pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -68,90 +67,90 @@ class GetServiceAccountTokenResult:
68
67
  raise TypeError("Expected argument 'ttl' to be a str")
69
68
  pulumi.set(__self__, "ttl", ttl)
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter
73
- def backend(self) -> builtins.str:
72
+ def backend(self) -> _builtins.str:
74
73
  return pulumi.get(self, "backend")
75
74
 
76
- @property
75
+ @_builtins.property
77
76
  @pulumi.getter(name="clusterRoleBinding")
78
- def cluster_role_binding(self) -> Optional[builtins.bool]:
77
+ def cluster_role_binding(self) -> Optional[_builtins.bool]:
79
78
  return pulumi.get(self, "cluster_role_binding")
80
79
 
81
- @property
80
+ @_builtins.property
82
81
  @pulumi.getter
83
- def id(self) -> builtins.str:
82
+ def id(self) -> _builtins.str:
84
83
  """
85
84
  The provider-assigned unique ID for this managed resource.
86
85
  """
87
86
  return pulumi.get(self, "id")
88
87
 
89
- @property
88
+ @_builtins.property
90
89
  @pulumi.getter(name="kubernetesNamespace")
91
- def kubernetes_namespace(self) -> builtins.str:
90
+ def kubernetes_namespace(self) -> _builtins.str:
92
91
  return pulumi.get(self, "kubernetes_namespace")
93
92
 
94
- @property
93
+ @_builtins.property
95
94
  @pulumi.getter(name="leaseDuration")
96
- def lease_duration(self) -> builtins.int:
95
+ def lease_duration(self) -> _builtins.int:
97
96
  """
98
97
  The duration of the lease in seconds.
99
98
  """
100
99
  return pulumi.get(self, "lease_duration")
101
100
 
102
- @property
101
+ @_builtins.property
103
102
  @pulumi.getter(name="leaseId")
104
- def lease_id(self) -> builtins.str:
103
+ def lease_id(self) -> _builtins.str:
105
104
  """
106
105
  The lease identifier assigned by Vault.
107
106
  """
108
107
  return pulumi.get(self, "lease_id")
109
108
 
110
- @property
109
+ @_builtins.property
111
110
  @pulumi.getter(name="leaseRenewable")
112
- def lease_renewable(self) -> builtins.bool:
111
+ def lease_renewable(self) -> _builtins.bool:
113
112
  """
114
113
  True if the duration of this lease can be extended through renewal.
115
114
  """
116
115
  return pulumi.get(self, "lease_renewable")
117
116
 
118
- @property
117
+ @_builtins.property
119
118
  @pulumi.getter
120
- def namespace(self) -> Optional[builtins.str]:
119
+ def namespace(self) -> Optional[_builtins.str]:
121
120
  return pulumi.get(self, "namespace")
122
121
 
123
- @property
122
+ @_builtins.property
124
123
  @pulumi.getter
125
- def role(self) -> builtins.str:
124
+ def role(self) -> _builtins.str:
126
125
  return pulumi.get(self, "role")
127
126
 
128
- @property
127
+ @_builtins.property
129
128
  @pulumi.getter(name="serviceAccountName")
130
- def service_account_name(self) -> builtins.str:
129
+ def service_account_name(self) -> _builtins.str:
131
130
  """
132
131
  The name of the service account associated with the token.
133
132
  """
134
133
  return pulumi.get(self, "service_account_name")
135
134
 
136
- @property
135
+ @_builtins.property
137
136
  @pulumi.getter(name="serviceAccountNamespace")
138
- def service_account_namespace(self) -> builtins.str:
137
+ def service_account_namespace(self) -> _builtins.str:
139
138
  """
140
139
  The Kubernetes namespace that the service account resides in.
141
140
  """
142
141
  return pulumi.get(self, "service_account_namespace")
143
142
 
144
- @property
143
+ @_builtins.property
145
144
  @pulumi.getter(name="serviceAccountToken")
146
- def service_account_token(self) -> builtins.str:
145
+ def service_account_token(self) -> _builtins.str:
147
146
  """
148
147
  The Kubernetes service account token.
149
148
  """
150
149
  return pulumi.get(self, "service_account_token")
151
150
 
152
- @property
151
+ @_builtins.property
153
152
  @pulumi.getter
154
- def ttl(self) -> Optional[builtins.str]:
153
+ def ttl(self) -> Optional[_builtins.str]:
155
154
  return pulumi.get(self, "ttl")
156
155
 
157
156
 
@@ -176,12 +175,12 @@ class AwaitableGetServiceAccountTokenResult(GetServiceAccountTokenResult):
176
175
  ttl=self.ttl)
177
176
 
178
177
 
179
- def get_service_account_token(backend: Optional[builtins.str] = None,
180
- cluster_role_binding: Optional[builtins.bool] = None,
181
- kubernetes_namespace: Optional[builtins.str] = None,
182
- namespace: Optional[builtins.str] = None,
183
- role: Optional[builtins.str] = None,
184
- ttl: Optional[builtins.str] = None,
178
+ def get_service_account_token(backend: Optional[_builtins.str] = None,
179
+ cluster_role_binding: Optional[_builtins.bool] = None,
180
+ kubernetes_namespace: Optional[_builtins.str] = None,
181
+ namespace: Optional[_builtins.str] = None,
182
+ role: Optional[_builtins.str] = None,
183
+ ttl: Optional[_builtins.str] = None,
185
184
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetServiceAccountTokenResult:
186
185
  """
187
186
  ## Example Usage
@@ -221,19 +220,19 @@ def get_service_account_token(backend: Optional[builtins.str] = None,
221
220
  ```
222
221
 
223
222
 
224
- :param builtins.str backend: The Kubernetes secret backend to generate service account
223
+ :param _builtins.str backend: The Kubernetes secret backend to generate service account
225
224
  tokens from.
226
- :param builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
225
+ :param _builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
227
226
  permissions across the whole cluster instead of within a namespace.
228
- :param builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
227
+ :param _builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
229
228
  generate the credentials.
230
- :param builtins.str namespace: The namespace of the target resource.
229
+ :param _builtins.str namespace: The namespace of the target resource.
231
230
  The value should not contain leading or trailing forward slashes.
232
231
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
233
232
  *Available only for Vault Enterprise*.
234
- :param builtins.str role: The name of the Kubernetes secret backend role to generate service
233
+ :param _builtins.str role: The name of the Kubernetes secret backend role to generate service
235
234
  account tokens from.
236
- :param builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
235
+ :param _builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
237
236
  seconds or as a Go duration format string.
238
237
  """
239
238
  __args__ = dict()
@@ -260,12 +259,12 @@ def get_service_account_token(backend: Optional[builtins.str] = None,
260
259
  service_account_namespace=pulumi.get(__ret__, 'service_account_namespace'),
261
260
  service_account_token=pulumi.get(__ret__, 'service_account_token'),
262
261
  ttl=pulumi.get(__ret__, 'ttl'))
263
- def get_service_account_token_output(backend: Optional[pulumi.Input[builtins.str]] = None,
264
- cluster_role_binding: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
265
- kubernetes_namespace: Optional[pulumi.Input[builtins.str]] = None,
266
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
267
- role: Optional[pulumi.Input[builtins.str]] = None,
268
- ttl: Optional[pulumi.Input[Optional[builtins.str]]] = None,
262
+ def get_service_account_token_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
263
+ cluster_role_binding: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
264
+ kubernetes_namespace: Optional[pulumi.Input[_builtins.str]] = None,
265
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
266
+ role: Optional[pulumi.Input[_builtins.str]] = None,
267
+ ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
269
268
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetServiceAccountTokenResult]:
270
269
  """
271
270
  ## Example Usage
@@ -305,19 +304,19 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[builtins.str
305
304
  ```
306
305
 
307
306
 
308
- :param builtins.str backend: The Kubernetes secret backend to generate service account
307
+ :param _builtins.str backend: The Kubernetes secret backend to generate service account
309
308
  tokens from.
310
- :param builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
309
+ :param _builtins.bool cluster_role_binding: If true, generate a ClusterRoleBinding to grant
311
310
  permissions across the whole cluster instead of within a namespace.
312
- :param builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
311
+ :param _builtins.str kubernetes_namespace: The name of the Kubernetes namespace in which to
313
312
  generate the credentials.
314
- :param builtins.str namespace: The namespace of the target resource.
313
+ :param _builtins.str namespace: The namespace of the target resource.
315
314
  The value should not contain leading or trailing forward slashes.
316
315
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
317
316
  *Available only for Vault Enterprise*.
318
- :param builtins.str role: The name of the Kubernetes secret backend role to generate service
317
+ :param _builtins.str role: The name of the Kubernetes secret backend role to generate service
319
318
  account tokens from.
320
- :param builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
319
+ :param _builtins.str ttl: The TTL of the generated Kubernetes service account token, specified in
321
320
  seconds or as a Go duration format string.
322
321
  """
323
322
  __args__ = dict()