
+ def get_access_credentials(backend: Optional[_builtins.str] = None,
211
+ environment: Optional[_builtins.str] = None,
212
+ max_cred_validation_seconds: Optional[_builtins.int] = None,
213
+ namespace: Optional[_builtins.str] = None,
214
+ num_seconds_between_tests: Optional[_builtins.int] = None,
215
+ num_sequential_successes: Optional[_builtins.int] = None,
216
+ role: Optional[_builtins.str] = None,
217
+ subscription_id: Optional[_builtins.str] = None,
218
+ tenant_id: Optional[_builtins.str] = None,
219
+ validate_creds: Optional[_builtins.bool] = None,
221
220
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAccessCredentialsResult:
222
221
  """
223
222
  ## Example Usage
@@ -240,34 +239,34 @@ def get_access_credentials(backend: Optional[builtins.str] = None,
240
239
  are required to be set for: `subscription_id`, `tenant_id`, `environment`.
241
240
 
242
241
 
243
- :param builtins.str backend: The path to the Azure secret backend to
242
+ :param _builtins.str backend: The path to the Azure secret backend to
244
243
  read credentials from, with no leading or trailing `/`s.
245
- :param builtins.str environment: The Azure environment to use during credential validation.
244
+ :param _builtins.str environment: The Azure environment to use during credential validation.
246
245
  Defaults to the environment configured in the Vault backend.
247
246
  Some possible values: `AzurePublicCloud`, `AzureGovernmentCloud`
248
247
  *See the caveats section for more information on this field.*
249
- :param builtins.int max_cred_validation_seconds: If 'validate_creds' is true,
248
+ :param _builtins.int max_cred_validation_seconds: If 'validate_creds' is true,
250
249
  the number of seconds after which to give up validating credentials. Defaults
251
250
  to 300.
252
- :param builtins.str namespace: The namespace of the target resource.
251
+ :param _builtins.str namespace: The namespace of the target resource.
253
252
  The value should not contain leading or trailing forward slashes.
254
253
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
255
254
  *Available only for Vault Enterprise*.
256
- :param builtins.int num_seconds_between_tests: If 'validate_creds' is true,
255
+ :param _builtins.int num_seconds_between_tests: If 'validate_creds' is true,
257
256
  the number of seconds to wait between each test of generated credentials.
258
257
  Defaults to 1.
259
- :param builtins.int num_sequential_successes: If 'validate_creds' is true,
258
+ :param _builtins.int num_sequential_successes: If 'validate_creds' is true,
260
259
  the number of sequential successes required to validate generated
261
260
  credentials. Defaults to 8.
262
- :param builtins.str role: The name of the Azure secret backend role to read
261
+ :param _builtins.str role: The name of the Azure secret backend role to read
263
262
  credentials from, with no leading or trailing `/`s.
264
- :param builtins.str subscription_id: The subscription ID to use during credential
263
+ :param _builtins.str subscription_id: The subscription ID to use during credential
265
264
  validation. Defaults to the subscription ID configured in the Vault `backend`.
266
265
  *See the caveats section for more information on this field.*
267
- :param builtins.str tenant_id: The tenant ID to use during credential validation.
266
+ :param _builtins.str tenant_id: The tenant ID to use during credential validation.
268
267
  Defaults to the tenant ID configured in the Vault `backend`.
269
268
  *See the caveats section for more information on this field.*
270
- :param builtins.bool validate_creds: Whether generated credentials should be
269
+ :param _builtins.bool validate_creds: Whether generated credentials should be
271
270
  validated before being returned. Defaults to `false`, which returns
272
271
  credentials without checking whether they have fully propagated throughout
273
272
  Azure Active Directory. Designating `true` activates testing.
@@ -304,16 +303,16 @@ def get_access_credentials(backend: Optional[builtins.str] = None,
304
303
  subscription_id=pulumi.get(__ret__, 'subscription_id'),
305
304
  tenant_id=pulumi.get(__ret__, 'tenant_id'),
306
305
  validate_creds=pulumi.get(__ret__, 'validate_creds'))
307
- def get_access_credentials_output(backend: Optional[pulumi.Input[builtins.str]] = None,
308
- environment: Optional[pulumi.Input[Optional[builtins.str]]] = None,
309
- max_cred_validation_seconds: Optional[pulumi.Input[Optional[builtins.int]]] = None,
310
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
311
- num_seconds_between_tests: Optional[pulumi.Input[Optional[builtins.int]]] = None,
312
- num_sequential_successes: Optional[pulumi.Input[Optional[builtins.int]]] = None,
313
- role: Optional[pulumi.Input[builtins.str]] = None,
314
- subscription_id: Optional[pulumi.Input[Optional[builtins.str]]] = None,
315
- tenant_id: Optional[pulumi.Input[Optional[builtins.str]]] = None,
316
- validate_creds: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
306
+ def get_access_credentials_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
307
+ environment: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
308
+ max_cred_validation_seconds: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
309
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
310
+ num_seconds_between_tests: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
311
+ num_sequential_successes: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
312
+ role: Optional[pulumi.Input[_builtins.str]] = None,
313
+ subscription_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
314
+ tenant_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
315
+ validate_creds: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
317
316
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAccessCredentialsResult]:
318
317
  """
319
318
  ## Example Usage
@@ -336,34 +335,34 @@ def get_access_credentials_output(backend: Optional[pulumi.Input[builtins.str]]
336
335
  are required to be set for: `subscription_id`, `tenant_id`, `environment`.
337
336
 
338
337
 
339
- :param builtins.str backend: The path to the Azure secret backend to
338
+ :param _builtins.str backend: The path to the Azure secret backend to
340
339
  read credentials from, with no leading or trailing `/`s.
341
- :param builtins.str environment: The Azure environment to use during credential validation.
340
+ :param _builtins.str environment: The Azure environment to use during credential validation.
342
341
  Defaults to the environment configured in the Vault backend.
343
342
  Some possible values: `AzurePublicCloud`, `AzureGovernmentCloud`
344
343
  *See the caveats section for more information on this field.*
345
- :param builtins.int max_cred_validation_seconds: If 'validate_creds' is true,
344
+ :param _builtins.int max_cred_validation_seconds: If 'validate_creds' is true,
346
345
  the number of seconds after which to give up validating credentials. Defaults
347
346
  to 300.
348
- :param builtins.str namespace: The namespace of the target resource.
347
+ :param _builtins.str namespace: The namespace of the target resource.
349
348
  The value should not contain leading or trailing forward slashes.
350
349
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
351
350
  *Available only for Vault Enterprise*.
352
- :param builtins.int num_seconds_between_tests: If 'validate_creds' is true,
351
+ :param _builtins.int num_seconds_between_tests: If 'validate_creds' is true,
353
352
  the number of seconds to wait between each test of generated credentials.
354
353
  Defaults to 1.
355
- :param builtins.int num_sequential_successes: If 'validate_creds' is true,
354
+ :param _builtins.int num_sequential_successes: If 'validate_creds' is true,
356
355
  the number of sequential successes required to validate generated
357
356
  credentials. Defaults to 8.
358
- :param builtins.str role: The name of the Azure secret backend role to read
357
+ :param _builtins.str role: The name of the Azure secret backend role to read
359
358
  credentials from, with no leading or trailing `/`s.
360
- :param builtins.str subscription_id: The subscription ID to use during credential
359
+ :param _builtins.str subscription_id: The subscription ID to use during credential
361
360
  validation. Defaults to the subscription ID configured in the Vault `backend`.
362
361
  *See the caveats section for more information on this field.*
363
- :param builtins.str tenant_id: The tenant ID to use during credential validation.
362
+ :param _builtins.str tenant_id: The tenant ID to use during credential validation.
364
363
  Defaults to the tenant ID configured in the Vault `backend`.
365
364
  *See the caveats section for more information on this field.*
366
- :param builtins.bool validate_creds: Whether generated credentials should be
365
+ :param _builtins.bool validate_creds: Whether generated credentials should be
367
366
  validated before being returned. Defaults to `false`, which returns
368
367
  credentials without checking whether they have fully propagated throughout
369
368
  Azure Active Directory. Designating `true` activates testing.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -42,20 +41,20 @@ class BackendRoleAzureGroup(dict):
42
41
  return super().get(key, default)
43
42
 
44
43
  def __init__(__self__, *,
45
- group_name: builtins.str,
46
- object_id: Optional[builtins.str] = None):
44
+ group_name: _builtins.str,
45
+ object_id: Optional[_builtins.str] = None):
47
46
  pulumi.set(__self__, "group_name", group_name)
48
47
  if object_id is not None:
49
48
  pulumi.set(__self__, "object_id", object_id)
50
49
 
51
- @property
50
+ @_builtins.property
52
51
  @pulumi.getter(name="groupName")
53
- def group_name(self) -> builtins.str:
52
+ def group_name(self) -> _builtins.str:
54
53
  return pulumi.get(self, "group_name")
55
54
 
56
- @property
55
+ @_builtins.property
57
56
  @pulumi.getter(name="objectId")
58
- def object_id(self) -> Optional[builtins.str]:
57
+ def object_id(self) -> Optional[_builtins.str]:
59
58
  return pulumi.get(self, "object_id")
60
59
 
61
60
 
@@ -81,28 +80,28 @@ class BackendRoleAzureRole(dict):
81
80
  return super().get(key, default)
82
81
 
83
82
  def __init__(__self__, *,
84
- scope: builtins.str,
85
- role_id: Optional[builtins.str] = None,
86
- role_name: Optional[builtins.str] = None):
83
+ scope: _builtins.str,
84
+ role_id: Optional[_builtins.str] = None,
85
+ role_name: Optional[_builtins.str] = None):
87
86
  pulumi.set(__self__, "scope", scope)
88
87
  if role_id is not None:
89
88
  pulumi.set(__self__, "role_id", role_id)
90
89
  if role_name is not None:
91
90
  pulumi.set(__self__, "role_name", role_name)
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter
95
- def scope(self) -> builtins.str:
94
+ def scope(self) -> _builtins.str:
96
95
  return pulumi.get(self, "scope")
97
96
 
98
- @property
97
+ @_builtins.property
99
98
  @pulumi.getter(name="roleId")
100
- def role_id(self) -> Optional[builtins.str]:
99
+ def role_id(self) -> Optional[_builtins.str]:
101
100
  return pulumi.get(self, "role_id")
102
101
 
103
- @property
102
+ @_builtins.property
104
103
  @pulumi.getter(name="roleName")
105
- def role_name(self) -> Optional[builtins.str]:
104
+ def role_name(self) -> Optional[_builtins.str]:
106
105
  return pulumi.get(self, "role_name")
107
106
 
108
107