pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,18 +19,18 @@ __all__ = ['EgpPolicyArgs', 'EgpPolicy']
20
19
  @pulumi.input_type
21
20
  class EgpPolicyArgs:
22
21
  def __init__(__self__, *,
23
- enforcement_level: pulumi.Input[builtins.str],
24
- paths: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
25
- policy: pulumi.Input[builtins.str],
26
- name: Optional[pulumi.Input[builtins.str]] = None,
27
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ enforcement_level: pulumi.Input[_builtins.str],
23
+ paths: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
24
+ policy: pulumi.Input[_builtins.str],
25
+ name: Optional[pulumi.Input[_builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
28
27
  """
29
28
  The set of arguments for constructing a EgpPolicy resource.
30
- :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
31
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
32
- :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
33
- :param pulumi.Input[builtins.str] name: The name of the policy
34
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
29
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
30
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
31
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
32
+ :param pulumi.Input[_builtins.str] name: The name of the policy
33
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
35
34
  The value should not contain leading or trailing forward slashes.
36
35
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
37
36
  *Available only for Vault Enterprise*.
@@ -44,57 +43,57 @@ class EgpPolicyArgs:
44
43
  if namespace is not None:
45
44
  pulumi.set(__self__, "namespace", namespace)
46
45
 
47
- @property
46
+ @_builtins.property
48
47
  @pulumi.getter(name="enforcementLevel")
49
- def enforcement_level(self) -> pulumi.Input[builtins.str]:
48
+ def enforcement_level(self) -> pulumi.Input[_builtins.str]:
50
49
  """
51
50
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
52
51
  """
53
52
  return pulumi.get(self, "enforcement_level")
54
53
 
55
54
  @enforcement_level.setter
56
- def enforcement_level(self, value: pulumi.Input[builtins.str]):
55
+ def enforcement_level(self, value: pulumi.Input[_builtins.str]):
57
56
  pulumi.set(self, "enforcement_level", value)
58
57
 
59
- @property
58
+ @_builtins.property
60
59
  @pulumi.getter
61
- def paths(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
60
+ def paths(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
62
61
  """
63
62
  List of paths to which the policy will be applied to
64
63
  """
65
64
  return pulumi.get(self, "paths")
66
65
 
67
66
  @paths.setter
68
- def paths(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
67
+ def paths(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
69
68
  pulumi.set(self, "paths", value)
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter
73
- def policy(self) -> pulumi.Input[builtins.str]:
72
+ def policy(self) -> pulumi.Input[_builtins.str]:
74
73
  """
75
74
  String containing a Sentinel policy
76
75
  """
77
76
  return pulumi.get(self, "policy")
78
77
 
79
78
  @policy.setter
80
- def policy(self, value: pulumi.Input[builtins.str]):
79
+ def policy(self, value: pulumi.Input[_builtins.str]):
81
80
  pulumi.set(self, "policy", value)
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter
85
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
84
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
86
85
  """
87
86
  The name of the policy
88
87
  """
89
88
  return pulumi.get(self, "name")
90
89
 
91
90
  @name.setter
92
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
91
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
93
92
  pulumi.set(self, "name", value)
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter
97
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
96
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
98
97
  """
99
98
  The namespace to provision the resource in.
100
99
  The value should not contain leading or trailing forward slashes.
@@ -104,28 +103,28 @@ class EgpPolicyArgs:
104
103
  return pulumi.get(self, "namespace")
105
104
 
106
105
  @namespace.setter
107
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
106
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
108
107
  pulumi.set(self, "namespace", value)
109
108
 
110
109
 
111
110
  @pulumi.input_type
112
111
  class _EgpPolicyState:
113
112
  def __init__(__self__, *,
114
- enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
115
- name: Optional[pulumi.Input[builtins.str]] = None,
116
- namespace: Optional[pulumi.Input[builtins.str]] = None,
117
- paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
118
- policy: Optional[pulumi.Input[builtins.str]] = None):
113
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
114
+ name: Optional[pulumi.Input[_builtins.str]] = None,
115
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
116
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
117
+ policy: Optional[pulumi.Input[_builtins.str]] = None):
119
118
  """
120
119
  Input properties used for looking up and filtering EgpPolicy resources.
121
- :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
122
- :param pulumi.Input[builtins.str] name: The name of the policy
123
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
120
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
121
+ :param pulumi.Input[_builtins.str] name: The name of the policy
122
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
124
123
  The value should not contain leading or trailing forward slashes.
125
124
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
126
125
  *Available only for Vault Enterprise*.
127
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
128
- :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
126
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
127
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
129
128
  """
130
129
  if enforcement_level is not None:
131
130
  pulumi.set(__self__, "enforcement_level", enforcement_level)
@@ -138,33 +137,33 @@ class _EgpPolicyState:
138
137
  if policy is not None:
139
138
  pulumi.set(__self__, "policy", policy)
140
139
 
141
- @property
140
+ @_builtins.property
142
141
  @pulumi.getter(name="enforcementLevel")
143
- def enforcement_level(self) -> Optional[pulumi.Input[builtins.str]]:
142
+ def enforcement_level(self) -> Optional[pulumi.Input[_builtins.str]]:
144
143
  """
145
144
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
146
145
  """
147
146
  return pulumi.get(self, "enforcement_level")
148
147
 
149
148
  @enforcement_level.setter
150
- def enforcement_level(self, value: Optional[pulumi.Input[builtins.str]]):
149
+ def enforcement_level(self, value: Optional[pulumi.Input[_builtins.str]]):
151
150
  pulumi.set(self, "enforcement_level", value)
152
151
 
153
- @property
152
+ @_builtins.property
154
153
  @pulumi.getter
155
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
154
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
156
155
  """
157
156
  The name of the policy
158
157
  """
159
158
  return pulumi.get(self, "name")
160
159
 
161
160
  @name.setter
162
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
161
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
163
162
  pulumi.set(self, "name", value)
164
163
 
165
- @property
164
+ @_builtins.property
166
165
  @pulumi.getter
167
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
166
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
168
167
  """
169
168
  The namespace to provision the resource in.
170
169
  The value should not contain leading or trailing forward slashes.
@@ -174,31 +173,31 @@ class _EgpPolicyState:
174
173
  return pulumi.get(self, "namespace")
175
174
 
176
175
  @namespace.setter
177
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
176
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
178
177
  pulumi.set(self, "namespace", value)
179
178
 
180
- @property
179
+ @_builtins.property
181
180
  @pulumi.getter
182
- def paths(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
181
+ def paths(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
183
182
  """
184
183
  List of paths to which the policy will be applied to
185
184
  """
186
185
  return pulumi.get(self, "paths")
187
186
 
188
187
  @paths.setter
189
- def paths(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
188
+ def paths(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
190
189
  pulumi.set(self, "paths", value)
191
190
 
192
- @property
191
+ @_builtins.property
193
192
  @pulumi.getter
194
- def policy(self) -> Optional[pulumi.Input[builtins.str]]:
193
+ def policy(self) -> Optional[pulumi.Input[_builtins.str]]:
195
194
  """
196
195
  String containing a Sentinel policy
197
196
  """
198
197
  return pulumi.get(self, "policy")
199
198
 
200
199
  @policy.setter
201
- def policy(self, value: Optional[pulumi.Input[builtins.str]]):
200
+ def policy(self, value: Optional[pulumi.Input[_builtins.str]]):
202
201
  pulumi.set(self, "policy", value)
203
202
 
204
203
 
@@ -208,11 +207,11 @@ class EgpPolicy(pulumi.CustomResource):
208
207
  def __init__(__self__,
209
208
  resource_name: str,
210
209
  opts: Optional[pulumi.ResourceOptions] = None,
211
- enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
212
- name: Optional[pulumi.Input[builtins.str]] = None,
213
- namespace: Optional[pulumi.Input[builtins.str]] = None,
214
- paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
215
- policy: Optional[pulumi.Input[builtins.str]] = None,
210
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
211
+ name: Optional[pulumi.Input[_builtins.str]] = None,
212
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
213
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
214
+ policy: Optional[pulumi.Input[_builtins.str]] = None,
216
215
  __props__=None):
217
216
  """
218
217
  Provides a resource to manage Endpoint Governing Policy (EGP) via [Sentinel](https://www.vaultproject.io/docs/enterprise/sentinel/index.html).
@@ -237,14 +236,14 @@ class EgpPolicy(pulumi.CustomResource):
237
236
 
238
237
  :param str resource_name: The name of the resource.
239
238
  :param pulumi.ResourceOptions opts: Options for the resource.
240
- :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
241
- :param pulumi.Input[builtins.str] name: The name of the policy
242
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
239
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
240
+ :param pulumi.Input[_builtins.str] name: The name of the policy
241
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
243
242
  The value should not contain leading or trailing forward slashes.
244
243
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
245
244
  *Available only for Vault Enterprise*.
246
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
247
- :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
245
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
246
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
248
247
  """
249
248
  ...
250
249
  @overload
@@ -288,11 +287,11 @@ class EgpPolicy(pulumi.CustomResource):
288
287
  def _internal_init(__self__,
289
288
  resource_name: str,
290
289
  opts: Optional[pulumi.ResourceOptions] = None,
291
- enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
292
- name: Optional[pulumi.Input[builtins.str]] = None,
293
- namespace: Optional[pulumi.Input[builtins.str]] = None,
294
- paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
295
- policy: Optional[pulumi.Input[builtins.str]] = None,
290
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
291
+ name: Optional[pulumi.Input[_builtins.str]] = None,
292
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
293
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
294
+ policy: Optional[pulumi.Input[_builtins.str]] = None,
296
295
  __props__=None):
297
296
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
298
297
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -323,11 +322,11 @@ class EgpPolicy(pulumi.CustomResource):
323
322
  def get(resource_name: str,
324
323
  id: pulumi.Input[str],
325
324
  opts: Optional[pulumi.ResourceOptions] = None,
326
- enforcement_level: Optional[pulumi.Input[builtins.str]] = None,
327
- name: Optional[pulumi.Input[builtins.str]] = None,
328
- namespace: Optional[pulumi.Input[builtins.str]] = None,
329
- paths: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
330
- policy: Optional[pulumi.Input[builtins.str]] = None) -> 'EgpPolicy':
325
+ enforcement_level: Optional[pulumi.Input[_builtins.str]] = None,
326
+ name: Optional[pulumi.Input[_builtins.str]] = None,
327
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
328
+ paths: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
329
+ policy: Optional[pulumi.Input[_builtins.str]] = None) -> 'EgpPolicy':
331
330
  """
332
331
  Get an existing EgpPolicy resource's state with the given name, id, and optional extra
333
332
  properties used to qualify the lookup.
@@ -335,14 +334,14 @@ class EgpPolicy(pulumi.CustomResource):
335
334
  :param str resource_name: The unique name of the resulting resource.
336
335
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
337
336
  :param pulumi.ResourceOptions opts: Options for the resource.
338
- :param pulumi.Input[builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
339
- :param pulumi.Input[builtins.str] name: The name of the policy
340
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
337
+ :param pulumi.Input[_builtins.str] enforcement_level: Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
338
+ :param pulumi.Input[_builtins.str] name: The name of the policy
339
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
341
340
  The value should not contain leading or trailing forward slashes.
342
341
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
343
342
  *Available only for Vault Enterprise*.
344
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] paths: List of paths to which the policy will be applied to
345
- :param pulumi.Input[builtins.str] policy: String containing a Sentinel policy
343
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] paths: List of paths to which the policy will be applied to
344
+ :param pulumi.Input[_builtins.str] policy: String containing a Sentinel policy
346
345
  """
347
346
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
348
347
 
@@ -355,25 +354,25 @@ class EgpPolicy(pulumi.CustomResource):
355
354
  __props__.__dict__["policy"] = policy
356
355
  return EgpPolicy(resource_name, opts=opts, __props__=__props__)
357
356
 
358
- @property
357
+ @_builtins.property
359
358
  @pulumi.getter(name="enforcementLevel")
360
- def enforcement_level(self) -> pulumi.Output[builtins.str]:
359
+ def enforcement_level(self) -> pulumi.Output[_builtins.str]:
361
360
  """
362
361
  Enforcement level of Sentinel policy. Can be either `advisory` or `soft-mandatory` or `hard-mandatory`
363
362
  """
364
363
  return pulumi.get(self, "enforcement_level")
365
364
 
366
- @property
365
+ @_builtins.property
367
366
  @pulumi.getter
368
- def name(self) -> pulumi.Output[builtins.str]:
367
+ def name(self) -> pulumi.Output[_builtins.str]:
369
368
  """
370
369
  The name of the policy
371
370
  """
372
371
  return pulumi.get(self, "name")
373
372
 
374
- @property
373
+ @_builtins.property
375
374
  @pulumi.getter
376
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
375
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
377
376
  """
378
377
  The namespace to provision the resource in.
379
378
  The value should not contain leading or trailing forward slashes.
@@ -382,17 +381,17 @@ class EgpPolicy(pulumi.CustomResource):
382
381
  """
383
382
  return pulumi.get(self, "namespace")
384
383
 
385
- @property
384
+ @_builtins.property
386
385
  @pulumi.getter
387
- def paths(self) -> pulumi.Output[Sequence[builtins.str]]:
386
+ def paths(self) -> pulumi.Output[Sequence[_builtins.str]]:
388
387
  """
389
388
  List of paths to which the policy will be applied to
390
389
  """
391
390
  return pulumi.get(self, "paths")
392
391
 
393
- @property
392
+ @_builtins.property
394
393
  @pulumi.getter
395
- def policy(self) -> pulumi.Output[builtins.str]:
394
+ def policy(self) -> pulumi.Output[_builtins.str]:
396
395
  """
397
396
  String containing a Sentinel policy
398
397
  """
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members: