pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,36 +19,36 @@ __all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
20
19
  @pulumi.input_type
21
20
  class AuthBackendRoleSecretIdArgs:
22
21
  def __init__(__self__, *,
23
- role_name: pulumi.Input[builtins.str],
24
- backend: Optional[pulumi.Input[builtins.str]] = None,
25
- cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- metadata: Optional[pulumi.Input[builtins.str]] = None,
27
- namespace: Optional[pulumi.Input[builtins.str]] = None,
28
- num_uses: Optional[pulumi.Input[builtins.int]] = None,
29
- secret_id: Optional[pulumi.Input[builtins.str]] = None,
30
- ttl: Optional[pulumi.Input[builtins.int]] = None,
31
- with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
32
- wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None):
22
+ role_name: pulumi.Input[_builtins.str],
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ metadata: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
27
+ num_uses: Optional[pulumi.Input[_builtins.int]] = None,
28
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
29
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
30
+ with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None):
33
32
  """
34
33
  The set of arguments for constructing a AuthBackendRoleSecretId resource.
35
- :param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
36
- :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
37
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
34
+ :param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
35
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
36
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
38
37
  perform the login operation using this SecretID.
39
- :param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
38
+ :param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
40
39
  key-value pairs to be set on tokens issued with this SecretID.
41
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
40
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
42
41
  The value should not contain leading or trailing forward slashes.
43
42
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
44
43
  *Available only for Vault Enterprise*.
45
- :param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
46
- :param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
44
+ :param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
45
+ :param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
47
46
  mode. Defaults to Vault auto-generating SecretIDs.
48
- :param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
49
- :param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
47
+ :param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
48
+ :param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
50
49
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
51
50
  invalidated through unwrapping.
52
- :param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
51
+ :param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
53
52
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
54
53
  and available for the duration specified. Only a single unwrapping of the
55
54
  token is allowed.
@@ -74,33 +73,33 @@ class AuthBackendRoleSecretIdArgs:
74
73
  if wrapping_ttl is not None:
75
74
  pulumi.set(__self__, "wrapping_ttl", wrapping_ttl)
76
75
 
77
- @property
76
+ @_builtins.property
78
77
  @pulumi.getter(name="roleName")
79
- def role_name(self) -> pulumi.Input[builtins.str]:
78
+ def role_name(self) -> pulumi.Input[_builtins.str]:
80
79
  """
81
80
  The name of the role to create the SecretID for.
82
81
  """
83
82
  return pulumi.get(self, "role_name")
84
83
 
85
84
  @role_name.setter
86
- def role_name(self, value: pulumi.Input[builtins.str]):
85
+ def role_name(self, value: pulumi.Input[_builtins.str]):
87
86
  pulumi.set(self, "role_name", value)
88
87
 
89
- @property
88
+ @_builtins.property
90
89
  @pulumi.getter
91
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
90
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
92
91
  """
93
92
  Unique name of the auth backend to configure.
94
93
  """
95
94
  return pulumi.get(self, "backend")
96
95
 
97
96
  @backend.setter
98
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
97
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
99
98
  pulumi.set(self, "backend", value)
100
99
 
101
- @property
100
+ @_builtins.property
102
101
  @pulumi.getter(name="cidrLists")
103
- def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
102
+ def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
104
103
  """
105
104
  If set, specifies blocks of IP addresses which can
106
105
  perform the login operation using this SecretID.
@@ -108,12 +107,12 @@ class AuthBackendRoleSecretIdArgs:
108
107
  return pulumi.get(self, "cidr_lists")
109
108
 
110
109
  @cidr_lists.setter
111
- def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
110
+ def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
112
111
  pulumi.set(self, "cidr_lists", value)
113
112
 
114
- @property
113
+ @_builtins.property
115
114
  @pulumi.getter
116
- def metadata(self) -> Optional[pulumi.Input[builtins.str]]:
115
+ def metadata(self) -> Optional[pulumi.Input[_builtins.str]]:
117
116
  """
118
117
  A JSON-encoded string containing metadata in
119
118
  key-value pairs to be set on tokens issued with this SecretID.
@@ -121,12 +120,12 @@ class AuthBackendRoleSecretIdArgs:
121
120
  return pulumi.get(self, "metadata")
122
121
 
123
122
  @metadata.setter
124
- def metadata(self, value: Optional[pulumi.Input[builtins.str]]):
123
+ def metadata(self, value: Optional[pulumi.Input[_builtins.str]]):
125
124
  pulumi.set(self, "metadata", value)
126
125
 
127
- @property
126
+ @_builtins.property
128
127
  @pulumi.getter
129
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
128
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
130
129
  """
131
130
  The namespace to provision the resource in.
132
131
  The value should not contain leading or trailing forward slashes.
@@ -136,24 +135,24 @@ class AuthBackendRoleSecretIdArgs:
136
135
  return pulumi.get(self, "namespace")
137
136
 
138
137
  @namespace.setter
139
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
138
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
140
139
  pulumi.set(self, "namespace", value)
141
140
 
142
- @property
141
+ @_builtins.property
143
142
  @pulumi.getter(name="numUses")
144
- def num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
143
+ def num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
145
144
  """
146
145
  The number of uses for the secret-id.
147
146
  """
148
147
  return pulumi.get(self, "num_uses")
149
148
 
150
149
  @num_uses.setter
151
- def num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
150
+ def num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
152
151
  pulumi.set(self, "num_uses", value)
153
152
 
154
- @property
153
+ @_builtins.property
155
154
  @pulumi.getter(name="secretId")
156
- def secret_id(self) -> Optional[pulumi.Input[builtins.str]]:
155
+ def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
157
156
  """
158
157
  The SecretID to be created. If set, uses "Push"
159
158
  mode. Defaults to Vault auto-generating SecretIDs.
@@ -161,24 +160,24 @@ class AuthBackendRoleSecretIdArgs:
161
160
  return pulumi.get(self, "secret_id")
162
161
 
163
162
  @secret_id.setter
164
- def secret_id(self, value: Optional[pulumi.Input[builtins.str]]):
163
+ def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
165
164
  pulumi.set(self, "secret_id", value)
166
165
 
167
- @property
166
+ @_builtins.property
168
167
  @pulumi.getter
169
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
168
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
170
169
  """
171
170
  The TTL duration of the SecretID.
172
171
  """
173
172
  return pulumi.get(self, "ttl")
174
173
 
175
174
  @ttl.setter
176
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
175
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
177
176
  pulumi.set(self, "ttl", value)
178
177
 
179
- @property
178
+ @_builtins.property
180
179
  @pulumi.getter(name="withWrappedAccessor")
181
- def with_wrapped_accessor(self) -> Optional[pulumi.Input[builtins.bool]]:
180
+ def with_wrapped_accessor(self) -> Optional[pulumi.Input[_builtins.bool]]:
182
181
  """
183
182
  Set to `true` to use the wrapped secret-id accessor as the resource ID.
184
183
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
@@ -187,12 +186,12 @@ class AuthBackendRoleSecretIdArgs:
187
186
  return pulumi.get(self, "with_wrapped_accessor")
188
187
 
189
188
  @with_wrapped_accessor.setter
190
- def with_wrapped_accessor(self, value: Optional[pulumi.Input[builtins.bool]]):
189
+ def with_wrapped_accessor(self, value: Optional[pulumi.Input[_builtins.bool]]):
191
190
  pulumi.set(self, "with_wrapped_accessor", value)
192
191
 
193
- @property
192
+ @_builtins.property
194
193
  @pulumi.getter(name="wrappingTtl")
195
- def wrapping_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
194
+ def wrapping_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
196
195
  """
197
196
  If set, the SecretID response will be
198
197
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
@@ -202,50 +201,50 @@ class AuthBackendRoleSecretIdArgs:
202
201
  return pulumi.get(self, "wrapping_ttl")
203
202
 
204
203
  @wrapping_ttl.setter
205
- def wrapping_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
204
+ def wrapping_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
206
205
  pulumi.set(self, "wrapping_ttl", value)
207
206
 
208
207
 
209
208
  @pulumi.input_type
210
209
  class _AuthBackendRoleSecretIdState:
211
210
  def __init__(__self__, *,
212
- accessor: Optional[pulumi.Input[builtins.str]] = None,
213
- backend: Optional[pulumi.Input[builtins.str]] = None,
214
- cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
215
- metadata: Optional[pulumi.Input[builtins.str]] = None,
216
- namespace: Optional[pulumi.Input[builtins.str]] = None,
217
- num_uses: Optional[pulumi.Input[builtins.int]] = None,
218
- role_name: Optional[pulumi.Input[builtins.str]] = None,
219
- secret_id: Optional[pulumi.Input[builtins.str]] = None,
220
- ttl: Optional[pulumi.Input[builtins.int]] = None,
221
- with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
222
- wrapping_accessor: Optional[pulumi.Input[builtins.str]] = None,
223
- wrapping_token: Optional[pulumi.Input[builtins.str]] = None,
224
- wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None):
211
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
212
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
213
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
214
+ metadata: Optional[pulumi.Input[_builtins.str]] = None,
215
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
216
+ num_uses: Optional[pulumi.Input[_builtins.int]] = None,
217
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
218
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
219
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
220
+ with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
221
+ wrapping_accessor: Optional[pulumi.Input[_builtins.str]] = None,
222
+ wrapping_token: Optional[pulumi.Input[_builtins.str]] = None,
223
+ wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None):
225
224
  """
226
225
  Input properties used for looking up and filtering AuthBackendRoleSecretId resources.
227
- :param pulumi.Input[builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
228
- :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
229
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
226
+ :param pulumi.Input[_builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
227
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
228
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
230
229
  perform the login operation using this SecretID.
231
- :param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
230
+ :param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
232
231
  key-value pairs to be set on tokens issued with this SecretID.
233
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
232
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
234
233
  The value should not contain leading or trailing forward slashes.
235
234
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
236
235
  *Available only for Vault Enterprise*.
237
- :param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
238
- :param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
239
- :param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
236
+ :param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
237
+ :param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
238
+ :param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
240
239
  mode. Defaults to Vault auto-generating SecretIDs.
241
- :param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
242
- :param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
240
+ :param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
241
+ :param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
243
242
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
244
243
  invalidated through unwrapping.
245
- :param pulumi.Input[builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
244
+ :param pulumi.Input[_builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
246
245
  be safely logged.
247
- :param pulumi.Input[builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
248
- :param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
246
+ :param pulumi.Input[_builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
247
+ :param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
249
248
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
250
249
  and available for the duration specified. Only a single unwrapping of the
251
250
  token is allowed.
@@ -277,33 +276,33 @@ class _AuthBackendRoleSecretIdState:
277
276
  if wrapping_ttl is not None:
278
277
  pulumi.set(__self__, "wrapping_ttl", wrapping_ttl)
279
278
 
280
- @property
279
+ @_builtins.property
281
280
  @pulumi.getter
282
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
281
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
283
282
  """
284
283
  The unique ID for this SecretID that can be safely logged.
285
284
  """
286
285
  return pulumi.get(self, "accessor")
287
286
 
288
287
  @accessor.setter
289
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
288
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
290
289
  pulumi.set(self, "accessor", value)
291
290
 
292
- @property
291
+ @_builtins.property
293
292
  @pulumi.getter
294
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
293
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
295
294
  """
296
295
  Unique name of the auth backend to configure.
297
296
  """
298
297
  return pulumi.get(self, "backend")
299
298
 
300
299
  @backend.setter
301
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
300
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
302
301
  pulumi.set(self, "backend", value)
303
302
 
304
- @property
303
+ @_builtins.property
305
304
  @pulumi.getter(name="cidrLists")
306
- def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
305
+ def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
307
306
  """
308
307
  If set, specifies blocks of IP addresses which can
309
308
  perform the login operation using this SecretID.
@@ -311,12 +310,12 @@ class _AuthBackendRoleSecretIdState:
311
310
  return pulumi.get(self, "cidr_lists")
312
311
 
313
312
  @cidr_lists.setter
314
- def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
313
+ def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
315
314
  pulumi.set(self, "cidr_lists", value)
316
315
 
317
- @property
316
+ @_builtins.property
318
317
  @pulumi.getter
319
- def metadata(self) -> Optional[pulumi.Input[builtins.str]]:
318
+ def metadata(self) -> Optional[pulumi.Input[_builtins.str]]:
320
319
  """
321
320
  A JSON-encoded string containing metadata in
322
321
  key-value pairs to be set on tokens issued with this SecretID.
@@ -324,12 +323,12 @@ class _AuthBackendRoleSecretIdState:
324
323
  return pulumi.get(self, "metadata")
325
324
 
326
325
  @metadata.setter
327
- def metadata(self, value: Optional[pulumi.Input[builtins.str]]):
326
+ def metadata(self, value: Optional[pulumi.Input[_builtins.str]]):
328
327
  pulumi.set(self, "metadata", value)
329
328
 
330
- @property
329
+ @_builtins.property
331
330
  @pulumi.getter
332
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
331
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
333
332
  """
334
333
  The namespace to provision the resource in.
335
334
  The value should not contain leading or trailing forward slashes.
@@ -339,36 +338,36 @@ class _AuthBackendRoleSecretIdState:
339
338
  return pulumi.get(self, "namespace")
340
339
 
341
340
  @namespace.setter
342
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
341
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
343
342
  pulumi.set(self, "namespace", value)
344
343
 
345
- @property
344
+ @_builtins.property
346
345
  @pulumi.getter(name="numUses")
347
- def num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
346
+ def num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
348
347
  """
349
348
  The number of uses for the secret-id.
350
349
  """
351
350
  return pulumi.get(self, "num_uses")
352
351
 
353
352
  @num_uses.setter
354
- def num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
353
+ def num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
355
354
  pulumi.set(self, "num_uses", value)
356
355
 
357
- @property
356
+ @_builtins.property
358
357
  @pulumi.getter(name="roleName")
359
- def role_name(self) -> Optional[pulumi.Input[builtins.str]]:
358
+ def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
360
359
  """
361
360
  The name of the role to create the SecretID for.
362
361
  """
363
362
  return pulumi.get(self, "role_name")
364
363
 
365
364
  @role_name.setter
366
- def role_name(self, value: Optional[pulumi.Input[builtins.str]]):
365
+ def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
367
366
  pulumi.set(self, "role_name", value)
368
367
 
369
- @property
368
+ @_builtins.property
370
369
  @pulumi.getter(name="secretId")
371
- def secret_id(self) -> Optional[pulumi.Input[builtins.str]]:
370
+ def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
372
371
  """
373
372
  The SecretID to be created. If set, uses "Push"
374
373
  mode. Defaults to Vault auto-generating SecretIDs.
@@ -376,24 +375,24 @@ class _AuthBackendRoleSecretIdState:
376
375
  return pulumi.get(self, "secret_id")
377
376
 
378
377
  @secret_id.setter
379
- def secret_id(self, value: Optional[pulumi.Input[builtins.str]]):
378
+ def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
380
379
  pulumi.set(self, "secret_id", value)
381
380
 
382
- @property
381
+ @_builtins.property
383
382
  @pulumi.getter
384
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
383
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
385
384
  """
386
385
  The TTL duration of the SecretID.
387
386
  """
388
387
  return pulumi.get(self, "ttl")
389
388
 
390
389
  @ttl.setter
391
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
390
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
392
391
  pulumi.set(self, "ttl", value)
393
392
 
394
- @property
393
+ @_builtins.property
395
394
  @pulumi.getter(name="withWrappedAccessor")
396
- def with_wrapped_accessor(self) -> Optional[pulumi.Input[builtins.bool]]:
395
+ def with_wrapped_accessor(self) -> Optional[pulumi.Input[_builtins.bool]]:
397
396
  """
398
397
  Set to `true` to use the wrapped secret-id accessor as the resource ID.
399
398
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
@@ -402,12 +401,12 @@ class _AuthBackendRoleSecretIdState:
402
401
  return pulumi.get(self, "with_wrapped_accessor")
403
402
 
404
403
  @with_wrapped_accessor.setter
405
- def with_wrapped_accessor(self, value: Optional[pulumi.Input[builtins.bool]]):
404
+ def with_wrapped_accessor(self, value: Optional[pulumi.Input[_builtins.bool]]):
406
405
  pulumi.set(self, "with_wrapped_accessor", value)
407
406
 
408
- @property
407
+ @_builtins.property
409
408
  @pulumi.getter(name="wrappingAccessor")
410
- def wrapping_accessor(self) -> Optional[pulumi.Input[builtins.str]]:
409
+ def wrapping_accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
411
410
  """
412
411
  The unique ID for the response-wrapped SecretID that can
413
412
  be safely logged.
@@ -415,24 +414,24 @@ class _AuthBackendRoleSecretIdState:
415
414
  return pulumi.get(self, "wrapping_accessor")
416
415
 
417
416
  @wrapping_accessor.setter
418
- def wrapping_accessor(self, value: Optional[pulumi.Input[builtins.str]]):
417
+ def wrapping_accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
419
418
  pulumi.set(self, "wrapping_accessor", value)
420
419
 
421
- @property
420
+ @_builtins.property
422
421
  @pulumi.getter(name="wrappingToken")
423
- def wrapping_token(self) -> Optional[pulumi.Input[builtins.str]]:
422
+ def wrapping_token(self) -> Optional[pulumi.Input[_builtins.str]]:
424
423
  """
425
424
  The token used to retrieve a response-wrapped SecretID.
426
425
  """
427
426
  return pulumi.get(self, "wrapping_token")
428
427
 
429
428
  @wrapping_token.setter
430
- def wrapping_token(self, value: Optional[pulumi.Input[builtins.str]]):
429
+ def wrapping_token(self, value: Optional[pulumi.Input[_builtins.str]]):
431
430
  pulumi.set(self, "wrapping_token", value)
432
431
 
433
- @property
432
+ @_builtins.property
434
433
  @pulumi.getter(name="wrappingTtl")
435
- def wrapping_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
434
+ def wrapping_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
436
435
  """
437
436
  If set, the SecretID response will be
438
437
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
@@ -442,7 +441,7 @@ class _AuthBackendRoleSecretIdState:
442
441
  return pulumi.get(self, "wrapping_ttl")
443
442
 
444
443
  @wrapping_ttl.setter
445
- def wrapping_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
444
+ def wrapping_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
446
445
  pulumi.set(self, "wrapping_ttl", value)
447
446
 
448
447
 
@@ -452,16 +451,16 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
452
451
  def __init__(__self__,
453
452
  resource_name: str,
454
453
  opts: Optional[pulumi.ResourceOptions] = None,
455
- backend: Optional[pulumi.Input[builtins.str]] = None,
456
- cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
457
- metadata: Optional[pulumi.Input[builtins.str]] = None,
458
- namespace: Optional[pulumi.Input[builtins.str]] = None,
459
- num_uses: Optional[pulumi.Input[builtins.int]] = None,
460
- role_name: Optional[pulumi.Input[builtins.str]] = None,
461
- secret_id: Optional[pulumi.Input[builtins.str]] = None,
462
- ttl: Optional[pulumi.Input[builtins.int]] = None,
463
- with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
464
- wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None,
454
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
455
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
456
+ metadata: Optional[pulumi.Input[_builtins.str]] = None,
457
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
458
+ num_uses: Optional[pulumi.Input[_builtins.int]] = None,
459
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
460
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
461
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
462
+ with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
463
+ wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None,
465
464
  __props__=None):
466
465
  """
467
466
  Manages an AppRole auth backend SecretID in a Vault server. See the [Vault
@@ -476,7 +475,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
476
475
  import pulumi_vault as vault
477
476
 
478
477
  approle = vault.AuthBackend("approle", type="approle")
479
- example = vault.app_role.AuthBackendRole("example",
478
+ example = vault.approle.AuthBackendRole("example",
480
479
  backend=approle.path,
481
480
  role_name="test-role",
482
481
  token_policies=[
@@ -484,7 +483,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
484
483
  "dev",
485
484
  "prod",
486
485
  ])
487
- id = vault.app_role.AuthBackendRoleSecretId("id",
486
+ id = vault.approle.AuthBackendRoleSecretId("id",
488
487
  backend=approle.path,
489
488
  role_name=example.role_name,
490
489
  metadata=json.dumps({
@@ -494,24 +493,24 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
494
493
 
495
494
  :param str resource_name: The name of the resource.
496
495
  :param pulumi.ResourceOptions opts: Options for the resource.
497
- :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
498
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
496
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
497
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
499
498
  perform the login operation using this SecretID.
500
- :param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
499
+ :param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
501
500
  key-value pairs to be set on tokens issued with this SecretID.
502
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
501
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
503
502
  The value should not contain leading or trailing forward slashes.
504
503
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
505
504
  *Available only for Vault Enterprise*.
506
- :param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
507
- :param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
508
- :param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
505
+ :param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
506
+ :param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
507
+ :param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
509
508
  mode. Defaults to Vault auto-generating SecretIDs.
510
- :param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
511
- :param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
509
+ :param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
510
+ :param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
512
511
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
513
512
  invalidated through unwrapping.
514
- :param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
513
+ :param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
515
514
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
516
515
  and available for the duration specified. Only a single unwrapping of the
517
516
  token is allowed.
@@ -535,7 +534,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
535
534
  import pulumi_vault as vault
536
535
 
537
536
  approle = vault.AuthBackend("approle", type="approle")
538
- example = vault.app_role.AuthBackendRole("example",
537
+ example = vault.approle.AuthBackendRole("example",
539
538
  backend=approle.path,
540
539
  role_name="test-role",
541
540
  token_policies=[
@@ -543,7 +542,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
543
542
  "dev",
544
543
  "prod",
545
544
  ])
546
- id = vault.app_role.AuthBackendRoleSecretId("id",
545
+ id = vault.approle.AuthBackendRoleSecretId("id",
547
546
  backend=approle.path,
548
547
  role_name=example.role_name,
549
548
  metadata=json.dumps({
@@ -566,16 +565,16 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
566
565
  def _internal_init(__self__,
567
566
  resource_name: str,
568
567
  opts: Optional[pulumi.ResourceOptions] = None,
569
- backend: Optional[pulumi.Input[builtins.str]] = None,
570
- cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
571
- metadata: Optional[pulumi.Input[builtins.str]] = None,
572
- namespace: Optional[pulumi.Input[builtins.str]] = None,
573
- num_uses: Optional[pulumi.Input[builtins.int]] = None,
574
- role_name: Optional[pulumi.Input[builtins.str]] = None,
575
- secret_id: Optional[pulumi.Input[builtins.str]] = None,
576
- ttl: Optional[pulumi.Input[builtins.int]] = None,
577
- with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
578
- wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None,
568
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
569
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
570
+ metadata: Optional[pulumi.Input[_builtins.str]] = None,
571
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
572
+ num_uses: Optional[pulumi.Input[_builtins.int]] = None,
573
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
574
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
575
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
576
+ with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
577
+ wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None,
579
578
  __props__=None):
580
579
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
581
580
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -614,19 +613,19 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
614
613
  def get(resource_name: str,
615
614
  id: pulumi.Input[str],
616
615
  opts: Optional[pulumi.ResourceOptions] = None,
617
- accessor: Optional[pulumi.Input[builtins.str]] = None,
618
- backend: Optional[pulumi.Input[builtins.str]] = None,
619
- cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
620
- metadata: Optional[pulumi.Input[builtins.str]] = None,
621
- namespace: Optional[pulumi.Input[builtins.str]] = None,
622
- num_uses: Optional[pulumi.Input[builtins.int]] = None,
623
- role_name: Optional[pulumi.Input[builtins.str]] = None,
624
- secret_id: Optional[pulumi.Input[builtins.str]] = None,
625
- ttl: Optional[pulumi.Input[builtins.int]] = None,
626
- with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
627
- wrapping_accessor: Optional[pulumi.Input[builtins.str]] = None,
628
- wrapping_token: Optional[pulumi.Input[builtins.str]] = None,
629
- wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendRoleSecretId':
616
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
617
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
618
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
619
+ metadata: Optional[pulumi.Input[_builtins.str]] = None,
620
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
621
+ num_uses: Optional[pulumi.Input[_builtins.int]] = None,
622
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
623
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
624
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
625
+ with_wrapped_accessor: Optional[pulumi.Input[_builtins.bool]] = None,
626
+ wrapping_accessor: Optional[pulumi.Input[_builtins.str]] = None,
627
+ wrapping_token: Optional[pulumi.Input[_builtins.str]] = None,
628
+ wrapping_ttl: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRoleSecretId':
630
629
  """
631
630
  Get an existing AuthBackendRoleSecretId resource's state with the given name, id, and optional extra
632
631
  properties used to qualify the lookup.
@@ -634,28 +633,28 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
634
633
  :param str resource_name: The unique name of the resulting resource.
635
634
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
636
635
  :param pulumi.ResourceOptions opts: Options for the resource.
637
- :param pulumi.Input[builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
638
- :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
639
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
636
+ :param pulumi.Input[_builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
637
+ :param pulumi.Input[_builtins.str] backend: Unique name of the auth backend to configure.
638
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
640
639
  perform the login operation using this SecretID.
641
- :param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
640
+ :param pulumi.Input[_builtins.str] metadata: A JSON-encoded string containing metadata in
642
641
  key-value pairs to be set on tokens issued with this SecretID.
643
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
642
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
644
643
  The value should not contain leading or trailing forward slashes.
645
644
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
646
645
  *Available only for Vault Enterprise*.
647
- :param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
648
- :param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
649
- :param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
646
+ :param pulumi.Input[_builtins.int] num_uses: The number of uses for the secret-id.
647
+ :param pulumi.Input[_builtins.str] role_name: The name of the role to create the SecretID for.
648
+ :param pulumi.Input[_builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
650
649
  mode. Defaults to Vault auto-generating SecretIDs.
651
- :param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
652
- :param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
650
+ :param pulumi.Input[_builtins.int] ttl: The TTL duration of the SecretID.
651
+ :param pulumi.Input[_builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
653
652
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
654
653
  invalidated through unwrapping.
655
- :param pulumi.Input[builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
654
+ :param pulumi.Input[_builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
656
655
  be safely logged.
657
- :param pulumi.Input[builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
658
- :param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
656
+ :param pulumi.Input[_builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
657
+ :param pulumi.Input[_builtins.str] wrapping_ttl: If set, the SecretID response will be
659
658
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
660
659
  and available for the duration specified. Only a single unwrapping of the
661
660
  token is allowed.
@@ -679,43 +678,43 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
679
678
  __props__.__dict__["wrapping_ttl"] = wrapping_ttl
680
679
  return AuthBackendRoleSecretId(resource_name, opts=opts, __props__=__props__)
681
680
 
682
- @property
681
+ @_builtins.property
683
682
  @pulumi.getter
684
- def accessor(self) -> pulumi.Output[builtins.str]:
683
+ def accessor(self) -> pulumi.Output[_builtins.str]:
685
684
  """
686
685
  The unique ID for this SecretID that can be safely logged.
687
686
  """
688
687
  return pulumi.get(self, "accessor")
689
688
 
690
- @property
689
+ @_builtins.property
691
690
  @pulumi.getter
692
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
691
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
693
692
  """
694
693
  Unique name of the auth backend to configure.
695
694
  """
696
695
  return pulumi.get(self, "backend")
697
696
 
698
- @property
697
+ @_builtins.property
699
698
  @pulumi.getter(name="cidrLists")
700
- def cidr_lists(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
699
+ def cidr_lists(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
701
700
  """
702
701
  If set, specifies blocks of IP addresses which can
703
702
  perform the login operation using this SecretID.
704
703
  """
705
704
  return pulumi.get(self, "cidr_lists")
706
705
 
707
- @property
706
+ @_builtins.property
708
707
  @pulumi.getter
709
- def metadata(self) -> pulumi.Output[Optional[builtins.str]]:
708
+ def metadata(self) -> pulumi.Output[Optional[_builtins.str]]:
710
709
  """
711
710
  A JSON-encoded string containing metadata in
712
711
  key-value pairs to be set on tokens issued with this SecretID.
713
712
  """
714
713
  return pulumi.get(self, "metadata")
715
714
 
716
- @property
715
+ @_builtins.property
717
716
  @pulumi.getter
718
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
717
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
719
718
  """
720
719
  The namespace to provision the resource in.
721
720
  The value should not contain leading or trailing forward slashes.
@@ -724,42 +723,42 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
724
723
  """
725
724
  return pulumi.get(self, "namespace")
726
725
 
727
- @property
726
+ @_builtins.property
728
727
  @pulumi.getter(name="numUses")
729
- def num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
728
+ def num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
730
729
  """
731
730
  The number of uses for the secret-id.
732
731
  """
733
732
  return pulumi.get(self, "num_uses")
734
733
 
735
- @property
734
+ @_builtins.property
736
735
  @pulumi.getter(name="roleName")
737
- def role_name(self) -> pulumi.Output[builtins.str]:
736
+ def role_name(self) -> pulumi.Output[_builtins.str]:
738
737
  """
739
738
  The name of the role to create the SecretID for.
740
739
  """
741
740
  return pulumi.get(self, "role_name")
742
741
 
743
- @property
742
+ @_builtins.property
744
743
  @pulumi.getter(name="secretId")
745
- def secret_id(self) -> pulumi.Output[builtins.str]:
744
+ def secret_id(self) -> pulumi.Output[_builtins.str]:
746
745
  """
747
746
  The SecretID to be created. If set, uses "Push"
748
747
  mode. Defaults to Vault auto-generating SecretIDs.
749
748
  """
750
749
  return pulumi.get(self, "secret_id")
751
750
 
752
- @property
751
+ @_builtins.property
753
752
  @pulumi.getter
754
- def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
753
+ def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
755
754
  """
756
755
  The TTL duration of the SecretID.
757
756
  """
758
757
  return pulumi.get(self, "ttl")
759
758
 
760
- @property
759
+ @_builtins.property
761
760
  @pulumi.getter(name="withWrappedAccessor")
762
- def with_wrapped_accessor(self) -> pulumi.Output[Optional[builtins.bool]]:
761
+ def with_wrapped_accessor(self) -> pulumi.Output[Optional[_builtins.bool]]:
763
762
  """
764
763
  Set to `true` to use the wrapped secret-id accessor as the resource ID.
765
764
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
@@ -767,26 +766,26 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
767
766
  """
768
767
  return pulumi.get(self, "with_wrapped_accessor")
769
768
 
770
- @property
769
+ @_builtins.property
771
770
  @pulumi.getter(name="wrappingAccessor")
772
- def wrapping_accessor(self) -> pulumi.Output[builtins.str]:
771
+ def wrapping_accessor(self) -> pulumi.Output[_builtins.str]:
773
772
  """
774
773
  The unique ID for the response-wrapped SecretID that can
775
774
  be safely logged.
776
775
  """
777
776
  return pulumi.get(self, "wrapping_accessor")
778
777
 
779
- @property
778
+ @_builtins.property
780
779
  @pulumi.getter(name="wrappingToken")
781
- def wrapping_token(self) -> pulumi.Output[builtins.str]:
780
+ def wrapping_token(self) -> pulumi.Output[_builtins.str]:
782
781
  """
783
782
  The token used to retrieve a response-wrapped SecretID.
784
783
  """
785
784
  return pulumi.get(self, "wrapping_token")
786
785
 
787
- @property
786
+ @_builtins.property
788
787
  @pulumi.getter(name="wrappingTtl")
789
- def wrapping_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
788
+ def wrapping_ttl(self) -> pulumi.Output[Optional[_builtins.str]]:
790
789
  """
791
790
  If set, the SecretID response will be
792
791
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)