pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,28 +19,28 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
20
19
  @pulumi.input_type
21
20
  class SecretBackendStaticRoleArgs:
22
21
  def __init__(__self__, *,
23
- role_name: pulumi.Input[builtins.str],
24
- rotation_period: pulumi.Input[builtins.int],
25
- username: pulumi.Input[builtins.str],
26
- dn: Optional[pulumi.Input[builtins.str]] = None,
27
- mount: Optional[pulumi.Input[builtins.str]] = None,
28
- namespace: Optional[pulumi.Input[builtins.str]] = None,
29
- skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None):
22
+ role_name: pulumi.Input[_builtins.str],
23
+ rotation_period: pulumi.Input[_builtins.int],
24
+ username: pulumi.Input[_builtins.str],
25
+ dn: Optional[pulumi.Input[_builtins.str]] = None,
26
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
28
+ skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None):
30
29
  """
31
30
  The set of arguments for constructing a SecretBackendStaticRole resource.
32
- :param pulumi.Input[builtins.str] role_name: Name of the role.
33
- :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
34
- :param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
35
- :param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
31
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
32
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
33
+ :param pulumi.Input[_builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
34
+ :param pulumi.Input[_builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
36
35
  password rotation for. If given, it will take precedence over `username` for the LDAP
37
36
  search performed during password rotation. Cannot be modified after creation.
38
- :param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
37
+ :param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
39
38
  not begin or end with a `/`. Defaults to `ldap`.
40
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
39
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
41
40
  The value should not contain leading or trailing forward slashes.
42
41
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
43
42
  *Available only for Vault Enterprise*.
44
- :param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
43
+ :param pulumi.Input[_builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
45
44
  Requires Vault 1.16 or above.
46
45
  """
47
46
  pulumi.set(__self__, "role_name", role_name)
@@ -56,45 +55,45 @@ class SecretBackendStaticRoleArgs:
56
55
  if skip_import_rotation is not None:
57
56
  pulumi.set(__self__, "skip_import_rotation", skip_import_rotation)
58
57
 
59
- @property
58
+ @_builtins.property
60
59
  @pulumi.getter(name="roleName")
61
- def role_name(self) -> pulumi.Input[builtins.str]:
60
+ def role_name(self) -> pulumi.Input[_builtins.str]:
62
61
  """
63
62
  Name of the role.
64
63
  """
65
64
  return pulumi.get(self, "role_name")
66
65
 
67
66
  @role_name.setter
68
- def role_name(self, value: pulumi.Input[builtins.str]):
67
+ def role_name(self, value: pulumi.Input[_builtins.str]):
69
68
  pulumi.set(self, "role_name", value)
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter(name="rotationPeriod")
73
- def rotation_period(self) -> pulumi.Input[builtins.int]:
72
+ def rotation_period(self) -> pulumi.Input[_builtins.int]:
74
73
  """
75
74
  How often Vault should rotate the password of the user entry.
76
75
  """
77
76
  return pulumi.get(self, "rotation_period")
78
77
 
79
78
  @rotation_period.setter
80
- def rotation_period(self, value: pulumi.Input[builtins.int]):
79
+ def rotation_period(self, value: pulumi.Input[_builtins.int]):
81
80
  pulumi.set(self, "rotation_period", value)
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter
85
- def username(self) -> pulumi.Input[builtins.str]:
84
+ def username(self) -> pulumi.Input[_builtins.str]:
86
85
  """
87
86
  The username of the existing LDAP entry to manage password rotation for.
88
87
  """
89
88
  return pulumi.get(self, "username")
90
89
 
91
90
  @username.setter
92
- def username(self, value: pulumi.Input[builtins.str]):
91
+ def username(self, value: pulumi.Input[_builtins.str]):
93
92
  pulumi.set(self, "username", value)
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter
97
- def dn(self) -> Optional[pulumi.Input[builtins.str]]:
96
+ def dn(self) -> Optional[pulumi.Input[_builtins.str]]:
98
97
  """
99
98
  Distinguished name (DN) of the existing LDAP entry to manage
100
99
  password rotation for. If given, it will take precedence over `username` for the LDAP
@@ -103,12 +102,12 @@ class SecretBackendStaticRoleArgs:
103
102
  return pulumi.get(self, "dn")
104
103
 
105
104
  @dn.setter
106
- def dn(self, value: Optional[pulumi.Input[builtins.str]]):
105
+ def dn(self, value: Optional[pulumi.Input[_builtins.str]]):
107
106
  pulumi.set(self, "dn", value)
108
107
 
109
- @property
108
+ @_builtins.property
110
109
  @pulumi.getter
111
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
110
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
112
111
  """
113
112
  The unique path this backend should be mounted at. Must
114
113
  not begin or end with a `/`. Defaults to `ldap`.
@@ -116,12 +115,12 @@ class SecretBackendStaticRoleArgs:
116
115
  return pulumi.get(self, "mount")
117
116
 
118
117
  @mount.setter
119
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
118
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
120
119
  pulumi.set(self, "mount", value)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter
124
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
123
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
125
124
  """
126
125
  The namespace to provision the resource in.
127
126
  The value should not contain leading or trailing forward slashes.
@@ -131,12 +130,12 @@ class SecretBackendStaticRoleArgs:
131
130
  return pulumi.get(self, "namespace")
132
131
 
133
132
  @namespace.setter
134
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
133
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
135
134
  pulumi.set(self, "namespace", value)
136
135
 
137
- @property
136
+ @_builtins.property
138
137
  @pulumi.getter(name="skipImportRotation")
139
- def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
138
+ def skip_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
140
139
  """
141
140
  Causes vault to skip the initial secret rotation on import. Not applicable to updates.
142
141
  Requires Vault 1.16 or above.
@@ -144,36 +143,36 @@ class SecretBackendStaticRoleArgs:
144
143
  return pulumi.get(self, "skip_import_rotation")
145
144
 
146
145
  @skip_import_rotation.setter
147
- def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
146
+ def skip_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
148
147
  pulumi.set(self, "skip_import_rotation", value)
149
148
 
150
149
 
151
150
  @pulumi.input_type
152
151
  class _SecretBackendStaticRoleState:
153
152
  def __init__(__self__, *,
154
- dn: Optional[pulumi.Input[builtins.str]] = None,
155
- mount: Optional[pulumi.Input[builtins.str]] = None,
156
- namespace: Optional[pulumi.Input[builtins.str]] = None,
157
- role_name: Optional[pulumi.Input[builtins.str]] = None,
158
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
159
- skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
160
- username: Optional[pulumi.Input[builtins.str]] = None):
153
+ dn: Optional[pulumi.Input[_builtins.str]] = None,
154
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
155
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
156
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
157
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
158
+ skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
159
+ username: Optional[pulumi.Input[_builtins.str]] = None):
161
160
  """
162
161
  Input properties used for looking up and filtering SecretBackendStaticRole resources.
163
- :param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
162
+ :param pulumi.Input[_builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
164
163
  password rotation for. If given, it will take precedence over `username` for the LDAP
165
164
  search performed during password rotation. Cannot be modified after creation.
166
- :param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
165
+ :param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
167
166
  not begin or end with a `/`. Defaults to `ldap`.
168
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
167
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
169
168
  The value should not contain leading or trailing forward slashes.
170
169
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
171
170
  *Available only for Vault Enterprise*.
172
- :param pulumi.Input[builtins.str] role_name: Name of the role.
173
- :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
174
- :param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
171
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
172
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
173
+ :param pulumi.Input[_builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
175
174
  Requires Vault 1.16 or above.
176
- :param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
175
+ :param pulumi.Input[_builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
177
176
  """
178
177
  if dn is not None:
179
178
  pulumi.set(__self__, "dn", dn)
@@ -190,9 +189,9 @@ class _SecretBackendStaticRoleState:
190
189
  if username is not None:
191
190
  pulumi.set(__self__, "username", username)
192
191
 
193
- @property
192
+ @_builtins.property
194
193
  @pulumi.getter
195
- def dn(self) -> Optional[pulumi.Input[builtins.str]]:
194
+ def dn(self) -> Optional[pulumi.Input[_builtins.str]]:
196
195
  """
197
196
  Distinguished name (DN) of the existing LDAP entry to manage
198
197
  password rotation for. If given, it will take precedence over `username` for the LDAP
@@ -201,12 +200,12 @@ class _SecretBackendStaticRoleState:
201
200
  return pulumi.get(self, "dn")
202
201
 
203
202
  @dn.setter
204
- def dn(self, value: Optional[pulumi.Input[builtins.str]]):
203
+ def dn(self, value: Optional[pulumi.Input[_builtins.str]]):
205
204
  pulumi.set(self, "dn", value)
206
205
 
207
- @property
206
+ @_builtins.property
208
207
  @pulumi.getter
209
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
208
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
210
209
  """
211
210
  The unique path this backend should be mounted at. Must
212
211
  not begin or end with a `/`. Defaults to `ldap`.
@@ -214,12 +213,12 @@ class _SecretBackendStaticRoleState:
214
213
  return pulumi.get(self, "mount")
215
214
 
216
215
  @mount.setter
217
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
216
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
218
217
  pulumi.set(self, "mount", value)
219
218
 
220
- @property
219
+ @_builtins.property
221
220
  @pulumi.getter
222
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
221
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
223
222
  """
224
223
  The namespace to provision the resource in.
225
224
  The value should not contain leading or trailing forward slashes.
@@ -229,36 +228,36 @@ class _SecretBackendStaticRoleState:
229
228
  return pulumi.get(self, "namespace")
230
229
 
231
230
  @namespace.setter
232
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
231
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
233
232
  pulumi.set(self, "namespace", value)
234
233
 
235
- @property
234
+ @_builtins.property
236
235
  @pulumi.getter(name="roleName")
237
- def role_name(self) -> Optional[pulumi.Input[builtins.str]]:
236
+ def role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
238
237
  """
239
238
  Name of the role.
240
239
  """
241
240
  return pulumi.get(self, "role_name")
242
241
 
243
242
  @role_name.setter
244
- def role_name(self, value: Optional[pulumi.Input[builtins.str]]):
243
+ def role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
245
244
  pulumi.set(self, "role_name", value)
246
245
 
247
- @property
246
+ @_builtins.property
248
247
  @pulumi.getter(name="rotationPeriod")
249
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
248
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
250
249
  """
251
250
  How often Vault should rotate the password of the user entry.
252
251
  """
253
252
  return pulumi.get(self, "rotation_period")
254
253
 
255
254
  @rotation_period.setter
256
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
255
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
257
256
  pulumi.set(self, "rotation_period", value)
258
257
 
259
- @property
258
+ @_builtins.property
260
259
  @pulumi.getter(name="skipImportRotation")
261
- def skip_import_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
260
+ def skip_import_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
262
261
  """
263
262
  Causes vault to skip the initial secret rotation on import. Not applicable to updates.
264
263
  Requires Vault 1.16 or above.
@@ -266,19 +265,19 @@ class _SecretBackendStaticRoleState:
266
265
  return pulumi.get(self, "skip_import_rotation")
267
266
 
268
267
  @skip_import_rotation.setter
269
- def skip_import_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
268
+ def skip_import_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
270
269
  pulumi.set(self, "skip_import_rotation", value)
271
270
 
272
- @property
271
+ @_builtins.property
273
272
  @pulumi.getter
274
- def username(self) -> Optional[pulumi.Input[builtins.str]]:
273
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
275
274
  """
276
275
  The username of the existing LDAP entry to manage password rotation for.
277
276
  """
278
277
  return pulumi.get(self, "username")
279
278
 
280
279
  @username.setter
281
- def username(self, value: Optional[pulumi.Input[builtins.str]]):
280
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
282
281
  pulumi.set(self, "username", value)
283
282
 
284
283
 
@@ -288,13 +287,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
288
287
  def __init__(__self__,
289
288
  resource_name: str,
290
289
  opts: Optional[pulumi.ResourceOptions] = None,
291
- dn: Optional[pulumi.Input[builtins.str]] = None,
292
- mount: Optional[pulumi.Input[builtins.str]] = None,
293
- namespace: Optional[pulumi.Input[builtins.str]] = None,
294
- role_name: Optional[pulumi.Input[builtins.str]] = None,
295
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
296
- skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
297
- username: Optional[pulumi.Input[builtins.str]] = None,
290
+ dn: Optional[pulumi.Input[_builtins.str]] = None,
291
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
292
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
293
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
294
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
295
+ skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
296
+ username: Optional[pulumi.Input[_builtins.str]] = None,
298
297
  __props__=None):
299
298
  """
300
299
  ## Example Usage
@@ -329,20 +328,20 @@ class SecretBackendStaticRole(pulumi.CustomResource):
329
328
 
330
329
  :param str resource_name: The name of the resource.
331
330
  :param pulumi.ResourceOptions opts: Options for the resource.
332
- :param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
331
+ :param pulumi.Input[_builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
333
332
  password rotation for. If given, it will take precedence over `username` for the LDAP
334
333
  search performed during password rotation. Cannot be modified after creation.
335
- :param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
334
+ :param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
336
335
  not begin or end with a `/`. Defaults to `ldap`.
337
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
336
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
338
337
  The value should not contain leading or trailing forward slashes.
339
338
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
340
339
  *Available only for Vault Enterprise*.
341
- :param pulumi.Input[builtins.str] role_name: Name of the role.
342
- :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
343
- :param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
340
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
341
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
342
+ :param pulumi.Input[_builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
344
343
  Requires Vault 1.16 or above.
345
- :param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
344
+ :param pulumi.Input[_builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
346
345
  """
347
346
  ...
348
347
  @overload
@@ -396,13 +395,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
396
395
  def _internal_init(__self__,
397
396
  resource_name: str,
398
397
  opts: Optional[pulumi.ResourceOptions] = None,
399
- dn: Optional[pulumi.Input[builtins.str]] = None,
400
- mount: Optional[pulumi.Input[builtins.str]] = None,
401
- namespace: Optional[pulumi.Input[builtins.str]] = None,
402
- role_name: Optional[pulumi.Input[builtins.str]] = None,
403
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
404
- skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
405
- username: Optional[pulumi.Input[builtins.str]] = None,
398
+ dn: Optional[pulumi.Input[_builtins.str]] = None,
399
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
400
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
401
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
402
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
403
+ skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
404
+ username: Optional[pulumi.Input[_builtins.str]] = None,
406
405
  __props__=None):
407
406
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
408
407
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -435,13 +434,13 @@ class SecretBackendStaticRole(pulumi.CustomResource):
435
434
  def get(resource_name: str,
436
435
  id: pulumi.Input[str],
437
436
  opts: Optional[pulumi.ResourceOptions] = None,
438
- dn: Optional[pulumi.Input[builtins.str]] = None,
439
- mount: Optional[pulumi.Input[builtins.str]] = None,
440
- namespace: Optional[pulumi.Input[builtins.str]] = None,
441
- role_name: Optional[pulumi.Input[builtins.str]] = None,
442
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
443
- skip_import_rotation: Optional[pulumi.Input[builtins.bool]] = None,
444
- username: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendStaticRole':
437
+ dn: Optional[pulumi.Input[_builtins.str]] = None,
438
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
439
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
440
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
441
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
442
+ skip_import_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
443
+ username: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendStaticRole':
445
444
  """
446
445
  Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
447
446
  properties used to qualify the lookup.
@@ -449,20 +448,20 @@ class SecretBackendStaticRole(pulumi.CustomResource):
449
448
  :param str resource_name: The unique name of the resulting resource.
450
449
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
451
450
  :param pulumi.ResourceOptions opts: Options for the resource.
452
- :param pulumi.Input[builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
451
+ :param pulumi.Input[_builtins.str] dn: Distinguished name (DN) of the existing LDAP entry to manage
453
452
  password rotation for. If given, it will take precedence over `username` for the LDAP
454
453
  search performed during password rotation. Cannot be modified after creation.
455
- :param pulumi.Input[builtins.str] mount: The unique path this backend should be mounted at. Must
454
+ :param pulumi.Input[_builtins.str] mount: The unique path this backend should be mounted at. Must
456
455
  not begin or end with a `/`. Defaults to `ldap`.
457
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
456
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
458
457
  The value should not contain leading or trailing forward slashes.
459
458
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
460
459
  *Available only for Vault Enterprise*.
461
- :param pulumi.Input[builtins.str] role_name: Name of the role.
462
- :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
463
- :param pulumi.Input[builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
460
+ :param pulumi.Input[_builtins.str] role_name: Name of the role.
461
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
462
+ :param pulumi.Input[_builtins.bool] skip_import_rotation: Causes vault to skip the initial secret rotation on import. Not applicable to updates.
464
463
  Requires Vault 1.16 or above.
465
- :param pulumi.Input[builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
464
+ :param pulumi.Input[_builtins.str] username: The username of the existing LDAP entry to manage password rotation for.
466
465
  """
467
466
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
468
467
 
@@ -477,9 +476,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
477
476
  __props__.__dict__["username"] = username
478
477
  return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
479
478
 
480
- @property
479
+ @_builtins.property
481
480
  @pulumi.getter
482
- def dn(self) -> pulumi.Output[Optional[builtins.str]]:
481
+ def dn(self) -> pulumi.Output[Optional[_builtins.str]]:
483
482
  """
484
483
  Distinguished name (DN) of the existing LDAP entry to manage
485
484
  password rotation for. If given, it will take precedence over `username` for the LDAP
@@ -487,18 +486,18 @@ class SecretBackendStaticRole(pulumi.CustomResource):
487
486
  """
488
487
  return pulumi.get(self, "dn")
489
488
 
490
- @property
489
+ @_builtins.property
491
490
  @pulumi.getter
492
- def mount(self) -> pulumi.Output[Optional[builtins.str]]:
491
+ def mount(self) -> pulumi.Output[Optional[_builtins.str]]:
493
492
  """
494
493
  The unique path this backend should be mounted at. Must
495
494
  not begin or end with a `/`. Defaults to `ldap`.
496
495
  """
497
496
  return pulumi.get(self, "mount")
498
497
 
499
- @property
498
+ @_builtins.property
500
499
  @pulumi.getter
501
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
500
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
502
501
  """
503
502
  The namespace to provision the resource in.
504
503
  The value should not contain leading or trailing forward slashes.
@@ -507,34 +506,34 @@ class SecretBackendStaticRole(pulumi.CustomResource):
507
506
  """
508
507
  return pulumi.get(self, "namespace")
509
508
 
510
- @property
509
+ @_builtins.property
511
510
  @pulumi.getter(name="roleName")
512
- def role_name(self) -> pulumi.Output[builtins.str]:
511
+ def role_name(self) -> pulumi.Output[_builtins.str]:
513
512
  """
514
513
  Name of the role.
515
514
  """
516
515
  return pulumi.get(self, "role_name")
517
516
 
518
- @property
517
+ @_builtins.property
519
518
  @pulumi.getter(name="rotationPeriod")
520
- def rotation_period(self) -> pulumi.Output[builtins.int]:
519
+ def rotation_period(self) -> pulumi.Output[_builtins.int]:
521
520
  """
522
521
  How often Vault should rotate the password of the user entry.
523
522
  """
524
523
  return pulumi.get(self, "rotation_period")
525
524
 
526
- @property
525
+ @_builtins.property
527
526
  @pulumi.getter(name="skipImportRotation")
528
- def skip_import_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
527
+ def skip_import_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
529
528
  """
530
529
  Causes vault to skip the initial secret rotation on import. Not applicable to updates.
531
530
  Requires Vault 1.16 or above.
532
531
  """
533
532
  return pulumi.get(self, "skip_import_rotation")
534
533
 
535
- @property
534
+ @_builtins.property
536
535
  @pulumi.getter
537
- def username(self) -> pulumi.Output[builtins.str]:
536
+ def username(self) -> pulumi.Output[_builtins.str]:
538
537
  """
539
538
  The username of the existing LDAP entry to manage password rotation for.
540
539
  """
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members: