pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -24,11 +23,11 @@ MYPY = False
24
23
 
25
24
  if not MYPY:
26
25
  class SecretBackendRoleAllowedUserKeyConfigArgsDict(TypedDict):
27
- lengths: pulumi.Input[Sequence[pulumi.Input[builtins.int]]]
26
+ lengths: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]
28
27
  """
29
28
  List of allowed key lengths, vault-1.10 and above
30
29
  """
31
- type: pulumi.Input[builtins.str]
30
+ type: pulumi.Input[_builtins.str]
32
31
  """
33
32
  Key type, choices:
34
33
  rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
@@ -39,31 +38,31 @@ elif False:
39
38
  @pulumi.input_type
40
39
  class SecretBackendRoleAllowedUserKeyConfigArgs:
41
40
  def __init__(__self__, *,
42
- lengths: pulumi.Input[Sequence[pulumi.Input[builtins.int]]],
43
- type: pulumi.Input[builtins.str]):
41
+ lengths: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]],
42
+ type: pulumi.Input[_builtins.str]):
44
43
  """
45
- :param pulumi.Input[Sequence[pulumi.Input[builtins.int]]] lengths: List of allowed key lengths, vault-1.10 and above
46
- :param pulumi.Input[builtins.str] type: Key type, choices:
44
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.int]]] lengths: List of allowed key lengths, vault-1.10 and above
45
+ :param pulumi.Input[_builtins.str] type: Key type, choices:
47
46
  rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
48
47
  """
49
48
  pulumi.set(__self__, "lengths", lengths)
50
49
  pulumi.set(__self__, "type", type)
51
50
 
52
- @property
51
+ @_builtins.property
53
52
  @pulumi.getter
54
- def lengths(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.int]]]:
53
+ def lengths(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]:
55
54
  """
56
55
  List of allowed key lengths, vault-1.10 and above
57
56
  """
58
57
  return pulumi.get(self, "lengths")
59
58
 
60
59
  @lengths.setter
61
- def lengths(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.int]]]):
60
+ def lengths(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.int]]]):
62
61
  pulumi.set(self, "lengths", value)
63
62
 
64
- @property
63
+ @_builtins.property
65
64
  @pulumi.getter
66
- def type(self) -> pulumi.Input[builtins.str]:
65
+ def type(self) -> pulumi.Input[_builtins.str]:
67
66
  """
68
67
  Key type, choices:
69
68
  rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
@@ -71,7 +70,7 @@ class SecretBackendRoleAllowedUserKeyConfigArgs:
71
70
  return pulumi.get(self, "type")
72
71
 
73
72
  @type.setter
74
- def type(self, value: pulumi.Input[builtins.str]):
73
+ def type(self, value: pulumi.Input[_builtins.str]):
75
74
  pulumi.set(self, "type", value)
76
75
 
77
76
 
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -68,78 +67,78 @@ class GetSecretBackendSignResult:
68
67
  raise TypeError("Expected argument 'valid_principals' to be a str")
69
68
  pulumi.set(__self__, "valid_principals", valid_principals)
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter(name="certType")
73
- def cert_type(self) -> Optional[builtins.str]:
72
+ def cert_type(self) -> Optional[_builtins.str]:
74
73
  return pulumi.get(self, "cert_type")
75
74
 
76
- @property
75
+ @_builtins.property
77
76
  @pulumi.getter(name="criticalOptions")
78
- def critical_options(self) -> Optional[Mapping[str, builtins.str]]:
77
+ def critical_options(self) -> Optional[Mapping[str, _builtins.str]]:
79
78
  return pulumi.get(self, "critical_options")
80
79
 
81
- @property
80
+ @_builtins.property
82
81
  @pulumi.getter
83
- def extensions(self) -> Optional[Mapping[str, builtins.str]]:
82
+ def extensions(self) -> Optional[Mapping[str, _builtins.str]]:
84
83
  return pulumi.get(self, "extensions")
85
84
 
86
- @property
85
+ @_builtins.property
87
86
  @pulumi.getter
88
- def id(self) -> builtins.str:
87
+ def id(self) -> _builtins.str:
89
88
  """
90
89
  The provider-assigned unique ID for this managed resource.
91
90
  """
92
91
  return pulumi.get(self, "id")
93
92
 
94
- @property
93
+ @_builtins.property
95
94
  @pulumi.getter(name="keyId")
96
- def key_id(self) -> Optional[builtins.str]:
95
+ def key_id(self) -> Optional[_builtins.str]:
97
96
  return pulumi.get(self, "key_id")
98
97
 
99
- @property
98
+ @_builtins.property
100
99
  @pulumi.getter
101
- def name(self) -> builtins.str:
100
+ def name(self) -> _builtins.str:
102
101
  return pulumi.get(self, "name")
103
102
 
104
- @property
103
+ @_builtins.property
105
104
  @pulumi.getter
106
- def namespace(self) -> Optional[builtins.str]:
105
+ def namespace(self) -> Optional[_builtins.str]:
107
106
  return pulumi.get(self, "namespace")
108
107
 
109
- @property
108
+ @_builtins.property
110
109
  @pulumi.getter
111
- def path(self) -> builtins.str:
110
+ def path(self) -> _builtins.str:
112
111
  return pulumi.get(self, "path")
113
112
 
114
- @property
113
+ @_builtins.property
115
114
  @pulumi.getter(name="publicKey")
116
- def public_key(self) -> builtins.str:
115
+ def public_key(self) -> _builtins.str:
117
116
  return pulumi.get(self, "public_key")
118
117
 
119
- @property
118
+ @_builtins.property
120
119
  @pulumi.getter(name="serialNumber")
121
- def serial_number(self) -> builtins.str:
120
+ def serial_number(self) -> _builtins.str:
122
121
  """
123
122
  The serial number of the certificate returned from Vault
124
123
  """
125
124
  return pulumi.get(self, "serial_number")
126
125
 
127
- @property
126
+ @_builtins.property
128
127
  @pulumi.getter(name="signedKey")
129
- def signed_key(self) -> builtins.str:
128
+ def signed_key(self) -> _builtins.str:
130
129
  """
131
130
  The signed certificate returned from Vault
132
131
  """
133
132
  return pulumi.get(self, "signed_key")
134
133
 
135
- @property
134
+ @_builtins.property
136
135
  @pulumi.getter
137
- def ttl(self) -> Optional[builtins.str]:
136
+ def ttl(self) -> Optional[_builtins.str]:
138
137
  return pulumi.get(self, "ttl")
139
138
 
140
- @property
139
+ @_builtins.property
141
140
  @pulumi.getter(name="validPrincipals")
142
- def valid_principals(self) -> Optional[builtins.str]:
141
+ def valid_principals(self) -> Optional[_builtins.str]:
143
142
  return pulumi.get(self, "valid_principals")
144
143
 
145
144
 
@@ -164,16 +163,16 @@ class AwaitableGetSecretBackendSignResult(GetSecretBackendSignResult):
164
163
  valid_principals=self.valid_principals)
165
164
 
166
165
 
167
- def get_secret_backend_sign(cert_type: Optional[builtins.str] = None,
168
- critical_options: Optional[Mapping[str, builtins.str]] = None,
169
- extensions: Optional[Mapping[str, builtins.str]] = None,
170
- key_id: Optional[builtins.str] = None,
171
- name: Optional[builtins.str] = None,
172
- namespace: Optional[builtins.str] = None,
173
- path: Optional[builtins.str] = None,
174
- public_key: Optional[builtins.str] = None,
175
- ttl: Optional[builtins.str] = None,
176
- valid_principals: Optional[builtins.str] = None,
166
+ def get_secret_backend_sign(cert_type: Optional[_builtins.str] = None,
167
+ critical_options: Optional[Mapping[str, _builtins.str]] = None,
168
+ extensions: Optional[Mapping[str, _builtins.str]] = None,
169
+ key_id: Optional[_builtins.str] = None,
170
+ name: Optional[_builtins.str] = None,
171
+ namespace: Optional[_builtins.str] = None,
172
+ path: Optional[_builtins.str] = None,
173
+ public_key: Optional[_builtins.str] = None,
174
+ ttl: Optional[_builtins.str] = None,
175
+ valid_principals: Optional[_builtins.str] = None,
177
176
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretBackendSignResult:
178
177
  """
179
178
  This is a data source which can be used to sign an SSH public key
@@ -191,15 +190,15 @@ def get_secret_backend_sign(cert_type: Optional[builtins.str] = None,
191
190
  ```
192
191
 
193
192
 
194
- :param builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
195
- :param Mapping[str, builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
196
- :param Mapping[str, builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
197
- :param builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
198
- :param builtins.str name: Specifies the name of the role to sign.
199
- :param builtins.str path: Full path where SSH backend is mounted.
200
- :param builtins.str public_key: Specifies the SSH public key that should be signed.
201
- :param builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
202
- :param builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
193
+ :param _builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
194
+ :param Mapping[str, _builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
195
+ :param Mapping[str, _builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
196
+ :param _builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
197
+ :param _builtins.str name: Specifies the name of the role to sign.
198
+ :param _builtins.str path: Full path where SSH backend is mounted.
199
+ :param _builtins.str public_key: Specifies the SSH public key that should be signed.
200
+ :param _builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
201
+ :param _builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
203
202
  """
204
203
  __args__ = dict()
205
204
  __args__['certType'] = cert_type
@@ -229,16 +228,16 @@ def get_secret_backend_sign(cert_type: Optional[builtins.str] = None,
229
228
  signed_key=pulumi.get(__ret__, 'signed_key'),
230
229
  ttl=pulumi.get(__ret__, 'ttl'),
231
230
  valid_principals=pulumi.get(__ret__, 'valid_principals'))
232
- def get_secret_backend_sign_output(cert_type: Optional[pulumi.Input[Optional[builtins.str]]] = None,
233
- critical_options: Optional[pulumi.Input[Optional[Mapping[str, builtins.str]]]] = None,
234
- extensions: Optional[pulumi.Input[Optional[Mapping[str, builtins.str]]]] = None,
235
- key_id: Optional[pulumi.Input[Optional[builtins.str]]] = None,
236
- name: Optional[pulumi.Input[builtins.str]] = None,
237
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
238
- path: Optional[pulumi.Input[builtins.str]] = None,
239
- public_key: Optional[pulumi.Input[builtins.str]] = None,
240
- ttl: Optional[pulumi.Input[Optional[builtins.str]]] = None,
241
- valid_principals: Optional[pulumi.Input[Optional[builtins.str]]] = None,
231
+ def get_secret_backend_sign_output(cert_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
232
+ critical_options: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
233
+ extensions: Optional[pulumi.Input[Optional[Mapping[str, _builtins.str]]]] = None,
234
+ key_id: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
235
+ name: Optional[pulumi.Input[_builtins.str]] = None,
236
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
237
+ path: Optional[pulumi.Input[_builtins.str]] = None,
238
+ public_key: Optional[pulumi.Input[_builtins.str]] = None,
239
+ ttl: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
240
+ valid_principals: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
242
241
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretBackendSignResult]:
243
242
  """
244
243
  This is a data source which can be used to sign an SSH public key
@@ -256,15 +255,15 @@ def get_secret_backend_sign_output(cert_type: Optional[pulumi.Input[Optional[bui
256
255
  ```
257
256
 
258
257
 
259
- :param builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
260
- :param Mapping[str, builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
261
- :param Mapping[str, builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
262
- :param builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
263
- :param builtins.str name: Specifies the name of the role to sign.
264
- :param builtins.str path: Full path where SSH backend is mounted.
265
- :param builtins.str public_key: Specifies the SSH public key that should be signed.
266
- :param builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
267
- :param builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
258
+ :param _builtins.str cert_type: Specifies the type of certificate to be created; either "user" or "host".
259
+ :param Mapping[str, _builtins.str] critical_options: Specifies a map of the critical options that the certificate should be signed for. Defaults to none.
260
+ :param Mapping[str, _builtins.str] extensions: Specifies a map of the extensions that the certificate should be signed for. Defaults to none.
261
+ :param _builtins.str key_id: Specifies the key id that the created certificate should have. If not specified, the display name of the token will be used.
262
+ :param _builtins.str name: Specifies the name of the role to sign.
263
+ :param _builtins.str path: Full path where SSH backend is mounted.
264
+ :param _builtins.str public_key: Specifies the SSH public key that should be signed.
265
+ :param _builtins.str ttl: Specifies the Requested Time To Live. Cannot be greater than the role's max_ttl value. If not provided, the role's ttl value will be used. Note that the role values default to system values if not explicitly set.
266
+ :param _builtins.str valid_principals: Specifies valid principals, either usernames or hostnames, that the certificate should be signed for. Required unless the role has specified allow_empty_principals or a value has been set for either the default_user or default_user_template role parameters.
268
267
  """
269
268
  __args__ = dict()
270
269
  __args__['certType'] = cert_type
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,27 +21,27 @@ __all__ = [
22
21
  @pulumi.output_type
23
22
  class SecretBackendRoleAllowedUserKeyConfig(dict):
24
23
  def __init__(__self__, *,
25
- lengths: Sequence[builtins.int],
26
- type: builtins.str):
24
+ lengths: Sequence[_builtins.int],
25
+ type: _builtins.str):
27
26
  """
28
- :param Sequence[builtins.int] lengths: List of allowed key lengths, vault-1.10 and above
29
- :param builtins.str type: Key type, choices:
27
+ :param Sequence[_builtins.int] lengths: List of allowed key lengths, vault-1.10 and above
28
+ :param _builtins.str type: Key type, choices:
30
29
  rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
31
30
  """
32
31
  pulumi.set(__self__, "lengths", lengths)
33
32
  pulumi.set(__self__, "type", type)
34
33
 
35
- @property
34
+ @_builtins.property
36
35
  @pulumi.getter
37
- def lengths(self) -> Sequence[builtins.int]:
36
+ def lengths(self) -> Sequence[_builtins.int]:
38
37
  """
39
38
  List of allowed key lengths, vault-1.10 and above
40
39
  """
41
40
  return pulumi.get(self, "lengths")
42
41
 
43
- @property
42
+ @_builtins.property
44
43
  @pulumi.getter
45
- def type(self) -> builtins.str:
44
+ def type(self) -> _builtins.str:
46
45
  """
47
46
  Key type, choices:
48
47
  rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521