pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -47,46 +46,46 @@ class GetBackendKeysResult:
47
46
  raise TypeError("Expected argument 'namespace' to be a str")
48
47
  pulumi.set(__self__, "namespace", namespace)
49
48
 
50
- @property
49
+ @_builtins.property
51
50
  @pulumi.getter
52
- def backend(self) -> builtins.str:
51
+ def backend(self) -> _builtins.str:
53
52
  return pulumi.get(self, "backend")
54
53
 
55
- @property
54
+ @_builtins.property
56
55
  @pulumi.getter
57
- def id(self) -> builtins.str:
56
+ def id(self) -> _builtins.str:
58
57
  """
59
58
  The provider-assigned unique ID for this managed resource.
60
59
  """
61
60
  return pulumi.get(self, "id")
62
61
 
63
- @property
62
+ @_builtins.property
64
63
  @pulumi.getter(name="keyInfo")
65
- def key_info(self) -> Mapping[str, builtins.str]:
64
+ def key_info(self) -> Mapping[str, _builtins.str]:
66
65
  """
67
66
  Map of key strings read from Vault.
68
67
  """
69
68
  return pulumi.get(self, "key_info")
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter(name="keyInfoJson")
73
- def key_info_json(self) -> builtins.str:
72
+ def key_info_json(self) -> _builtins.str:
74
73
  """
75
74
  JSON-encoded key data read from Vault.
76
75
  """
77
76
  return pulumi.get(self, "key_info_json")
78
77
 
79
- @property
78
+ @_builtins.property
80
79
  @pulumi.getter
81
- def keys(self) -> Sequence[builtins.str]:
80
+ def keys(self) -> Sequence[_builtins.str]:
82
81
  """
83
82
  Keys used under the backend path.
84
83
  """
85
84
  return pulumi.get(self, "keys")
86
85
 
87
- @property
86
+ @_builtins.property
88
87
  @pulumi.getter
89
- def namespace(self) -> Optional[builtins.str]:
88
+ def namespace(self) -> Optional[_builtins.str]:
90
89
  return pulumi.get(self, "namespace")
91
90
 
92
91
 
@@ -104,8 +103,8 @@ class AwaitableGetBackendKeysResult(GetBackendKeysResult):
104
103
  namespace=self.namespace)
105
104
 
106
105
 
107
- def get_backend_keys(backend: Optional[builtins.str] = None,
108
- namespace: Optional[builtins.str] = None,
106
+ def get_backend_keys(backend: Optional[_builtins.str] = None,
107
+ namespace: Optional[_builtins.str] = None,
109
108
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetBackendKeysResult:
110
109
  """
111
110
  ## Example Usage
@@ -118,7 +117,7 @@ def get_backend_keys(backend: Optional[builtins.str] = None,
118
117
  path="pki",
119
118
  type="pki",
120
119
  description="PKI secret engine mount")
121
- root = vault.pki_secret.SecretBackendRootCert("root",
120
+ root = vault.pkisecret.SecretBackendRootCert("root",
122
121
  backend=pki.path,
123
122
  type="internal",
124
123
  common_name="example",
@@ -128,9 +127,9 @@ def get_backend_keys(backend: Optional[builtins.str] = None,
128
127
  ```
129
128
 
130
129
 
131
- :param builtins.str backend: The path to the PKI secret backend to
130
+ :param _builtins.str backend: The path to the PKI secret backend to
132
131
  read the keys from, with no leading or trailing `/`s.
133
- :param builtins.str namespace: The namespace of the target resource.
132
+ :param _builtins.str namespace: The namespace of the target resource.
134
133
  The value should not contain leading or trailing forward slashes.
135
134
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
136
135
  *Available only for Vault Enterprise*.
@@ -148,8 +147,8 @@ def get_backend_keys(backend: Optional[builtins.str] = None,
148
147
  key_info_json=pulumi.get(__ret__, 'key_info_json'),
149
148
  keys=pulumi.get(__ret__, 'keys'),
150
149
  namespace=pulumi.get(__ret__, 'namespace'))
151
- def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None,
152
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
150
+ def get_backend_keys_output(backend: Optional[pulumi.Input[_builtins.str]] = None,
151
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
153
152
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetBackendKeysResult]:
154
153
  """
155
154
  ## Example Usage
@@ -162,7 +161,7 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None
162
161
  path="pki",
163
162
  type="pki",
164
163
  description="PKI secret engine mount")
165
- root = vault.pki_secret.SecretBackendRootCert("root",
164
+ root = vault.pkisecret.SecretBackendRootCert("root",
166
165
  backend=pki.path,
167
166
  type="internal",
168
167
  common_name="example",
@@ -172,9 +171,9 @@ def get_backend_keys_output(backend: Optional[pulumi.Input[builtins.str]] = None
172
171
  ```
173
172
 
174
173
 
175
- :param builtins.str backend: The path to the PKI secret backend to
174
+ :param _builtins.str backend: The path to the PKI secret backend to
176
175
  read the keys from, with no leading or trailing `/`s.
177
- :param builtins.str namespace: The namespace of the target resource.
176
+ :param _builtins.str namespace: The namespace of the target resource.
178
177
  The value should not contain leading or trailing forward slashes.
179
178
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
180
179
  *Available only for Vault Enterprise*.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -30,16 +29,16 @@ __all__ = [
30
29
  @pulumi.output_type
31
30
  class BackendConfigCmpv2Authenticators(dict):
32
31
  def __init__(__self__, *,
33
- cert: Optional[Mapping[str, builtins.str]] = None):
32
+ cert: Optional[Mapping[str, _builtins.str]] = None):
34
33
  """
35
- :param Mapping[str, builtins.str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
34
+ :param Mapping[str, _builtins.str] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
36
35
  """
37
36
  if cert is not None:
38
37
  pulumi.set(__self__, "cert", cert)
39
38
 
40
- @property
39
+ @_builtins.property
41
40
  @pulumi.getter
42
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
41
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
43
42
  """
44
43
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
45
44
  """
@@ -49,28 +48,28 @@ class BackendConfigCmpv2Authenticators(dict):
49
48
  @pulumi.output_type
50
49
  class BackendConfigEstAuthenticators(dict):
51
50
  def __init__(__self__, *,
52
- cert: Optional[Mapping[str, builtins.str]] = None,
53
- userpass: Optional[Mapping[str, builtins.str]] = None):
51
+ cert: Optional[Mapping[str, _builtins.str]] = None,
52
+ userpass: Optional[Mapping[str, _builtins.str]] = None):
54
53
  """
55
- :param Mapping[str, builtins.str] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
56
- :param Mapping[str, builtins.str] userpass: The accessor (required) property for user pass auth backends.
54
+ :param Mapping[str, _builtins.str] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
55
+ :param Mapping[str, _builtins.str] userpass: The accessor (required) property for user pass auth backends.
57
56
  """
58
57
  if cert is not None:
59
58
  pulumi.set(__self__, "cert", cert)
60
59
  if userpass is not None:
61
60
  pulumi.set(__self__, "userpass", userpass)
62
61
 
63
- @property
62
+ @_builtins.property
64
63
  @pulumi.getter
65
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
64
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
66
65
  """
67
66
  The accessor (required) and cert_role (optional) properties for cert auth backends.
68
67
  """
69
68
  return pulumi.get(self, "cert")
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter
73
- def userpass(self) -> Optional[Mapping[str, builtins.str]]:
72
+ def userpass(self) -> Optional[Mapping[str, _builtins.str]]:
74
73
  """
75
74
  The accessor (required) property for user pass auth backends.
76
75
  """
@@ -80,28 +79,28 @@ class BackendConfigEstAuthenticators(dict):
80
79
  @pulumi.output_type
81
80
  class BackendConfigScepAuthenticators(dict):
82
81
  def __init__(__self__, *,
83
- cert: Optional[Mapping[str, builtins.str]] = None,
84
- scep: Optional[Mapping[str, builtins.str]] = None):
82
+ cert: Optional[Mapping[str, _builtins.str]] = None,
83
+ scep: Optional[Mapping[str, _builtins.str]] = None):
85
84
  """
86
- :param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends
87
- :param Mapping[str, builtins.str] scep: The accessor property for SCEP auth backends
85
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends
86
+ :param Mapping[str, _builtins.str] scep: The accessor property for SCEP auth backends
88
87
  """
89
88
  if cert is not None:
90
89
  pulumi.set(__self__, "cert", cert)
91
90
  if scep is not None:
92
91
  pulumi.set(__self__, "scep", scep)
93
92
 
94
- @property
93
+ @_builtins.property
95
94
  @pulumi.getter
96
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
95
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
97
96
  """
98
97
  The accessor and cert_role properties for cert auth backends
99
98
  """
100
99
  return pulumi.get(self, "cert")
101
100
 
102
- @property
101
+ @_builtins.property
103
102
  @pulumi.getter
104
- def scep(self) -> Optional[Mapping[str, builtins.str]]:
103
+ def scep(self) -> Optional[Mapping[str, _builtins.str]]:
105
104
  """
106
105
  The accessor property for SCEP auth backends
107
106
  """
@@ -111,16 +110,16 @@ class BackendConfigScepAuthenticators(dict):
111
110
  @pulumi.output_type
112
111
  class BackendConfigScepExternalValidation(dict):
113
112
  def __init__(__self__, *,
114
- intune: Optional[Mapping[str, builtins.str]] = None):
113
+ intune: Optional[Mapping[str, _builtins.str]] = None):
115
114
  """
116
- :param Mapping[str, builtins.str] intune: The credentials to enable Microsoft Intune validation of SCEP requests
115
+ :param Mapping[str, _builtins.str] intune: The credentials to enable Microsoft Intune validation of SCEP requests
117
116
  """
118
117
  if intune is not None:
119
118
  pulumi.set(__self__, "intune", intune)
120
119
 
121
- @property
120
+ @_builtins.property
122
121
  @pulumi.getter
123
- def intune(self) -> Optional[Mapping[str, builtins.str]]:
122
+ def intune(self) -> Optional[Mapping[str, _builtins.str]]:
124
123
  """
125
124
  The credentials to enable Microsoft Intune validation of SCEP requests
126
125
  """
@@ -130,13 +129,13 @@ class BackendConfigScepExternalValidation(dict):
130
129
  @pulumi.output_type
131
130
  class SecretBackendRolePolicyIdentifier(dict):
132
131
  def __init__(__self__, *,
133
- oid: builtins.str,
134
- cps: Optional[builtins.str] = None,
135
- notice: Optional[builtins.str] = None):
132
+ oid: _builtins.str,
133
+ cps: Optional[_builtins.str] = None,
134
+ notice: Optional[_builtins.str] = None):
136
135
  """
137
- :param builtins.str oid: The OID for the policy identifier
138
- :param builtins.str cps: The URL of the CPS for the policy identifier
139
- :param builtins.str notice: A notice for the policy identifier
136
+ :param _builtins.str oid: The OID for the policy identifier
137
+ :param _builtins.str cps: The URL of the CPS for the policy identifier
138
+ :param _builtins.str notice: A notice for the policy identifier
140
139
  """
141
140
  pulumi.set(__self__, "oid", oid)
142
141
  if cps is not None:
@@ -144,25 +143,25 @@ class SecretBackendRolePolicyIdentifier(dict):
144
143
  if notice is not None:
145
144
  pulumi.set(__self__, "notice", notice)
146
145
 
147
- @property
146
+ @_builtins.property
148
147
  @pulumi.getter
149
- def oid(self) -> builtins.str:
148
+ def oid(self) -> _builtins.str:
150
149
  """
151
150
  The OID for the policy identifier
152
151
  """
153
152
  return pulumi.get(self, "oid")
154
153
 
155
- @property
154
+ @_builtins.property
156
155
  @pulumi.getter
157
- def cps(self) -> Optional[builtins.str]:
156
+ def cps(self) -> Optional[_builtins.str]:
158
157
  """
159
158
  The URL of the CPS for the policy identifier
160
159
  """
161
160
  return pulumi.get(self, "cps")
162
161
 
163
- @property
162
+ @_builtins.property
164
163
  @pulumi.getter
165
- def notice(self) -> Optional[builtins.str]:
164
+ def notice(self) -> Optional[_builtins.str]:
166
165
  """
167
166
  A notice for the policy identifier
168
167
  """
@@ -172,16 +171,16 @@ class SecretBackendRolePolicyIdentifier(dict):
172
171
  @pulumi.output_type
173
172
  class GetBackendConfigCmpv2AuthenticatorResult(dict):
174
173
  def __init__(__self__, *,
175
- cert: Optional[Mapping[str, builtins.str]] = None):
174
+ cert: Optional[Mapping[str, _builtins.str]] = None):
176
175
  """
177
- :param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends
176
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends
178
177
  """
179
178
  if cert is not None:
180
179
  pulumi.set(__self__, "cert", cert)
181
180
 
182
- @property
181
+ @_builtins.property
183
182
  @pulumi.getter
184
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
183
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
185
184
  """
186
185
  The accessor and cert_role properties for cert auth backends
187
186
  """
@@ -191,28 +190,28 @@ class GetBackendConfigCmpv2AuthenticatorResult(dict):
191
190
  @pulumi.output_type
192
191
  class GetBackendConfigEstAuthenticatorResult(dict):
193
192
  def __init__(__self__, *,
194
- cert: Optional[Mapping[str, builtins.str]] = None,
195
- userpass: Optional[Mapping[str, builtins.str]] = None):
193
+ cert: Optional[Mapping[str, _builtins.str]] = None,
194
+ userpass: Optional[Mapping[str, _builtins.str]] = None):
196
195
  """
197
- :param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends.
198
- :param Mapping[str, builtins.str] userpass: The accessor property for user pass auth backends.
196
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends.
197
+ :param Mapping[str, _builtins.str] userpass: The accessor property for user pass auth backends.
199
198
  """
200
199
  if cert is not None:
201
200
  pulumi.set(__self__, "cert", cert)
202
201
  if userpass is not None:
203
202
  pulumi.set(__self__, "userpass", userpass)
204
203
 
205
- @property
204
+ @_builtins.property
206
205
  @pulumi.getter
207
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
206
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
208
207
  """
209
208
  The accessor and cert_role properties for cert auth backends.
210
209
  """
211
210
  return pulumi.get(self, "cert")
212
211
 
213
- @property
212
+ @_builtins.property
214
213
  @pulumi.getter
215
- def userpass(self) -> Optional[Mapping[str, builtins.str]]:
214
+ def userpass(self) -> Optional[Mapping[str, _builtins.str]]:
216
215
  """
217
216
  The accessor property for user pass auth backends.
218
217
  """
@@ -222,28 +221,28 @@ class GetBackendConfigEstAuthenticatorResult(dict):
222
221
  @pulumi.output_type
223
222
  class GetBackendConfigScepAuthenticatorResult(dict):
224
223
  def __init__(__self__, *,
225
- cert: Optional[Mapping[str, builtins.str]] = None,
226
- scep: Optional[Mapping[str, builtins.str]] = None):
224
+ cert: Optional[Mapping[str, _builtins.str]] = None,
225
+ scep: Optional[Mapping[str, _builtins.str]] = None):
227
226
  """
228
- :param Mapping[str, builtins.str] cert: The accessor and cert_role properties for cert auth backends.
229
- :param Mapping[str, builtins.str] scep: The accessor property for scep auth backends.
227
+ :param Mapping[str, _builtins.str] cert: The accessor and cert_role properties for cert auth backends.
228
+ :param Mapping[str, _builtins.str] scep: The accessor property for scep auth backends.
230
229
  """
231
230
  if cert is not None:
232
231
  pulumi.set(__self__, "cert", cert)
233
232
  if scep is not None:
234
233
  pulumi.set(__self__, "scep", scep)
235
234
 
236
- @property
235
+ @_builtins.property
237
236
  @pulumi.getter
238
- def cert(self) -> Optional[Mapping[str, builtins.str]]:
237
+ def cert(self) -> Optional[Mapping[str, _builtins.str]]:
239
238
  """
240
239
  The accessor and cert_role properties for cert auth backends.
241
240
  """
242
241
  return pulumi.get(self, "cert")
243
242
 
244
- @property
243
+ @_builtins.property
245
244
  @pulumi.getter
246
- def scep(self) -> Optional[Mapping[str, builtins.str]]:
245
+ def scep(self) -> Optional[Mapping[str, _builtins.str]]:
247
246
  """
248
247
  The accessor property for scep auth backends.
249
248
  """
@@ -253,16 +252,16 @@ class GetBackendConfigScepAuthenticatorResult(dict):
253
252
  @pulumi.output_type
254
253
  class GetBackendConfigScepExternalValidationResult(dict):
255
254
  def __init__(__self__, *,
256
- intune: Optional[Mapping[str, builtins.str]] = None):
255
+ intune: Optional[Mapping[str, _builtins.str]] = None):
257
256
  """
258
- :param Mapping[str, builtins.str] intune: The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
257
+ :param Mapping[str, _builtins.str] intune: The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
259
258
  """
260
259
  if intune is not None:
261
260
  pulumi.set(__self__, "intune", intune)
262
261
 
263
- @property
262
+ @_builtins.property
264
263
  @pulumi.getter
265
- def intune(self) -> Optional[Mapping[str, builtins.str]]:
264
+ def intune(self) -> Optional[Mapping[str, _builtins.str]]:
266
265
  """
267
266
  The tenant_id, client_id, client_secret and environment properties for Microsoft Intune validation of SCEP requests.
268
267
  """