pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/__init__.py +1 -1
- pulumi_vault/_inputs.py +672 -673
- pulumi_vault/ad/__init__.py +1 -1
- pulumi_vault/ad/get_access_credentials.py +27 -28
- pulumi_vault/ad/secret_backend.py +579 -580
- pulumi_vault/ad/secret_library.py +120 -121
- pulumi_vault/ad/secret_role.py +104 -105
- pulumi_vault/alicloud/__init__.py +1 -1
- pulumi_vault/alicloud/auth_backend_role.py +222 -223
- pulumi_vault/approle/__init__.py +1 -1
- pulumi_vault/approle/auth_backend_login.py +138 -139
- pulumi_vault/approle/auth_backend_role.py +292 -293
- pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
- pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
- pulumi_vault/audit.py +103 -104
- pulumi_vault/audit_request_header.py +52 -53
- pulumi_vault/auth_backend.py +132 -133
- pulumi_vault/aws/__init__.py +1 -1
- pulumi_vault/aws/auth_backend_cert.py +86 -87
- pulumi_vault/aws/auth_backend_client.py +307 -308
- pulumi_vault/aws/auth_backend_config_identity.py +103 -104
- pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
- pulumi_vault/aws/auth_backend_login.py +258 -259
- pulumi_vault/aws/auth_backend_role.py +486 -487
- pulumi_vault/aws/auth_backend_role_tag.py +155 -156
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
- pulumi_vault/aws/auth_backend_sts_role.py +86 -87
- pulumi_vault/aws/get_access_credentials.py +59 -60
- pulumi_vault/aws/get_static_access_credentials.py +19 -20
- pulumi_vault/aws/secret_backend.py +409 -410
- pulumi_vault/aws/secret_backend_role.py +256 -257
- pulumi_vault/aws/secret_backend_static_role.py +137 -138
- pulumi_vault/azure/__init__.py +1 -1
- pulumi_vault/azure/_inputs.py +26 -27
- pulumi_vault/azure/auth_backend_config.py +222 -223
- pulumi_vault/azure/auth_backend_role.py +307 -308
- pulumi_vault/azure/backend.py +273 -274
- pulumi_vault/azure/backend_role.py +194 -195
- pulumi_vault/azure/get_access_credentials.py +75 -76
- pulumi_vault/azure/outputs.py +16 -17
- pulumi_vault/cert_auth_backend_role.py +443 -444
- pulumi_vault/config/__init__.py +1 -1
- pulumi_vault/config/__init__.pyi +1 -2
- pulumi_vault/config/_inputs.py +13 -14
- pulumi_vault/config/outputs.py +380 -381
- pulumi_vault/config/ui_custom_message.py +140 -141
- pulumi_vault/config/vars.py +31 -32
- pulumi_vault/consul/__init__.py +1 -1
- pulumi_vault/consul/secret_backend.py +239 -240
- pulumi_vault/consul/secret_backend_role.py +222 -223
- pulumi_vault/database/__init__.py +1 -1
- pulumi_vault/database/_inputs.py +3167 -3168
- pulumi_vault/database/outputs.py +2123 -2124
- pulumi_vault/database/secret_backend_connection.py +259 -260
- pulumi_vault/database/secret_backend_role.py +205 -206
- pulumi_vault/database/secret_backend_static_role.py +218 -219
- pulumi_vault/database/secrets_mount.py +379 -380
- pulumi_vault/egp_policy.py +86 -87
- pulumi_vault/gcp/__init__.py +1 -1
- pulumi_vault/gcp/_inputs.py +98 -99
- pulumi_vault/gcp/auth_backend.py +322 -323
- pulumi_vault/gcp/auth_backend_role.py +347 -348
- pulumi_vault/gcp/get_auth_backend_role.py +91 -92
- pulumi_vault/gcp/outputs.py +66 -67
- pulumi_vault/gcp/secret_backend.py +299 -300
- pulumi_vault/gcp/secret_impersonated_account.py +112 -113
- pulumi_vault/gcp/secret_roleset.py +115 -116
- pulumi_vault/gcp/secret_static_account.py +115 -116
- pulumi_vault/generic/__init__.py +1 -1
- pulumi_vault/generic/endpoint.py +138 -139
- pulumi_vault/generic/get_secret.py +39 -40
- pulumi_vault/generic/secret.py +95 -96
- pulumi_vault/get_auth_backend.py +29 -30
- pulumi_vault/get_auth_backends.py +19 -20
- pulumi_vault/get_namespace.py +21 -22
- pulumi_vault/get_namespaces.py +19 -20
- pulumi_vault/get_nomad_access_token.py +25 -26
- pulumi_vault/get_policy_document.py +10 -11
- pulumi_vault/get_raft_autopilot_state.py +31 -32
- pulumi_vault/github/__init__.py +1 -1
- pulumi_vault/github/_inputs.py +50 -51
- pulumi_vault/github/auth_backend.py +285 -286
- pulumi_vault/github/outputs.py +34 -35
- pulumi_vault/github/team.py +69 -70
- pulumi_vault/github/user.py +69 -70
- pulumi_vault/identity/__init__.py +1 -1
- pulumi_vault/identity/entity.py +103 -104
- pulumi_vault/identity/entity_alias.py +86 -87
- pulumi_vault/identity/entity_policies.py +78 -79
- pulumi_vault/identity/get_entity.py +62 -63
- pulumi_vault/identity/get_group.py +75 -76
- pulumi_vault/identity/get_oidc_client_creds.py +19 -20
- pulumi_vault/identity/get_oidc_openid_config.py +39 -40
- pulumi_vault/identity/get_oidc_public_keys.py +17 -18
- pulumi_vault/identity/group.py +171 -172
- pulumi_vault/identity/group_alias.py +69 -70
- pulumi_vault/identity/group_member_entity_ids.py +69 -70
- pulumi_vault/identity/group_member_group_ids.py +69 -70
- pulumi_vault/identity/group_policies.py +78 -79
- pulumi_vault/identity/mfa_duo.py +183 -184
- pulumi_vault/identity/mfa_login_enforcement.py +147 -148
- pulumi_vault/identity/mfa_okta.py +166 -167
- pulumi_vault/identity/mfa_pingid.py +160 -161
- pulumi_vault/identity/mfa_totp.py +217 -218
- pulumi_vault/identity/oidc.py +35 -36
- pulumi_vault/identity/oidc_assignment.py +69 -70
- pulumi_vault/identity/oidc_client.py +155 -156
- pulumi_vault/identity/oidc_key.py +103 -104
- pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
- pulumi_vault/identity/oidc_provider.py +112 -113
- pulumi_vault/identity/oidc_role.py +103 -104
- pulumi_vault/identity/oidc_scope.py +69 -70
- pulumi_vault/identity/outputs.py +42 -43
- pulumi_vault/jwt/__init__.py +1 -1
- pulumi_vault/jwt/_inputs.py +50 -51
- pulumi_vault/jwt/auth_backend.py +353 -354
- pulumi_vault/jwt/auth_backend_role.py +494 -495
- pulumi_vault/jwt/outputs.py +34 -35
- pulumi_vault/kmip/__init__.py +1 -1
- pulumi_vault/kmip/secret_backend.py +222 -223
- pulumi_vault/kmip/secret_role.py +358 -359
- pulumi_vault/kmip/secret_scope.py +69 -70
- pulumi_vault/kubernetes/__init__.py +1 -1
- pulumi_vault/kubernetes/auth_backend_config.py +171 -172
- pulumi_vault/kubernetes/auth_backend_role.py +273 -274
- pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
- pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
- pulumi_vault/kubernetes/get_service_account_token.py +51 -52
- pulumi_vault/kubernetes/secret_backend.py +384 -385
- pulumi_vault/kubernetes/secret_backend_role.py +239 -240
- pulumi_vault/kv/__init__.py +1 -1
- pulumi_vault/kv/_inputs.py +25 -26
- pulumi_vault/kv/get_secret.py +25 -26
- pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
- pulumi_vault/kv/get_secret_v2.py +41 -42
- pulumi_vault/kv/get_secrets_list.py +17 -18
- pulumi_vault/kv/get_secrets_list_v2.py +25 -26
- pulumi_vault/kv/outputs.py +17 -18
- pulumi_vault/kv/secret.py +61 -62
- pulumi_vault/kv/secret_backend_v2.py +86 -87
- pulumi_vault/kv/secret_v2.py +184 -185
- pulumi_vault/ldap/__init__.py +1 -1
- pulumi_vault/ldap/auth_backend.py +716 -717
- pulumi_vault/ldap/auth_backend_group.py +69 -70
- pulumi_vault/ldap/auth_backend_user.py +86 -87
- pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
- pulumi_vault/ldap/get_static_credentials.py +29 -30
- pulumi_vault/ldap/secret_backend.py +673 -674
- pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
- pulumi_vault/ldap/secret_backend_library_set.py +120 -121
- pulumi_vault/ldap/secret_backend_static_role.py +120 -121
- pulumi_vault/managed/__init__.py +1 -1
- pulumi_vault/managed/_inputs.py +274 -275
- pulumi_vault/managed/keys.py +27 -28
- pulumi_vault/managed/outputs.py +184 -185
- pulumi_vault/mfa_duo.py +137 -138
- pulumi_vault/mfa_okta.py +137 -138
- pulumi_vault/mfa_pingid.py +149 -150
- pulumi_vault/mfa_totp.py +154 -155
- pulumi_vault/mongodbatlas/__init__.py +1 -1
- pulumi_vault/mongodbatlas/secret_backend.py +78 -79
- pulumi_vault/mongodbatlas/secret_role.py +188 -189
- pulumi_vault/mount.py +333 -334
- pulumi_vault/namespace.py +78 -79
- pulumi_vault/nomad_secret_backend.py +256 -257
- pulumi_vault/nomad_secret_role.py +103 -104
- pulumi_vault/okta/__init__.py +1 -1
- pulumi_vault/okta/_inputs.py +31 -32
- pulumi_vault/okta/auth_backend.py +305 -306
- pulumi_vault/okta/auth_backend_group.py +69 -70
- pulumi_vault/okta/auth_backend_user.py +86 -87
- pulumi_vault/okta/outputs.py +21 -22
- pulumi_vault/outputs.py +81 -82
- pulumi_vault/pkisecret/__init__.py +1 -1
- pulumi_vault/pkisecret/_inputs.py +55 -56
- pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
- pulumi_vault/pkisecret/backend_config_acme.py +175 -176
- pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
- pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
- pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
- pulumi_vault/pkisecret/backend_config_est.py +149 -150
- pulumi_vault/pkisecret/backend_config_scep.py +137 -138
- pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
- pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
- pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
- pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
- pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
- pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
- pulumi_vault/pkisecret/get_backend_key.py +29 -30
- pulumi_vault/pkisecret/get_backend_keys.py +23 -24
- pulumi_vault/pkisecret/outputs.py +61 -62
- pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
- pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
- pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
- pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
- pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
- pulumi_vault/pkisecret/secret_backend_key.py +146 -147
- pulumi_vault/pkisecret/secret_backend_role.py +873 -874
- pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
- pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
- pulumi_vault/plugin.py +154 -155
- pulumi_vault/plugin_pinned_version.py +52 -53
- pulumi_vault/policy.py +52 -53
- pulumi_vault/provider.py +160 -161
- pulumi_vault/pulumi-plugin.json +1 -1
- pulumi_vault/quota_lease_count.py +103 -104
- pulumi_vault/quota_rate_limit.py +171 -172
- pulumi_vault/rabbitmq/__init__.py +1 -1
- pulumi_vault/rabbitmq/_inputs.py +50 -51
- pulumi_vault/rabbitmq/outputs.py +34 -35
- pulumi_vault/rabbitmq/secret_backend.py +207 -208
- pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
- pulumi_vault/raft_autopilot.py +137 -138
- pulumi_vault/raft_snapshot_agent_config.py +477 -478
- pulumi_vault/rgp_policy.py +69 -70
- pulumi_vault/saml/__init__.py +1 -1
- pulumi_vault/saml/auth_backend.py +188 -189
- pulumi_vault/saml/auth_backend_role.py +290 -291
- pulumi_vault/scep_auth_backend_role.py +252 -253
- pulumi_vault/secrets/__init__.py +1 -1
- pulumi_vault/secrets/_inputs.py +19 -20
- pulumi_vault/secrets/outputs.py +13 -14
- pulumi_vault/secrets/sync_association.py +88 -89
- pulumi_vault/secrets/sync_aws_destination.py +180 -181
- pulumi_vault/secrets/sync_azure_destination.py +180 -181
- pulumi_vault/secrets/sync_config.py +52 -53
- pulumi_vault/secrets/sync_gcp_destination.py +129 -130
- pulumi_vault/secrets/sync_gh_destination.py +163 -164
- pulumi_vault/secrets/sync_github_apps.py +78 -79
- pulumi_vault/secrets/sync_vercel_destination.py +146 -147
- pulumi_vault/ssh/__init__.py +1 -1
- pulumi_vault/ssh/_inputs.py +13 -14
- pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
- pulumi_vault/ssh/outputs.py +9 -10
- pulumi_vault/ssh/secret_backend_ca.py +120 -121
- pulumi_vault/ssh/secret_backend_role.py +446 -447
- pulumi_vault/terraformcloud/__init__.py +1 -1
- pulumi_vault/terraformcloud/secret_backend.py +138 -139
- pulumi_vault/terraformcloud/secret_creds.py +93 -94
- pulumi_vault/terraformcloud/secret_role.py +117 -118
- pulumi_vault/token.py +301 -302
- pulumi_vault/tokenauth/__init__.py +1 -1
- pulumi_vault/tokenauth/auth_backend_role.py +324 -325
- pulumi_vault/transform/__init__.py +1 -1
- pulumi_vault/transform/alphabet.py +69 -70
- pulumi_vault/transform/get_decode.py +57 -58
- pulumi_vault/transform/get_encode.py +57 -58
- pulumi_vault/transform/role.py +69 -70
- pulumi_vault/transform/template.py +137 -138
- pulumi_vault/transform/transformation.py +171 -172
- pulumi_vault/transit/__init__.py +1 -1
- pulumi_vault/transit/get_cmac.py +47 -48
- pulumi_vault/transit/get_decrypt.py +25 -26
- pulumi_vault/transit/get_encrypt.py +29 -30
- pulumi_vault/transit/get_sign.py +71 -72
- pulumi_vault/transit/get_verify.py +83 -84
- pulumi_vault/transit/secret_backend_key.py +336 -337
- pulumi_vault/transit/secret_cache_config.py +52 -53
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
- pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
- pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
- {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
6
|
-
import copy
|
5
|
+
import builtins as _builtins
|
7
6
|
import warnings
|
8
7
|
import sys
|
9
8
|
import pulumi
|
@@ -20,28 +19,28 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
|
|
20
19
|
@pulumi.input_type
|
21
20
|
class SecretBackendStaticRoleArgs:
|
22
21
|
def __init__(__self__, *,
|
23
|
-
role_name: pulumi.Input[
|
24
|
-
rotation_period: pulumi.Input[
|
25
|
-
username: pulumi.Input[
|
26
|
-
dn: Optional[pulumi.Input[
|
27
|
-
mount: Optional[pulumi.Input[
|
28
|
-
namespace: Optional[pulumi.Input[
|
29
|
-
skip_import_rotation: Optional[pulumi.Input[
|
22
|
+
role_name: pulumi.Input[_builtins.str],
|
23
|
+
rotation_period: pulumi.Input[_builtins.int],
|
24
|
+
username: pulumi.Input[_builtins.str],
|
25
|
+
dn: Optional[pulumi.Input[_builtins.str]] = None,
|
26
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
27
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
28
|
+
skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None):
|
30
29
|
"""
|
31
30
|
The set of arguments for constructing a SecretBackendStaticRole resource.
|
32
|
-
:param pulumi.Input[
|
33
|
-
:param pulumi.Input[
|
34
|
-
:param pulumi.Input[
|
35
|
-
:param pulumi.Input[
|
31
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
32
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
33
|
+
:param pulumi.Input[_builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
|
34
|
+
:param pulumi.Input[_builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
36
35
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
37
36
|
search performed during password rotation. Cannot be modified after creation.
|
38
|
-
:param pulumi.Input[
|
37
|
+
:param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
|
39
38
|
not begin or end with a `/`. Defaults to `ldap`.
|
40
|
-
:param pulumi.Input[
|
39
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
41
40
|
The value should not contain leading or trailing forward slashes.
|
42
41
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
43
42
|
*Available only for Vault Enterprise*.
|
44
|
-
:param pulumi.Input[
|
43
|
+
:param pulumi.Input[_builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
45
44
|
Requires Vault 1.16 or above.
|
46
45
|
"""
|
47
46
|
pulumi.set(__self__, "role_name", role_name)
|
@@ -56,45 +55,45 @@ class SecretBackendStaticRoleArgs:
|
|
56
55
|
if skip_import_rotation is not None:
|
57
56
|
pulumi.set(__self__, "skip_import_rotation", skip_import_rotation)
|
58
57
|
|
59
|
-
@property
|
58
|
+
@_builtins.property
|
60
59
|
@pulumi.getter(name="roleName")
|
61
|
-
def role_name(self) -> pulumi.Input[
|
60
|
+
def role_name(self) -> pulumi.Input[_builtins.str]:
|
62
61
|
"""
|
63
62
|
Name of the role.
|
64
63
|
"""
|
65
64
|
return pulumi.get(self, "role_name")
|
66
65
|
|
67
66
|
@role_name.setter
|
68
|
-
def role_name(self, value: pulumi.Input[
|
67
|
+
def role_name(self, value: pulumi.Input[_builtins.str]):
|
69
68
|
pulumi.set(self, "role_name", value)
|
70
69
|
|
71
|
-
@property
|
70
|
+
@_builtins.property
|
72
71
|
@pulumi.getter(name="rotationPeriod")
|
73
|
-
def rotation_period(self) -> pulumi.Input[
|
72
|
+
def rotation_period(self) -> pulumi.Input[_builtins.int]:
|
74
73
|
"""
|
75
74
|
How often Vault should rotate the password of the user entry.
|
76
75
|
"""
|
77
76
|
return pulumi.get(self, "rotation_period")
|
78
77
|
|
79
78
|
@rotation_period.setter
|
80
|
-
def rotation_period(self, value: pulumi.Input[
|
79
|
+
def rotation_period(self, value: pulumi.Input[_builtins.int]):
|
81
80
|
pulumi.set(self, "rotation_period", value)
|
82
81
|
|
83
|
-
@property
|
82
|
+
@_builtins.property
|
84
83
|
@pulumi.getter
|
85
|
-
def username(self) -> pulumi.Input[
|
84
|
+
def username(self) -> pulumi.Input[_builtins.str]:
|
86
85
|
"""
|
87
86
|
The username of the existing LDAP entry to manage password rotation for.
|
88
87
|
"""
|
89
88
|
return pulumi.get(self, "username")
|
90
89
|
|
91
90
|
@username.setter
|
92
|
-
def username(self, value: pulumi.Input[
|
91
|
+
def username(self, value: pulumi.Input[_builtins.str]):
|
93
92
|
pulumi.set(self, "username", value)
|
94
93
|
|
95
|
-
@property
|
94
|
+
@_builtins.property
|
96
95
|
@pulumi.getter
|
97
|
-
def dn(self) -> Optional[pulumi.Input[
|
96
|
+
def dn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
98
97
|
"""
|
99
98
|
Distinguished name (DN) of the existing LDAP entry to manage
|
100
99
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
@@ -103,12 +102,12 @@ class SecretBackendStaticRoleArgs:
|
|
103
102
|
return pulumi.get(self, "dn")
|
104
103
|
|
105
104
|
@dn.setter
|
106
|
-
def dn(self, value: Optional[pulumi.Input[
|
105
|
+
def dn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
107
106
|
pulumi.set(self, "dn", value)
|
108
107
|
|
109
|
-
@property
|
108
|
+
@_builtins.property
|
110
109
|
@pulumi.getter
|
111
|
-
def mount(self) -> Optional[pulumi.Input[
|
110
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
112
111
|
"""
|
113
112
|
The unique path this backend should be mounted at. Must
|
114
113
|
not begin or end with a `/`. Defaults to `ldap`.
|
@@ -116,12 +115,12 @@ class SecretBackendStaticRoleArgs:
|
|
116
115
|
return pulumi.get(self, "mount")
|
117
116
|
|
118
117
|
@mount.setter
|
119
|
-
def mount(self, value: Optional[pulumi.Input[
|
118
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
120
119
|
pulumi.set(self, "mount", value)
|
121
120
|
|
122
|
-
@property
|
121
|
+
@_builtins.property
|
123
122
|
@pulumi.getter
|
124
|
-
def namespace(self) -> Optional[pulumi.Input[
|
123
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
125
124
|
"""
|
126
125
|
The namespace to provision the resource in.
|
127
126
|
The value should not contain leading or trailing forward slashes.
|
@@ -131,12 +130,12 @@ class SecretBackendStaticRoleArgs:
|
|
131
130
|
return pulumi.get(self, "namespace")
|
132
131
|
|
133
132
|
@namespace.setter
|
134
|
-
def namespace(self, value: Optional[pulumi.Input[
|
133
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
135
134
|
pulumi.set(self, "namespace", value)
|
136
135
|
|
137
|
-
@property
|
136
|
+
@_builtins.property
|
138
137
|
@pulumi.getter(name="skipImportRotation")
|
139
|
-
def skip_import_rotation(self) -> Optional[pulumi.Input[
|
138
|
+
def skip_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
140
139
|
"""
|
141
140
|
Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
142
141
|
Requires Vault 1.16 or above.
|
@@ -144,36 +143,36 @@ class SecretBackendStaticRoleArgs:
|
|
144
143
|
return pulumi.get(self, "skip_import_rotation")
|
145
144
|
|
146
145
|
@skip_import_rotation.setter
|
147
|
-
def skip_import_rotation(self, value: Optional[pulumi.Input[
|
146
|
+
def skip_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
148
147
|
pulumi.set(self, "skip_import_rotation", value)
|
149
148
|
|
150
149
|
|
151
150
|
@pulumi.input_type
|
152
151
|
class _SecretBackendStaticRoleState:
|
153
152
|
def __init__(__self__, *,
|
154
|
-
dn: Optional[pulumi.Input[
|
155
|
-
mount: Optional[pulumi.Input[
|
156
|
-
namespace: Optional[pulumi.Input[
|
157
|
-
role_name: Optional[pulumi.Input[
|
158
|
-
rotation_period: Optional[pulumi.Input[
|
159
|
-
skip_import_rotation: Optional[pulumi.Input[
|
160
|
-
username: Optional[pulumi.Input[
|
153
|
+
dn: Optional[pulumi.Input[_builtins.str]] = None,
|
154
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
155
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
156
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
157
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
158
|
+
skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
159
|
+
username: Optional[pulumi.Input[_builtins.str]] = None):
|
161
160
|
"""
|
162
161
|
Input properties used for looking up and filtering SecretBackendStaticRole resources.
|
163
|
-
:param pulumi.Input[
|
162
|
+
:param pulumi.Input[_builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
164
163
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
165
164
|
search performed during password rotation. Cannot be modified after creation.
|
166
|
-
:param pulumi.Input[
|
165
|
+
:param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
|
167
166
|
not begin or end with a `/`. Defaults to `ldap`.
|
168
|
-
:param pulumi.Input[
|
167
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
169
168
|
The value should not contain leading or trailing forward slashes.
|
170
169
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
171
170
|
*Available only for Vault Enterprise*.
|
172
|
-
:param pulumi.Input[
|
173
|
-
:param pulumi.Input[
|
174
|
-
:param pulumi.Input[
|
171
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
172
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
173
|
+
:param pulumi.Input[_builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
175
174
|
Requires Vault 1.16 or above.
|
176
|
-
:param pulumi.Input[
|
175
|
+
:param pulumi.Input[_builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
|
177
176
|
"""
|
178
177
|
if dn is not None:
|
179
178
|
pulumi.set(__self__, "dn", dn)
|
@@ -190,9 +189,9 @@ class _SecretBackendStaticRoleState:
|
|
190
189
|
if username is not None:
|
191
190
|
pulumi.set(__self__, "username", username)
|
192
191
|
|
193
|
-
@property
|
192
|
+
@_builtins.property
|
194
193
|
@pulumi.getter
|
195
|
-
def dn(self) -> Optional[pulumi.Input[
|
194
|
+
def dn(self) -> Optional[pulumi.Input[_builtins.str]]:
|
196
195
|
"""
|
197
196
|
Distinguished name (DN) of the existing LDAP entry to manage
|
198
197
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
@@ -201,12 +200,12 @@ class _SecretBackendStaticRoleState:
|
|
201
200
|
return pulumi.get(self, "dn")
|
202
201
|
|
203
202
|
@dn.setter
|
204
|
-
def dn(self, value: Optional[pulumi.Input[
|
203
|
+
def dn(self, value: Optional[pulumi.Input[_builtins.str]]):
|
205
204
|
pulumi.set(self, "dn", value)
|
206
205
|
|
207
|
-
@property
|
206
|
+
@_builtins.property
|
208
207
|
@pulumi.getter
|
209
|
-
def mount(self) -> Optional[pulumi.Input[
|
208
|
+
def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
|
210
209
|
"""
|
211
210
|
The unique path this backend should be mounted at. Must
|
212
211
|
not begin or end with a `/`. Defaults to `ldap`.
|
@@ -214,12 +213,12 @@ class _SecretBackendStaticRoleState:
|
|
214
213
|
return pulumi.get(self, "mount")
|
215
214
|
|
216
215
|
@mount.setter
|
217
|
-
def mount(self, value: Optional[pulumi.Input[
|
216
|
+
def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
|
218
217
|
pulumi.set(self, "mount", value)
|
219
218
|
|
220
|
-
@property
|
219
|
+
@_builtins.property
|
221
220
|
@pulumi.getter
|
222
|
-
def namespace(self) -> Optional[pulumi.Input[
|
221
|
+
def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
|
223
222
|
"""
|
224
223
|
The namespace to provision the resource in.
|
225
224
|
The value should not contain leading or trailing forward slashes.
|
@@ -229,36 +228,36 @@ class _SecretBackendStaticRoleState:
|
|
229
228
|
return pulumi.get(self, "namespace")
|
230
229
|
|
231
230
|
@namespace.setter
|
232
|
-
def namespace(self, value: Optional[pulumi.Input[
|
231
|
+
def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
|
233
232
|
pulumi.set(self, "namespace", value)
|
234
233
|
|
235
|
-
@property
|
234
|
+
@_builtins.property
|
236
235
|
@pulumi.getter(name="roleName")
|
237
|
-
def role_name(self) -> Optional[pulumi.Input[
|
236
|
+
def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
|
238
237
|
"""
|
239
238
|
Name of the role.
|
240
239
|
"""
|
241
240
|
return pulumi.get(self, "role_name")
|
242
241
|
|
243
242
|
@role_name.setter
|
244
|
-
def role_name(self, value: Optional[pulumi.Input[
|
243
|
+
def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
|
245
244
|
pulumi.set(self, "role_name", value)
|
246
245
|
|
247
|
-
@property
|
246
|
+
@_builtins.property
|
248
247
|
@pulumi.getter(name="rotationPeriod")
|
249
|
-
def rotation_period(self) -> Optional[pulumi.Input[
|
248
|
+
def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
|
250
249
|
"""
|
251
250
|
How often Vault should rotate the password of the user entry.
|
252
251
|
"""
|
253
252
|
return pulumi.get(self, "rotation_period")
|
254
253
|
|
255
254
|
@rotation_period.setter
|
256
|
-
def rotation_period(self, value: Optional[pulumi.Input[
|
255
|
+
def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
|
257
256
|
pulumi.set(self, "rotation_period", value)
|
258
257
|
|
259
|
-
@property
|
258
|
+
@_builtins.property
|
260
259
|
@pulumi.getter(name="skipImportRotation")
|
261
|
-
def skip_import_rotation(self) -> Optional[pulumi.Input[
|
260
|
+
def skip_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
|
262
261
|
"""
|
263
262
|
Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
264
263
|
Requires Vault 1.16 or above.
|
@@ -266,19 +265,19 @@ class _SecretBackendStaticRoleState:
|
|
266
265
|
return pulumi.get(self, "skip_import_rotation")
|
267
266
|
|
268
267
|
@skip_import_rotation.setter
|
269
|
-
def skip_import_rotation(self, value: Optional[pulumi.Input[
|
268
|
+
def skip_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
|
270
269
|
pulumi.set(self, "skip_import_rotation", value)
|
271
270
|
|
272
|
-
@property
|
271
|
+
@_builtins.property
|
273
272
|
@pulumi.getter
|
274
|
-
def username(self) -> Optional[pulumi.Input[
|
273
|
+
def username(self) -> Optional[pulumi.Input[_builtins.str]]:
|
275
274
|
"""
|
276
275
|
The username of the existing LDAP entry to manage password rotation for.
|
277
276
|
"""
|
278
277
|
return pulumi.get(self, "username")
|
279
278
|
|
280
279
|
@username.setter
|
281
|
-
def username(self, value: Optional[pulumi.Input[
|
280
|
+
def username(self, value: Optional[pulumi.Input[_builtins.str]]):
|
282
281
|
pulumi.set(self, "username", value)
|
283
282
|
|
284
283
|
|
@@ -288,13 +287,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
288
287
|
def __init__(__self__,
|
289
288
|
resource_name: str,
|
290
289
|
opts: Optional[pulumi.ResourceOptions] = None,
|
291
|
-
dn: Optional[pulumi.Input[
|
292
|
-
mount: Optional[pulumi.Input[
|
293
|
-
namespace: Optional[pulumi.Input[
|
294
|
-
role_name: Optional[pulumi.Input[
|
295
|
-
rotation_period: Optional[pulumi.Input[
|
296
|
-
skip_import_rotation: Optional[pulumi.Input[
|
297
|
-
username: Optional[pulumi.Input[
|
290
|
+
dn: Optional[pulumi.Input[_builtins.str]] = None,
|
291
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
292
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
293
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
294
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
295
|
+
skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
296
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
298
297
|
__props__=None):
|
299
298
|
"""
|
300
299
|
## Example Usage
|
@@ -329,20 +328,20 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
329
328
|
|
330
329
|
:param str resource_name: The name of the resource.
|
331
330
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
332
|
-
:param pulumi.Input[
|
331
|
+
:param pulumi.Input[_builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
333
332
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
334
333
|
search performed during password rotation. Cannot be modified after creation.
|
335
|
-
:param pulumi.Input[
|
334
|
+
:param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
|
336
335
|
not begin or end with a `/`. Defaults to `ldap`.
|
337
|
-
:param pulumi.Input[
|
336
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
338
337
|
The value should not contain leading or trailing forward slashes.
|
339
338
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
340
339
|
*Available only for Vault Enterprise*.
|
341
|
-
:param pulumi.Input[
|
342
|
-
:param pulumi.Input[
|
343
|
-
:param pulumi.Input[
|
340
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
341
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
342
|
+
:param pulumi.Input[_builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
344
343
|
Requires Vault 1.16 or above.
|
345
|
-
:param pulumi.Input[
|
344
|
+
:param pulumi.Input[_builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
|
346
345
|
"""
|
347
346
|
...
|
348
347
|
@overload
|
@@ -396,13 +395,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
396
395
|
def _internal_init(__self__,
|
397
396
|
resource_name: str,
|
398
397
|
opts: Optional[pulumi.ResourceOptions] = None,
|
399
|
-
dn: Optional[pulumi.Input[
|
400
|
-
mount: Optional[pulumi.Input[
|
401
|
-
namespace: Optional[pulumi.Input[
|
402
|
-
role_name: Optional[pulumi.Input[
|
403
|
-
rotation_period: Optional[pulumi.Input[
|
404
|
-
skip_import_rotation: Optional[pulumi.Input[
|
405
|
-
username: Optional[pulumi.Input[
|
398
|
+
dn: Optional[pulumi.Input[_builtins.str]] = None,
|
399
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
400
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
401
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
402
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
403
|
+
skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
404
|
+
username: Optional[pulumi.Input[_builtins.str]] = None,
|
406
405
|
__props__=None):
|
407
406
|
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
408
407
|
if not isinstance(opts, pulumi.ResourceOptions):
|
@@ -435,13 +434,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
435
434
|
def get(resource_name: str,
|
436
435
|
id: pulumi.Input[str],
|
437
436
|
opts: Optional[pulumi.ResourceOptions] = None,
|
438
|
-
dn: Optional[pulumi.Input[
|
439
|
-
mount: Optional[pulumi.Input[
|
440
|
-
namespace: Optional[pulumi.Input[
|
441
|
-
role_name: Optional[pulumi.Input[
|
442
|
-
rotation_period: Optional[pulumi.Input[
|
443
|
-
skip_import_rotation: Optional[pulumi.Input[
|
444
|
-
username: Optional[pulumi.Input[
|
437
|
+
dn: Optional[pulumi.Input[_builtins.str]] = None,
|
438
|
+
mount: Optional[pulumi.Input[_builtins.str]] = None,
|
439
|
+
namespace: Optional[pulumi.Input[_builtins.str]] = None,
|
440
|
+
role_name: Optional[pulumi.Input[_builtins.str]] = None,
|
441
|
+
rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
|
442
|
+
skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
|
443
|
+
username: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendStaticRole':
|
445
444
|
"""
|
446
445
|
Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
|
447
446
|
properties used to qualify the lookup.
|
@@ -449,20 +448,20 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
449
448
|
:param str resource_name: The unique name of the resulting resource.
|
450
449
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
451
450
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
452
|
-
:param pulumi.Input[
|
451
|
+
:param pulumi.Input[_builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
|
453
452
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
454
453
|
search performed during password rotation. Cannot be modified after creation.
|
455
|
-
:param pulumi.Input[
|
454
|
+
:param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
|
456
455
|
not begin or end with a `/`. Defaults to `ldap`.
|
457
|
-
:param pulumi.Input[
|
456
|
+
:param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
|
458
457
|
The value should not contain leading or trailing forward slashes.
|
459
458
|
The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
|
460
459
|
*Available only for Vault Enterprise*.
|
461
|
-
:param pulumi.Input[
|
462
|
-
:param pulumi.Input[
|
463
|
-
:param pulumi.Input[
|
460
|
+
:param pulumi.Input[_builtins.str] role_name: Name of the role.
|
461
|
+
:param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
|
462
|
+
:param pulumi.Input[_builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
464
463
|
Requires Vault 1.16 or above.
|
465
|
-
:param pulumi.Input[
|
464
|
+
:param pulumi.Input[_builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
|
466
465
|
"""
|
467
466
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
468
467
|
|
@@ -477,9 +476,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
477
476
|
__props__.__dict__["username"] = username
|
478
477
|
return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
|
479
478
|
|
480
|
-
@property
|
479
|
+
@_builtins.property
|
481
480
|
@pulumi.getter
|
482
|
-
def dn(self) -> pulumi.Output[Optional[
|
481
|
+
def dn(self) -> pulumi.Output[Optional[_builtins.str]]:
|
483
482
|
"""
|
484
483
|
Distinguished name (DN) of the existing LDAP entry to manage
|
485
484
|
password rotation for. If given, it will take precedence over `username` for the LDAP
|
@@ -487,18 +486,18 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
487
486
|
"""
|
488
487
|
return pulumi.get(self, "dn")
|
489
488
|
|
490
|
-
@property
|
489
|
+
@_builtins.property
|
491
490
|
@pulumi.getter
|
492
|
-
def mount(self) -> pulumi.Output[Optional[
|
491
|
+
def mount(self) -> pulumi.Output[Optional[_builtins.str]]:
|
493
492
|
"""
|
494
493
|
The unique path this backend should be mounted at. Must
|
495
494
|
not begin or end with a `/`. Defaults to `ldap`.
|
496
495
|
"""
|
497
496
|
return pulumi.get(self, "mount")
|
498
497
|
|
499
|
-
@property
|
498
|
+
@_builtins.property
|
500
499
|
@pulumi.getter
|
501
|
-
def namespace(self) -> pulumi.Output[Optional[
|
500
|
+
def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
|
502
501
|
"""
|
503
502
|
The namespace to provision the resource in.
|
504
503
|
The value should not contain leading or trailing forward slashes.
|
@@ -507,34 +506,34 @@ class SecretBackendStaticRole(pulumi.CustomResource):
|
|
507
506
|
"""
|
508
507
|
return pulumi.get(self, "namespace")
|
509
508
|
|
510
|
-
@property
|
509
|
+
@_builtins.property
|
511
510
|
@pulumi.getter(name="roleName")
|
512
|
-
def role_name(self) -> pulumi.Output[
|
511
|
+
def role_name(self) -> pulumi.Output[_builtins.str]:
|
513
512
|
"""
|
514
513
|
Name of the role.
|
515
514
|
"""
|
516
515
|
return pulumi.get(self, "role_name")
|
517
516
|
|
518
|
-
@property
|
517
|
+
@_builtins.property
|
519
518
|
@pulumi.getter(name="rotationPeriod")
|
520
|
-
def rotation_period(self) -> pulumi.Output[
|
519
|
+
def rotation_period(self) -> pulumi.Output[_builtins.int]:
|
521
520
|
"""
|
522
521
|
How often Vault should rotate the password of the user entry.
|
523
522
|
"""
|
524
523
|
return pulumi.get(self, "rotation_period")
|
525
524
|
|
526
|
-
@property
|
525
|
+
@_builtins.property
|
527
526
|
@pulumi.getter(name="skipImportRotation")
|
528
|
-
def skip_import_rotation(self) -> pulumi.Output[Optional[
|
527
|
+
def skip_import_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
|
529
528
|
"""
|
530
529
|
Causes vault to skip the initial secret rotation on import. Not applicable to updates.
|
531
530
|
Requires Vault 1.16 or above.
|
532
531
|
"""
|
533
532
|
return pulumi.get(self, "skip_import_rotation")
|
534
533
|
|
535
|
-
@property
|
534
|
+
@_builtins.property
|
536
535
|
@pulumi.getter
|
537
|
-
def username(self) -> pulumi.Output[
|
536
|
+
def username(self) -> pulumi.Output[_builtins.str]:
|
538
537
|
"""
|
539
538
|
The username of the existing LDAP entry to manage password rotation for.
|
540
539
|
"""
|
pulumi_vault/managed/__init__.py
CHANGED
@@ -2,7 +2,7 @@
|
|
2
2
|
# *** WARNING: this file was generated by pulumi-language-python. ***
|
3
3
|
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
4
4
|
|
5
|
-
import builtins
|
5
|
+
import builtins as _builtins
|
6
6
|
from .. import _utilities
|
7
7
|
import typing
|
8
8
|
# Export this package's modules as members:
|