pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,23 +21,23 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
22
21
  @pulumi.input_type
23
22
  class SecretBackendRoleArgs:
24
23
  def __init__(__self__, *,
25
- backend: pulumi.Input[builtins.str],
26
- name: Optional[pulumi.Input[builtins.str]] = None,
27
- namespace: Optional[pulumi.Input[builtins.str]] = None,
28
- tags: Optional[pulumi.Input[builtins.str]] = None,
24
+ backend: pulumi.Input[_builtins.str],
25
+ name: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
27
+ tags: Optional[pulumi.Input[_builtins.str]] = None,
29
28
  vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]] = None,
30
29
  vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]] = None):
31
30
  """
32
31
  The set of arguments for constructing a SecretBackendRole resource.
33
- :param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
32
+ :param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
34
33
  with no leading or trailing `/`s.
35
- :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
34
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
36
35
  Must be unique within the backend.
37
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
36
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
38
37
  The value should not contain leading or trailing forward slashes.
39
38
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
40
39
  *Available only for Vault Enterprise*.
41
- :param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
40
+ :param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
42
41
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
43
42
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
44
43
  """
@@ -54,9 +53,9 @@ class SecretBackendRoleArgs:
54
53
  if vhosts is not None:
55
54
  pulumi.set(__self__, "vhosts", vhosts)
56
55
 
57
- @property
56
+ @_builtins.property
58
57
  @pulumi.getter
59
- def backend(self) -> pulumi.Input[builtins.str]:
58
+ def backend(self) -> pulumi.Input[_builtins.str]:
60
59
  """
61
60
  The path the RabbitMQ secret backend is mounted at,
62
61
  with no leading or trailing `/`s.
@@ -64,12 +63,12 @@ class SecretBackendRoleArgs:
64
63
  return pulumi.get(self, "backend")
65
64
 
66
65
  @backend.setter
67
- def backend(self, value: pulumi.Input[builtins.str]):
66
+ def backend(self, value: pulumi.Input[_builtins.str]):
68
67
  pulumi.set(self, "backend", value)
69
68
 
70
- @property
69
+ @_builtins.property
71
70
  @pulumi.getter
72
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
71
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
73
72
  """
74
73
  The name to identify this role within the backend.
75
74
  Must be unique within the backend.
@@ -77,12 +76,12 @@ class SecretBackendRoleArgs:
77
76
  return pulumi.get(self, "name")
78
77
 
79
78
  @name.setter
80
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
79
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
81
80
  pulumi.set(self, "name", value)
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter
85
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
84
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
86
85
  """
87
86
  The namespace to provision the resource in.
88
87
  The value should not contain leading or trailing forward slashes.
@@ -92,22 +91,22 @@ class SecretBackendRoleArgs:
92
91
  return pulumi.get(self, "namespace")
93
92
 
94
93
  @namespace.setter
95
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
94
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
96
95
  pulumi.set(self, "namespace", value)
97
96
 
98
- @property
97
+ @_builtins.property
99
98
  @pulumi.getter
100
- def tags(self) -> Optional[pulumi.Input[builtins.str]]:
99
+ def tags(self) -> Optional[pulumi.Input[_builtins.str]]:
101
100
  """
102
101
  Specifies a comma-separated RabbitMQ management tags.
103
102
  """
104
103
  return pulumi.get(self, "tags")
105
104
 
106
105
  @tags.setter
107
- def tags(self, value: Optional[pulumi.Input[builtins.str]]):
106
+ def tags(self, value: Optional[pulumi.Input[_builtins.str]]):
108
107
  pulumi.set(self, "tags", value)
109
108
 
110
- @property
109
+ @_builtins.property
111
110
  @pulumi.getter(name="vhostTopics")
112
111
  def vhost_topics(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]:
113
112
  """
@@ -119,7 +118,7 @@ class SecretBackendRoleArgs:
119
118
  def vhost_topics(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]):
120
119
  pulumi.set(self, "vhost_topics", value)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter
124
123
  def vhosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]]:
125
124
  """
@@ -135,23 +134,23 @@ class SecretBackendRoleArgs:
135
134
  @pulumi.input_type
136
135
  class _SecretBackendRoleState:
137
136
  def __init__(__self__, *,
138
- backend: Optional[pulumi.Input[builtins.str]] = None,
139
- name: Optional[pulumi.Input[builtins.str]] = None,
140
- namespace: Optional[pulumi.Input[builtins.str]] = None,
141
- tags: Optional[pulumi.Input[builtins.str]] = None,
137
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
138
+ name: Optional[pulumi.Input[_builtins.str]] = None,
139
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
140
+ tags: Optional[pulumi.Input[_builtins.str]] = None,
142
141
  vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]] = None,
143
142
  vhosts: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]] = None):
144
143
  """
145
144
  Input properties used for looking up and filtering SecretBackendRole resources.
146
- :param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
145
+ :param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
147
146
  with no leading or trailing `/`s.
148
- :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
147
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
149
148
  Must be unique within the backend.
150
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
149
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
151
150
  The value should not contain leading or trailing forward slashes.
152
151
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
153
152
  *Available only for Vault Enterprise*.
154
- :param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
153
+ :param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
155
154
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
156
155
  :param pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]] vhosts: Specifies a map of virtual hosts to permissions.
157
156
  """
@@ -168,9 +167,9 @@ class _SecretBackendRoleState:
168
167
  if vhosts is not None:
169
168
  pulumi.set(__self__, "vhosts", vhosts)
170
169
 
171
- @property
170
+ @_builtins.property
172
171
  @pulumi.getter
173
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
172
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
174
173
  """
175
174
  The path the RabbitMQ secret backend is mounted at,
176
175
  with no leading or trailing `/`s.
@@ -178,12 +177,12 @@ class _SecretBackendRoleState:
178
177
  return pulumi.get(self, "backend")
179
178
 
180
179
  @backend.setter
181
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
180
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
182
181
  pulumi.set(self, "backend", value)
183
182
 
184
- @property
183
+ @_builtins.property
185
184
  @pulumi.getter
186
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
185
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
187
186
  """
188
187
  The name to identify this role within the backend.
189
188
  Must be unique within the backend.
@@ -191,12 +190,12 @@ class _SecretBackendRoleState:
191
190
  return pulumi.get(self, "name")
192
191
 
193
192
  @name.setter
194
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
193
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
195
194
  pulumi.set(self, "name", value)
196
195
 
197
- @property
196
+ @_builtins.property
198
197
  @pulumi.getter
199
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
198
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
200
199
  """
201
200
  The namespace to provision the resource in.
202
201
  The value should not contain leading or trailing forward slashes.
@@ -206,22 +205,22 @@ class _SecretBackendRoleState:
206
205
  return pulumi.get(self, "namespace")
207
206
 
208
207
  @namespace.setter
209
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
208
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
210
209
  pulumi.set(self, "namespace", value)
211
210
 
212
- @property
211
+ @_builtins.property
213
212
  @pulumi.getter
214
- def tags(self) -> Optional[pulumi.Input[builtins.str]]:
213
+ def tags(self) -> Optional[pulumi.Input[_builtins.str]]:
215
214
  """
216
215
  Specifies a comma-separated RabbitMQ management tags.
217
216
  """
218
217
  return pulumi.get(self, "tags")
219
218
 
220
219
  @tags.setter
221
- def tags(self, value: Optional[pulumi.Input[builtins.str]]):
220
+ def tags(self, value: Optional[pulumi.Input[_builtins.str]]):
222
221
  pulumi.set(self, "tags", value)
223
222
 
224
- @property
223
+ @_builtins.property
225
224
  @pulumi.getter(name="vhostTopics")
226
225
  def vhost_topics(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]:
227
226
  """
@@ -233,7 +232,7 @@ class _SecretBackendRoleState:
233
232
  def vhost_topics(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostTopicArgs']]]]):
234
233
  pulumi.set(self, "vhost_topics", value)
235
234
 
236
- @property
235
+ @_builtins.property
237
236
  @pulumi.getter
238
237
  def vhosts(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretBackendRoleVhostArgs']]]]:
239
238
  """
@@ -252,10 +251,10 @@ class SecretBackendRole(pulumi.CustomResource):
252
251
  def __init__(__self__,
253
252
  resource_name: str,
254
253
  opts: Optional[pulumi.ResourceOptions] = None,
255
- backend: Optional[pulumi.Input[builtins.str]] = None,
256
- name: Optional[pulumi.Input[builtins.str]] = None,
257
- namespace: Optional[pulumi.Input[builtins.str]] = None,
258
- tags: Optional[pulumi.Input[builtins.str]] = None,
254
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
255
+ name: Optional[pulumi.Input[_builtins.str]] = None,
256
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
257
+ tags: Optional[pulumi.Input[_builtins.str]] = None,
259
258
  vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
260
259
  vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
261
260
  __props__=None):
@@ -266,11 +265,11 @@ class SecretBackendRole(pulumi.CustomResource):
266
265
  import pulumi
267
266
  import pulumi_vault as vault
268
267
 
269
- rabbitmq = vault.rabbit_mq.SecretBackend("rabbitmq",
268
+ rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
270
269
  connection_uri="https://.....",
271
270
  username="user",
272
271
  password="password")
273
- role = vault.rabbit_mq.SecretBackendRole("role",
272
+ role = vault.rabbitmq.SecretBackendRole("role",
274
273
  backend=rabbitmq.path,
275
274
  name="deploy",
276
275
  tags="tag1,tag2",
@@ -300,15 +299,15 @@ class SecretBackendRole(pulumi.CustomResource):
300
299
 
301
300
  :param str resource_name: The name of the resource.
302
301
  :param pulumi.ResourceOptions opts: Options for the resource.
303
- :param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
302
+ :param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
304
303
  with no leading or trailing `/`s.
305
- :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
304
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
306
305
  Must be unique within the backend.
307
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
306
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
308
307
  The value should not contain leading or trailing forward slashes.
309
308
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
310
309
  *Available only for Vault Enterprise*.
311
- :param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
310
+ :param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
312
311
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
313
312
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
314
313
  """
@@ -325,11 +324,11 @@ class SecretBackendRole(pulumi.CustomResource):
325
324
  import pulumi
326
325
  import pulumi_vault as vault
327
326
 
328
- rabbitmq = vault.rabbit_mq.SecretBackend("rabbitmq",
327
+ rabbitmq = vault.rabbitmq.SecretBackend("rabbitmq",
329
328
  connection_uri="https://.....",
330
329
  username="user",
331
330
  password="password")
332
- role = vault.rabbit_mq.SecretBackendRole("role",
331
+ role = vault.rabbitmq.SecretBackendRole("role",
333
332
  backend=rabbitmq.path,
334
333
  name="deploy",
335
334
  tags="tag1,tag2",
@@ -372,10 +371,10 @@ class SecretBackendRole(pulumi.CustomResource):
372
371
  def _internal_init(__self__,
373
372
  resource_name: str,
374
373
  opts: Optional[pulumi.ResourceOptions] = None,
375
- backend: Optional[pulumi.Input[builtins.str]] = None,
376
- name: Optional[pulumi.Input[builtins.str]] = None,
377
- namespace: Optional[pulumi.Input[builtins.str]] = None,
378
- tags: Optional[pulumi.Input[builtins.str]] = None,
374
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
375
+ name: Optional[pulumi.Input[_builtins.str]] = None,
376
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
377
+ tags: Optional[pulumi.Input[_builtins.str]] = None,
379
378
  vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
380
379
  vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None,
381
380
  __props__=None):
@@ -405,10 +404,10 @@ class SecretBackendRole(pulumi.CustomResource):
405
404
  def get(resource_name: str,
406
405
  id: pulumi.Input[str],
407
406
  opts: Optional[pulumi.ResourceOptions] = None,
408
- backend: Optional[pulumi.Input[builtins.str]] = None,
409
- name: Optional[pulumi.Input[builtins.str]] = None,
410
- namespace: Optional[pulumi.Input[builtins.str]] = None,
411
- tags: Optional[pulumi.Input[builtins.str]] = None,
407
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
408
+ name: Optional[pulumi.Input[_builtins.str]] = None,
409
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
410
+ tags: Optional[pulumi.Input[_builtins.str]] = None,
412
411
  vhost_topics: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]]] = None,
413
412
  vhosts: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]]] = None) -> 'SecretBackendRole':
414
413
  """
@@ -418,15 +417,15 @@ class SecretBackendRole(pulumi.CustomResource):
418
417
  :param str resource_name: The unique name of the resulting resource.
419
418
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
420
419
  :param pulumi.ResourceOptions opts: Options for the resource.
421
- :param pulumi.Input[builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
420
+ :param pulumi.Input[_builtins.str] backend: The path the RabbitMQ secret backend is mounted at,
422
421
  with no leading or trailing `/`s.
423
- :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
422
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
424
423
  Must be unique within the backend.
425
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
424
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
426
425
  The value should not contain leading or trailing forward slashes.
427
426
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
428
427
  *Available only for Vault Enterprise*.
429
- :param pulumi.Input[builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
428
+ :param pulumi.Input[_builtins.str] tags: Specifies a comma-separated RabbitMQ management tags.
430
429
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostTopicArgs', 'SecretBackendRoleVhostTopicArgsDict']]]] vhost_topics: Specifies a map of virtual hosts and exchanges to topic permissions. This option requires RabbitMQ 3.7.0 or later.
431
430
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretBackendRoleVhostArgs', 'SecretBackendRoleVhostArgsDict']]]] vhosts: Specifies a map of virtual hosts to permissions.
432
431
  """
@@ -442,27 +441,27 @@ class SecretBackendRole(pulumi.CustomResource):
442
441
  __props__.__dict__["vhosts"] = vhosts
443
442
  return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
444
443
 
445
- @property
444
+ @_builtins.property
446
445
  @pulumi.getter
447
- def backend(self) -> pulumi.Output[builtins.str]:
446
+ def backend(self) -> pulumi.Output[_builtins.str]:
448
447
  """
449
448
  The path the RabbitMQ secret backend is mounted at,
450
449
  with no leading or trailing `/`s.
451
450
  """
452
451
  return pulumi.get(self, "backend")
453
452
 
454
- @property
453
+ @_builtins.property
455
454
  @pulumi.getter
456
- def name(self) -> pulumi.Output[builtins.str]:
455
+ def name(self) -> pulumi.Output[_builtins.str]:
457
456
  """
458
457
  The name to identify this role within the backend.
459
458
  Must be unique within the backend.
460
459
  """
461
460
  return pulumi.get(self, "name")
462
461
 
463
- @property
462
+ @_builtins.property
464
463
  @pulumi.getter
465
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
464
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
466
465
  """
467
466
  The namespace to provision the resource in.
468
467
  The value should not contain leading or trailing forward slashes.
@@ -471,15 +470,15 @@ class SecretBackendRole(pulumi.CustomResource):
471
470
  """
472
471
  return pulumi.get(self, "namespace")
473
472
 
474
- @property
473
+ @_builtins.property
475
474
  @pulumi.getter
476
- def tags(self) -> pulumi.Output[Optional[builtins.str]]:
475
+ def tags(self) -> pulumi.Output[Optional[_builtins.str]]:
477
476
  """
478
477
  Specifies a comma-separated RabbitMQ management tags.
479
478
  """
480
479
  return pulumi.get(self, "tags")
481
480
 
482
- @property
481
+ @_builtins.property
483
482
  @pulumi.getter(name="vhostTopics")
484
483
  def vhost_topics(self) -> pulumi.Output[Optional[Sequence['outputs.SecretBackendRoleVhostTopic']]]:
485
484
  """
@@ -487,7 +486,7 @@ class SecretBackendRole(pulumi.CustomResource):
487
486
  """
488
487
  return pulumi.get(self, "vhost_topics")
489
488
 
490
- @property
489
+ @_builtins.property
491
490
  @pulumi.getter
492
491
  def vhosts(self) -> pulumi.Output[Optional[Sequence['outputs.SecretBackendRoleVhost']]]:
493
492
  """