pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -62,9 +61,9 @@ class GetSecretResult:
62
61
  raise TypeError("Expected argument 'with_lease_start_time' to be a bool")
63
62
  pulumi.set(__self__, "with_lease_start_time", with_lease_start_time)
64
63
 
65
- @property
64
+ @_builtins.property
66
65
  @pulumi.getter
67
- def data(self) -> Mapping[str, builtins.str]:
66
+ def data(self) -> Mapping[str, _builtins.str]:
68
67
  """
69
68
  A mapping whose keys are the top-level data keys returned from
70
69
  Vault and whose values are the corresponding values. This map can only
@@ -73,26 +72,26 @@ class GetSecretResult:
73
72
  """
74
73
  return pulumi.get(self, "data")
75
74
 
76
- @property
75
+ @_builtins.property
77
76
  @pulumi.getter(name="dataJson")
78
- def data_json(self) -> builtins.str:
77
+ def data_json(self) -> _builtins.str:
79
78
  """
80
79
  A string containing the full data payload retrieved from
81
80
  Vault, serialized in JSON format.
82
81
  """
83
82
  return pulumi.get(self, "data_json")
84
83
 
85
- @property
84
+ @_builtins.property
86
85
  @pulumi.getter
87
- def id(self) -> builtins.str:
86
+ def id(self) -> _builtins.str:
88
87
  """
89
88
  The provider-assigned unique ID for this managed resource.
90
89
  """
91
90
  return pulumi.get(self, "id")
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter(name="leaseDuration")
95
- def lease_duration(self) -> builtins.int:
94
+ def lease_duration(self) -> _builtins.int:
96
95
  """
97
96
  The duration of the secret lease, in seconds relative
98
97
  to the time the data was requested. Once this time has passed any plan
@@ -100,42 +99,42 @@ class GetSecretResult:
100
99
  """
101
100
  return pulumi.get(self, "lease_duration")
102
101
 
103
- @property
102
+ @_builtins.property
104
103
  @pulumi.getter(name="leaseId")
105
- def lease_id(self) -> builtins.str:
104
+ def lease_id(self) -> _builtins.str:
106
105
  """
107
106
  The lease identifier assigned by Vault, if any.
108
107
  """
109
108
  return pulumi.get(self, "lease_id")
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter(name="leaseRenewable")
113
- def lease_renewable(self) -> builtins.bool:
112
+ def lease_renewable(self) -> _builtins.bool:
114
113
  return pulumi.get(self, "lease_renewable")
115
114
 
116
- @property
115
+ @_builtins.property
117
116
  @pulumi.getter(name="leaseStartTime")
118
- def lease_start_time(self) -> builtins.str:
117
+ def lease_start_time(self) -> _builtins.str:
119
118
  return pulumi.get(self, "lease_start_time")
120
119
 
121
- @property
120
+ @_builtins.property
122
121
  @pulumi.getter
123
- def namespace(self) -> Optional[builtins.str]:
122
+ def namespace(self) -> Optional[_builtins.str]:
124
123
  return pulumi.get(self, "namespace")
125
124
 
126
- @property
125
+ @_builtins.property
127
126
  @pulumi.getter
128
- def path(self) -> builtins.str:
127
+ def path(self) -> _builtins.str:
129
128
  return pulumi.get(self, "path")
130
129
 
131
- @property
130
+ @_builtins.property
132
131
  @pulumi.getter
133
- def version(self) -> Optional[builtins.int]:
132
+ def version(self) -> Optional[_builtins.int]:
134
133
  return pulumi.get(self, "version")
135
134
 
136
- @property
135
+ @_builtins.property
137
136
  @pulumi.getter(name="withLeaseStartTime")
138
- def with_lease_start_time(self) -> Optional[builtins.bool]:
137
+ def with_lease_start_time(self) -> Optional[_builtins.bool]:
139
138
  return pulumi.get(self, "with_lease_start_time")
140
139
 
141
140
 
@@ -158,10 +157,10 @@ class AwaitableGetSecretResult(GetSecretResult):
158
157
  with_lease_start_time=self.with_lease_start_time)
159
158
 
160
159
 
161
- def get_secret(namespace: Optional[builtins.str] = None,
162
- path: Optional[builtins.str] = None,
163
- version: Optional[builtins.int] = None,
164
- with_lease_start_time: Optional[builtins.bool] = None,
160
+ def get_secret(namespace: Optional[_builtins.str] = None,
161
+ path: Optional[_builtins.str] = None,
162
+ version: Optional[_builtins.int] = None,
163
+ with_lease_start_time: Optional[_builtins.bool] = None,
165
164
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretResult:
166
165
  """
167
166
  ## Example Usage
@@ -196,19 +195,19 @@ def get_secret(namespace: Optional[builtins.str] = None,
196
195
  Use of this resource requires the `read` capability on the given path.
197
196
 
198
197
 
199
- :param builtins.str namespace: The namespace of the target resource.
198
+ :param _builtins.str namespace: The namespace of the target resource.
200
199
  The value should not contain leading or trailing forward slashes.
201
200
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
202
201
  *Available only for Vault Enterprise*.
203
- :param builtins.str path: The full logical path from which to request data.
202
+ :param _builtins.str path: The full logical path from which to request data.
204
203
  To read data from the "generic" secret backend mounted in Vault by
205
204
  default, this should be prefixed with `secret/`. Reading from other backends
206
205
  with this data source is possible; consult each backend's documentation
207
206
  to see which endpoints support the `GET` method.
208
- :param builtins.int version: The version of the secret to read. This is used by the
207
+ :param _builtins.int version: The version of the secret to read. This is used by the
209
208
  Vault KV secrets engine - version 2 to indicate which version of the secret
210
209
  to read.
211
- :param builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
210
+ :param _builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
212
211
  Note that storing the `lease_start_time` in the TF state will cause a persistent drift
213
212
  on every `pulumi preview` and will require a `pulumi up`.
214
213
  """
@@ -232,10 +231,10 @@ def get_secret(namespace: Optional[builtins.str] = None,
232
231
  path=pulumi.get(__ret__, 'path'),
233
232
  version=pulumi.get(__ret__, 'version'),
234
233
  with_lease_start_time=pulumi.get(__ret__, 'with_lease_start_time'))
235
- def get_secret_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
236
- path: Optional[pulumi.Input[builtins.str]] = None,
237
- version: Optional[pulumi.Input[Optional[builtins.int]]] = None,
238
- with_lease_start_time: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
234
+ def get_secret_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
235
+ path: Optional[pulumi.Input[_builtins.str]] = None,
236
+ version: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
237
+ with_lease_start_time: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
239
238
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretResult]:
240
239
  """
241
240
  ## Example Usage
@@ -270,19 +269,19 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]]
270
269
  Use of this resource requires the `read` capability on the given path.
271
270
 
272
271
 
273
- :param builtins.str namespace: The namespace of the target resource.
272
+ :param _builtins.str namespace: The namespace of the target resource.
274
273
  The value should not contain leading or trailing forward slashes.
275
274
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
276
275
  *Available only for Vault Enterprise*.
277
- :param builtins.str path: The full logical path from which to request data.
276
+ :param _builtins.str path: The full logical path from which to request data.
278
277
  To read data from the "generic" secret backend mounted in Vault by
279
278
  default, this should be prefixed with `secret/`. Reading from other backends
280
279
  with this data source is possible; consult each backend's documentation
281
280
  to see which endpoints support the `GET` method.
282
- :param builtins.int version: The version of the secret to read. This is used by the
281
+ :param _builtins.int version: The version of the secret to read. This is used by the
283
282
  Vault KV secrets engine - version 2 to indicate which version of the secret
284
283
  to read.
285
- :param builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
284
+ :param _builtins.bool with_lease_start_time: If set to true, stores `lease_start_time` in the TF state.
286
285
  Note that storing the `lease_start_time` in the TF state will cause a persistent drift
287
286
  on every `pulumi preview` and will require a `pulumi up`.
288
287
  """
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,28 +19,28 @@ __all__ = ['SecretArgs', 'Secret']
20
19
  @pulumi.input_type
21
20
  class SecretArgs:
22
21
  def __init__(__self__, *,
23
- data_json: pulumi.Input[builtins.str],
24
- path: pulumi.Input[builtins.str],
25
- delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
26
- disable_read: Optional[pulumi.Input[builtins.bool]] = None,
27
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ data_json: pulumi.Input[_builtins.str],
23
+ path: pulumi.Input[_builtins.str],
24
+ delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
25
+ disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
28
27
  """
29
28
  The set of arguments for constructing a Secret resource.
30
- :param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
29
+ :param pulumi.Input[_builtins.str] data_json: String containing a JSON-encoded object that will be
31
30
  written as the secret data at the given path.
32
- :param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
31
+ :param pulumi.Input[_builtins.str] path: The full logical path at which to write the given data.
33
32
  To write data into the "generic" secret backend mounted in Vault by default,
34
33
  this should be prefixed with `secret/`. Writing to other backends with this
35
34
  resource is possible; consult each backend's documentation to see which
36
35
  endpoints support the `PUT` and `DELETE` methods.
37
- :param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
36
+ :param pulumi.Input[_builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
38
37
  If set to `true`, permanently deletes all versions for
39
38
  the specified key. The default behavior is to only delete the latest version of the
40
39
  secret.
41
- :param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
40
+ :param pulumi.Input[_builtins.bool] disable_read: true/false. Set this to true if your vault
42
41
  authentication is not able to read the data. Setting this to `true` will
43
42
  break drift detection. Defaults to false.
44
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
43
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
45
44
  The value should not contain leading or trailing forward slashes.
46
45
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
47
46
  *Available only for Vault Enterprise*.
@@ -55,9 +54,9 @@ class SecretArgs:
55
54
  if namespace is not None:
56
55
  pulumi.set(__self__, "namespace", namespace)
57
56
 
58
- @property
57
+ @_builtins.property
59
58
  @pulumi.getter(name="dataJson")
60
- def data_json(self) -> pulumi.Input[builtins.str]:
59
+ def data_json(self) -> pulumi.Input[_builtins.str]:
61
60
  """
62
61
  String containing a JSON-encoded object that will be
63
62
  written as the secret data at the given path.
@@ -65,12 +64,12 @@ class SecretArgs:
65
64
  return pulumi.get(self, "data_json")
66
65
 
67
66
  @data_json.setter
68
- def data_json(self, value: pulumi.Input[builtins.str]):
67
+ def data_json(self, value: pulumi.Input[_builtins.str]):
69
68
  pulumi.set(self, "data_json", value)
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter
73
- def path(self) -> pulumi.Input[builtins.str]:
72
+ def path(self) -> pulumi.Input[_builtins.str]:
74
73
  """
75
74
  The full logical path at which to write the given data.
76
75
  To write data into the "generic" secret backend mounted in Vault by default,
@@ -81,12 +80,12 @@ class SecretArgs:
81
80
  return pulumi.get(self, "path")
82
81
 
83
82
  @path.setter
84
- def path(self, value: pulumi.Input[builtins.str]):
83
+ def path(self, value: pulumi.Input[_builtins.str]):
85
84
  pulumi.set(self, "path", value)
86
85
 
87
- @property
86
+ @_builtins.property
88
87
  @pulumi.getter(name="deleteAllVersions")
89
- def delete_all_versions(self) -> Optional[pulumi.Input[builtins.bool]]:
88
+ def delete_all_versions(self) -> Optional[pulumi.Input[_builtins.bool]]:
90
89
  """
91
90
  true/false. Only applicable for kv-v2 stores.
92
91
  If set to `true`, permanently deletes all versions for
@@ -96,12 +95,12 @@ class SecretArgs:
96
95
  return pulumi.get(self, "delete_all_versions")
97
96
 
98
97
  @delete_all_versions.setter
99
- def delete_all_versions(self, value: Optional[pulumi.Input[builtins.bool]]):
98
+ def delete_all_versions(self, value: Optional[pulumi.Input[_builtins.bool]]):
100
99
  pulumi.set(self, "delete_all_versions", value)
101
100
 
102
- @property
101
+ @_builtins.property
103
102
  @pulumi.getter(name="disableRead")
104
- def disable_read(self) -> Optional[pulumi.Input[builtins.bool]]:
103
+ def disable_read(self) -> Optional[pulumi.Input[_builtins.bool]]:
105
104
  """
106
105
  true/false. Set this to true if your vault
107
106
  authentication is not able to read the data. Setting this to `true` will
@@ -110,12 +109,12 @@ class SecretArgs:
110
109
  return pulumi.get(self, "disable_read")
111
110
 
112
111
  @disable_read.setter
113
- def disable_read(self, value: Optional[pulumi.Input[builtins.bool]]):
112
+ def disable_read(self, value: Optional[pulumi.Input[_builtins.bool]]):
114
113
  pulumi.set(self, "disable_read", value)
115
114
 
116
- @property
115
+ @_builtins.property
117
116
  @pulumi.getter
118
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
117
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
119
118
  """
120
119
  The namespace to provision the resource in.
121
120
  The value should not contain leading or trailing forward slashes.
@@ -125,39 +124,39 @@ class SecretArgs:
125
124
  return pulumi.get(self, "namespace")
126
125
 
127
126
  @namespace.setter
128
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
127
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
129
128
  pulumi.set(self, "namespace", value)
130
129
 
131
130
 
132
131
  @pulumi.input_type
133
132
  class _SecretState:
134
133
  def __init__(__self__, *,
135
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
136
- data_json: Optional[pulumi.Input[builtins.str]] = None,
137
- delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
138
- disable_read: Optional[pulumi.Input[builtins.bool]] = None,
139
- namespace: Optional[pulumi.Input[builtins.str]] = None,
140
- path: Optional[pulumi.Input[builtins.str]] = None):
134
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
135
+ data_json: Optional[pulumi.Input[_builtins.str]] = None,
136
+ delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
137
+ disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
138
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
139
+ path: Optional[pulumi.Input[_builtins.str]] = None):
141
140
  """
142
141
  Input properties used for looking up and filtering Secret resources.
143
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
142
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
144
143
  Vault and whose values are the corresponding values. This map can only
145
144
  represent string data, so any non-string values returned from Vault are
146
145
  serialized as JSON.
147
- :param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
146
+ :param pulumi.Input[_builtins.str] data_json: String containing a JSON-encoded object that will be
148
147
  written as the secret data at the given path.
149
- :param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
148
+ :param pulumi.Input[_builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
150
149
  If set to `true`, permanently deletes all versions for
151
150
  the specified key. The default behavior is to only delete the latest version of the
152
151
  secret.
153
- :param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
152
+ :param pulumi.Input[_builtins.bool] disable_read: true/false. Set this to true if your vault
154
153
  authentication is not able to read the data. Setting this to `true` will
155
154
  break drift detection. Defaults to false.
156
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
155
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
157
156
  The value should not contain leading or trailing forward slashes.
158
157
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
159
158
  *Available only for Vault Enterprise*.
160
- :param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
159
+ :param pulumi.Input[_builtins.str] path: The full logical path at which to write the given data.
161
160
  To write data into the "generic" secret backend mounted in Vault by default,
162
161
  this should be prefixed with `secret/`. Writing to other backends with this
163
162
  resource is possible; consult each backend's documentation to see which
@@ -176,9 +175,9 @@ class _SecretState:
176
175
  if path is not None:
177
176
  pulumi.set(__self__, "path", path)
178
177
 
179
- @property
178
+ @_builtins.property
180
179
  @pulumi.getter
181
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
180
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
182
181
  """
183
182
  A mapping whose keys are the top-level data keys returned from
184
183
  Vault and whose values are the corresponding values. This map can only
@@ -188,12 +187,12 @@ class _SecretState:
188
187
  return pulumi.get(self, "data")
189
188
 
190
189
  @data.setter
191
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
190
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
192
191
  pulumi.set(self, "data", value)
193
192
 
194
- @property
193
+ @_builtins.property
195
194
  @pulumi.getter(name="dataJson")
196
- def data_json(self) -> Optional[pulumi.Input[builtins.str]]:
195
+ def data_json(self) -> Optional[pulumi.Input[_builtins.str]]:
197
196
  """
198
197
  String containing a JSON-encoded object that will be
199
198
  written as the secret data at the given path.
@@ -201,12 +200,12 @@ class _SecretState:
201
200
  return pulumi.get(self, "data_json")
202
201
 
203
202
  @data_json.setter
204
- def data_json(self, value: Optional[pulumi.Input[builtins.str]]):
203
+ def data_json(self, value: Optional[pulumi.Input[_builtins.str]]):
205
204
  pulumi.set(self, "data_json", value)
206
205
 
207
- @property
206
+ @_builtins.property
208
207
  @pulumi.getter(name="deleteAllVersions")
209
- def delete_all_versions(self) -> Optional[pulumi.Input[builtins.bool]]:
208
+ def delete_all_versions(self) -> Optional[pulumi.Input[_builtins.bool]]:
210
209
  """
211
210
  true/false. Only applicable for kv-v2 stores.
212
211
  If set to `true`, permanently deletes all versions for
@@ -216,12 +215,12 @@ class _SecretState:
216
215
  return pulumi.get(self, "delete_all_versions")
217
216
 
218
217
  @delete_all_versions.setter
219
- def delete_all_versions(self, value: Optional[pulumi.Input[builtins.bool]]):
218
+ def delete_all_versions(self, value: Optional[pulumi.Input[_builtins.bool]]):
220
219
  pulumi.set(self, "delete_all_versions", value)
221
220
 
222
- @property
221
+ @_builtins.property
223
222
  @pulumi.getter(name="disableRead")
224
- def disable_read(self) -> Optional[pulumi.Input[builtins.bool]]:
223
+ def disable_read(self) -> Optional[pulumi.Input[_builtins.bool]]:
225
224
  """
226
225
  true/false. Set this to true if your vault
227
226
  authentication is not able to read the data. Setting this to `true` will
@@ -230,12 +229,12 @@ class _SecretState:
230
229
  return pulumi.get(self, "disable_read")
231
230
 
232
231
  @disable_read.setter
233
- def disable_read(self, value: Optional[pulumi.Input[builtins.bool]]):
232
+ def disable_read(self, value: Optional[pulumi.Input[_builtins.bool]]):
234
233
  pulumi.set(self, "disable_read", value)
235
234
 
236
- @property
235
+ @_builtins.property
237
236
  @pulumi.getter
238
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
237
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
239
238
  """
240
239
  The namespace to provision the resource in.
241
240
  The value should not contain leading or trailing forward slashes.
@@ -245,12 +244,12 @@ class _SecretState:
245
244
  return pulumi.get(self, "namespace")
246
245
 
247
246
  @namespace.setter
248
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
247
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
249
248
  pulumi.set(self, "namespace", value)
250
249
 
251
- @property
250
+ @_builtins.property
252
251
  @pulumi.getter
253
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
252
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
254
253
  """
255
254
  The full logical path at which to write the given data.
256
255
  To write data into the "generic" secret backend mounted in Vault by default,
@@ -261,7 +260,7 @@ class _SecretState:
261
260
  return pulumi.get(self, "path")
262
261
 
263
262
  @path.setter
264
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
263
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
265
264
  pulumi.set(self, "path", value)
266
265
 
267
266
 
@@ -271,11 +270,11 @@ class Secret(pulumi.CustomResource):
271
270
  def __init__(__self__,
272
271
  resource_name: str,
273
272
  opts: Optional[pulumi.ResourceOptions] = None,
274
- data_json: Optional[pulumi.Input[builtins.str]] = None,
275
- delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
276
- disable_read: Optional[pulumi.Input[builtins.bool]] = None,
277
- namespace: Optional[pulumi.Input[builtins.str]] = None,
278
- path: Optional[pulumi.Input[builtins.str]] = None,
273
+ data_json: Optional[pulumi.Input[_builtins.str]] = None,
274
+ delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
275
+ disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
276
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
277
+ path: Optional[pulumi.Input[_builtins.str]] = None,
279
278
  __props__=None):
280
279
  """
281
280
  ## Import
@@ -288,20 +287,20 @@ class Secret(pulumi.CustomResource):
288
287
 
289
288
  :param str resource_name: The name of the resource.
290
289
  :param pulumi.ResourceOptions opts: Options for the resource.
291
- :param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
290
+ :param pulumi.Input[_builtins.str] data_json: String containing a JSON-encoded object that will be
292
291
  written as the secret data at the given path.
293
- :param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
292
+ :param pulumi.Input[_builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
294
293
  If set to `true`, permanently deletes all versions for
295
294
  the specified key. The default behavior is to only delete the latest version of the
296
295
  secret.
297
- :param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
296
+ :param pulumi.Input[_builtins.bool] disable_read: true/false. Set this to true if your vault
298
297
  authentication is not able to read the data. Setting this to `true` will
299
298
  break drift detection. Defaults to false.
300
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
299
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
301
300
  The value should not contain leading or trailing forward slashes.
302
301
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
303
302
  *Available only for Vault Enterprise*.
304
- :param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
303
+ :param pulumi.Input[_builtins.str] path: The full logical path at which to write the given data.
305
304
  To write data into the "generic" secret backend mounted in Vault by default,
306
305
  this should be prefixed with `secret/`. Writing to other backends with this
307
306
  resource is possible; consult each backend's documentation to see which
@@ -337,11 +336,11 @@ class Secret(pulumi.CustomResource):
337
336
  def _internal_init(__self__,
338
337
  resource_name: str,
339
338
  opts: Optional[pulumi.ResourceOptions] = None,
340
- data_json: Optional[pulumi.Input[builtins.str]] = None,
341
- delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
342
- disable_read: Optional[pulumi.Input[builtins.bool]] = None,
343
- namespace: Optional[pulumi.Input[builtins.str]] = None,
344
- path: Optional[pulumi.Input[builtins.str]] = None,
339
+ data_json: Optional[pulumi.Input[_builtins.str]] = None,
340
+ delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
341
+ disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
342
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
343
+ path: Optional[pulumi.Input[_builtins.str]] = None,
345
344
  __props__=None):
346
345
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
347
346
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -373,12 +372,12 @@ class Secret(pulumi.CustomResource):
373
372
  def get(resource_name: str,
374
373
  id: pulumi.Input[str],
375
374
  opts: Optional[pulumi.ResourceOptions] = None,
376
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
377
- data_json: Optional[pulumi.Input[builtins.str]] = None,
378
- delete_all_versions: Optional[pulumi.Input[builtins.bool]] = None,
379
- disable_read: Optional[pulumi.Input[builtins.bool]] = None,
380
- namespace: Optional[pulumi.Input[builtins.str]] = None,
381
- path: Optional[pulumi.Input[builtins.str]] = None) -> 'Secret':
375
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
376
+ data_json: Optional[pulumi.Input[_builtins.str]] = None,
377
+ delete_all_versions: Optional[pulumi.Input[_builtins.bool]] = None,
378
+ disable_read: Optional[pulumi.Input[_builtins.bool]] = None,
379
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
380
+ path: Optional[pulumi.Input[_builtins.str]] = None) -> 'Secret':
382
381
  """
383
382
  Get an existing Secret resource's state with the given name, id, and optional extra
384
383
  properties used to qualify the lookup.
@@ -386,24 +385,24 @@ class Secret(pulumi.CustomResource):
386
385
  :param str resource_name: The unique name of the resulting resource.
387
386
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
388
387
  :param pulumi.ResourceOptions opts: Options for the resource.
389
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
388
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
390
389
  Vault and whose values are the corresponding values. This map can only
391
390
  represent string data, so any non-string values returned from Vault are
392
391
  serialized as JSON.
393
- :param pulumi.Input[builtins.str] data_json: String containing a JSON-encoded object that will be
392
+ :param pulumi.Input[_builtins.str] data_json: String containing a JSON-encoded object that will be
394
393
  written as the secret data at the given path.
395
- :param pulumi.Input[builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
394
+ :param pulumi.Input[_builtins.bool] delete_all_versions: true/false. Only applicable for kv-v2 stores.
396
395
  If set to `true`, permanently deletes all versions for
397
396
  the specified key. The default behavior is to only delete the latest version of the
398
397
  secret.
399
- :param pulumi.Input[builtins.bool] disable_read: true/false. Set this to true if your vault
398
+ :param pulumi.Input[_builtins.bool] disable_read: true/false. Set this to true if your vault
400
399
  authentication is not able to read the data. Setting this to `true` will
401
400
  break drift detection. Defaults to false.
402
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
401
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
403
402
  The value should not contain leading or trailing forward slashes.
404
403
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
405
404
  *Available only for Vault Enterprise*.
406
- :param pulumi.Input[builtins.str] path: The full logical path at which to write the given data.
405
+ :param pulumi.Input[_builtins.str] path: The full logical path at which to write the given data.
407
406
  To write data into the "generic" secret backend mounted in Vault by default,
408
407
  this should be prefixed with `secret/`. Writing to other backends with this
409
408
  resource is possible; consult each backend's documentation to see which
@@ -421,9 +420,9 @@ class Secret(pulumi.CustomResource):
421
420
  __props__.__dict__["path"] = path
422
421
  return Secret(resource_name, opts=opts, __props__=__props__)
423
422
 
424
- @property
423
+ @_builtins.property
425
424
  @pulumi.getter
426
- def data(self) -> pulumi.Output[Mapping[str, builtins.str]]:
425
+ def data(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
427
426
  """
428
427
  A mapping whose keys are the top-level data keys returned from
429
428
  Vault and whose values are the corresponding values. This map can only
@@ -432,18 +431,18 @@ class Secret(pulumi.CustomResource):
432
431
  """
433
432
  return pulumi.get(self, "data")
434
433
 
435
- @property
434
+ @_builtins.property
436
435
  @pulumi.getter(name="dataJson")
437
- def data_json(self) -> pulumi.Output[builtins.str]:
436
+ def data_json(self) -> pulumi.Output[_builtins.str]:
438
437
  """
439
438
  String containing a JSON-encoded object that will be
440
439
  written as the secret data at the given path.
441
440
  """
442
441
  return pulumi.get(self, "data_json")
443
442
 
444
- @property
443
+ @_builtins.property
445
444
  @pulumi.getter(name="deleteAllVersions")
446
- def delete_all_versions(self) -> pulumi.Output[Optional[builtins.bool]]:
445
+ def delete_all_versions(self) -> pulumi.Output[Optional[_builtins.bool]]:
447
446
  """
448
447
  true/false. Only applicable for kv-v2 stores.
449
448
  If set to `true`, permanently deletes all versions for
@@ -452,9 +451,9 @@ class Secret(pulumi.CustomResource):
452
451
  """
453
452
  return pulumi.get(self, "delete_all_versions")
454
453
 
455
- @property
454
+ @_builtins.property
456
455
  @pulumi.getter(name="disableRead")
457
- def disable_read(self) -> pulumi.Output[Optional[builtins.bool]]:
456
+ def disable_read(self) -> pulumi.Output[Optional[_builtins.bool]]:
458
457
  """
459
458
  true/false. Set this to true if your vault
460
459
  authentication is not able to read the data. Setting this to `true` will
@@ -462,9 +461,9 @@ class Secret(pulumi.CustomResource):
462
461
  """
463
462
  return pulumi.get(self, "disable_read")
464
463
 
465
- @property
464
+ @_builtins.property
466
465
  @pulumi.getter
467
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
466
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
468
467
  """
469
468
  The namespace to provision the resource in.
470
469
  The value should not contain leading or trailing forward slashes.
@@ -473,9 +472,9 @@ class Secret(pulumi.CustomResource):
473
472
  """
474
473
  return pulumi.get(self, "namespace")
475
474
 
476
- @property
475
+ @_builtins.property
477
476
  @pulumi.getter
478
- def path(self) -> pulumi.Output[builtins.str]:
477
+ def path(self) -> pulumi.Output[_builtins.str]:
479
478
  """
480
479
  The full logical path at which to write the given data.
481
480
  To write data into the "generic" secret backend mounted in Vault by default,