pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -92,88 +91,88 @@ class GetAuthBackendRoleResult:
92
91
  raise TypeError("Expected argument 'type' to be a str")
93
92
  pulumi.set(__self__, "type", type)
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter
97
- def backend(self) -> Optional[builtins.str]:
96
+ def backend(self) -> Optional[_builtins.str]:
98
97
  return pulumi.get(self, "backend")
99
98
 
100
- @property
99
+ @_builtins.property
101
100
  @pulumi.getter(name="boundInstanceGroups")
102
- def bound_instance_groups(self) -> Sequence[builtins.str]:
101
+ def bound_instance_groups(self) -> Sequence[_builtins.str]:
103
102
  """
104
103
  GCP regions bound to the role. Returned when `type` is `gce`.
105
104
  """
106
105
  return pulumi.get(self, "bound_instance_groups")
107
106
 
108
- @property
107
+ @_builtins.property
109
108
  @pulumi.getter(name="boundLabels")
110
- def bound_labels(self) -> Sequence[builtins.str]:
109
+ def bound_labels(self) -> Sequence[_builtins.str]:
111
110
  """
112
111
  GCP labels bound to the role. Returned when `type` is `gce`.
113
112
  """
114
113
  return pulumi.get(self, "bound_labels")
115
114
 
116
- @property
115
+ @_builtins.property
117
116
  @pulumi.getter(name="boundProjects")
118
- def bound_projects(self) -> Sequence[builtins.str]:
117
+ def bound_projects(self) -> Sequence[_builtins.str]:
119
118
  """
120
119
  GCP projects bound to the role.
121
120
  """
122
121
  return pulumi.get(self, "bound_projects")
123
122
 
124
- @property
123
+ @_builtins.property
125
124
  @pulumi.getter(name="boundRegions")
126
- def bound_regions(self) -> Sequence[builtins.str]:
125
+ def bound_regions(self) -> Sequence[_builtins.str]:
127
126
  """
128
127
  GCP regions bound to the role. Returned when `type` is `gce`.
129
128
  """
130
129
  return pulumi.get(self, "bound_regions")
131
130
 
132
- @property
131
+ @_builtins.property
133
132
  @pulumi.getter(name="boundServiceAccounts")
134
- def bound_service_accounts(self) -> Sequence[builtins.str]:
133
+ def bound_service_accounts(self) -> Sequence[_builtins.str]:
135
134
  """
136
135
  GCP service accounts bound to the role. Returned when `type` is `iam`.
137
136
  """
138
137
  return pulumi.get(self, "bound_service_accounts")
139
138
 
140
- @property
139
+ @_builtins.property
141
140
  @pulumi.getter(name="boundZones")
142
- def bound_zones(self) -> Sequence[builtins.str]:
141
+ def bound_zones(self) -> Sequence[_builtins.str]:
143
142
  """
144
143
  GCP zones bound to the role. Returned when `type` is `gce`.
145
144
  """
146
145
  return pulumi.get(self, "bound_zones")
147
146
 
148
- @property
147
+ @_builtins.property
149
148
  @pulumi.getter
150
- def id(self) -> builtins.str:
149
+ def id(self) -> _builtins.str:
151
150
  """
152
151
  The provider-assigned unique ID for this managed resource.
153
152
  """
154
153
  return pulumi.get(self, "id")
155
154
 
156
- @property
155
+ @_builtins.property
157
156
  @pulumi.getter
158
- def namespace(self) -> Optional[builtins.str]:
157
+ def namespace(self) -> Optional[_builtins.str]:
159
158
  return pulumi.get(self, "namespace")
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter(name="roleId")
163
- def role_id(self) -> builtins.str:
162
+ def role_id(self) -> _builtins.str:
164
163
  """
165
164
  The RoleID of the GCP role.
166
165
  """
167
166
  return pulumi.get(self, "role_id")
168
167
 
169
- @property
168
+ @_builtins.property
170
169
  @pulumi.getter(name="roleName")
171
- def role_name(self) -> builtins.str:
170
+ def role_name(self) -> _builtins.str:
172
171
  return pulumi.get(self, "role_name")
173
172
 
174
- @property
173
+ @_builtins.property
175
174
  @pulumi.getter(name="tokenBoundCidrs")
176
- def token_bound_cidrs(self) -> Optional[Sequence[builtins.str]]:
175
+ def token_bound_cidrs(self) -> Optional[Sequence[_builtins.str]]:
177
176
  """
178
177
  List of CIDR blocks; if set, specifies blocks of IP
179
178
  addresses which can authenticate successfully, and ties the resulting token to these blocks
@@ -181,9 +180,9 @@ class GetAuthBackendRoleResult:
181
180
  """
182
181
  return pulumi.get(self, "token_bound_cidrs")
183
182
 
184
- @property
183
+ @_builtins.property
185
184
  @pulumi.getter(name="tokenExplicitMaxTtl")
186
- def token_explicit_max_ttl(self) -> Optional[builtins.int]:
185
+ def token_explicit_max_ttl(self) -> Optional[_builtins.int]:
187
186
  """
188
187
  If set, will encode an
189
188
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
@@ -192,27 +191,27 @@ class GetAuthBackendRoleResult:
192
191
  """
193
192
  return pulumi.get(self, "token_explicit_max_ttl")
194
193
 
195
- @property
194
+ @_builtins.property
196
195
  @pulumi.getter(name="tokenMaxTtl")
197
- def token_max_ttl(self) -> Optional[builtins.int]:
196
+ def token_max_ttl(self) -> Optional[_builtins.int]:
198
197
  """
199
198
  The maximum lifetime for generated tokens in number of seconds.
200
199
  Its current value will be referenced at renewal time.
201
200
  """
202
201
  return pulumi.get(self, "token_max_ttl")
203
202
 
204
- @property
203
+ @_builtins.property
205
204
  @pulumi.getter(name="tokenNoDefaultPolicy")
206
- def token_no_default_policy(self) -> Optional[builtins.bool]:
205
+ def token_no_default_policy(self) -> Optional[_builtins.bool]:
207
206
  """
208
207
  If set, the default policy will not be set on
209
208
  generated tokens; otherwise it will be added to the policies set in token_policies.
210
209
  """
211
210
  return pulumi.get(self, "token_no_default_policy")
212
211
 
213
- @property
212
+ @_builtins.property
214
213
  @pulumi.getter(name="tokenNumUses")
215
- def token_num_uses(self) -> Optional[builtins.int]:
214
+ def token_num_uses(self) -> Optional[_builtins.int]:
216
215
  """
217
216
  The
218
217
  [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
@@ -220,9 +219,9 @@ class GetAuthBackendRoleResult:
220
219
  """
221
220
  return pulumi.get(self, "token_num_uses")
222
221
 
223
- @property
222
+ @_builtins.property
224
223
  @pulumi.getter(name="tokenPeriod")
225
- def token_period(self) -> Optional[builtins.int]:
224
+ def token_period(self) -> Optional[_builtins.int]:
226
225
  """
227
226
  (Optional) If set, indicates that the
228
227
  token generated using this role should never expire. The token should be renewed within the
@@ -231,27 +230,27 @@ class GetAuthBackendRoleResult:
231
230
  """
232
231
  return pulumi.get(self, "token_period")
233
232
 
234
- @property
233
+ @_builtins.property
235
234
  @pulumi.getter(name="tokenPolicies")
236
- def token_policies(self) -> Optional[Sequence[builtins.str]]:
235
+ def token_policies(self) -> Optional[Sequence[_builtins.str]]:
237
236
  """
238
237
  List of policies to encode onto generated tokens. Depending
239
238
  on the auth method, this list may be supplemented by user/group/other values.
240
239
  """
241
240
  return pulumi.get(self, "token_policies")
242
241
 
243
- @property
242
+ @_builtins.property
244
243
  @pulumi.getter(name="tokenTtl")
245
- def token_ttl(self) -> Optional[builtins.int]:
244
+ def token_ttl(self) -> Optional[_builtins.int]:
246
245
  """
247
246
  The incremental lifetime for generated tokens in number of seconds.
248
247
  Its current value will be referenced at renewal time.
249
248
  """
250
249
  return pulumi.get(self, "token_ttl")
251
250
 
252
- @property
251
+ @_builtins.property
253
252
  @pulumi.getter(name="tokenType")
254
- def token_type(self) -> Optional[builtins.str]:
253
+ def token_type(self) -> Optional[_builtins.str]:
255
254
  """
256
255
  The type of token that should be generated. Can be `service`,
257
256
  `batch`, or `default` to use the mount's tuned default (which unless changed will be
@@ -261,9 +260,9 @@ class GetAuthBackendRoleResult:
261
260
  """
262
261
  return pulumi.get(self, "token_type")
263
262
 
264
- @property
263
+ @_builtins.property
265
264
  @pulumi.getter
266
- def type(self) -> builtins.str:
265
+ def type(self) -> _builtins.str:
267
266
  """
268
267
  Type of GCP role. Expected values are `iam` or `gce`.
269
268
  """
@@ -299,18 +298,18 @@ class AwaitableGetAuthBackendRoleResult(GetAuthBackendRoleResult):
299
298
  type=self.type)
300
299
 
301
300
 
302
- def get_auth_backend_role(backend: Optional[builtins.str] = None,
303
- namespace: Optional[builtins.str] = None,
304
- role_name: Optional[builtins.str] = None,
305
- token_bound_cidrs: Optional[Sequence[builtins.str]] = None,
306
- token_explicit_max_ttl: Optional[builtins.int] = None,
307
- token_max_ttl: Optional[builtins.int] = None,
308
- token_no_default_policy: Optional[builtins.bool] = None,
309
- token_num_uses: Optional[builtins.int] = None,
310
- token_period: Optional[builtins.int] = None,
311
- token_policies: Optional[Sequence[builtins.str]] = None,
312
- token_ttl: Optional[builtins.int] = None,
313
- token_type: Optional[builtins.str] = None,
301
+ def get_auth_backend_role(backend: Optional[_builtins.str] = None,
302
+ namespace: Optional[_builtins.str] = None,
303
+ role_name: Optional[_builtins.str] = None,
304
+ token_bound_cidrs: Optional[Sequence[_builtins.str]] = None,
305
+ token_explicit_max_ttl: Optional[_builtins.int] = None,
306
+ token_max_ttl: Optional[_builtins.int] = None,
307
+ token_no_default_policy: Optional[_builtins.bool] = None,
308
+ token_num_uses: Optional[_builtins.int] = None,
309
+ token_period: Optional[_builtins.int] = None,
310
+ token_policies: Optional[Sequence[_builtins.str]] = None,
311
+ token_ttl: Optional[_builtins.int] = None,
312
+ token_type: Optional[_builtins.str] = None,
314
313
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetAuthBackendRoleResult:
315
314
  """
316
315
  Reads a GCP auth role from a Vault server.
@@ -327,35 +326,35 @@ def get_auth_backend_role(backend: Optional[builtins.str] = None,
327
326
  ```
328
327
 
329
328
 
330
- :param builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
331
- :param builtins.str namespace: The namespace of the target resource.
329
+ :param _builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
330
+ :param _builtins.str namespace: The namespace of the target resource.
332
331
  The value should not contain leading or trailing forward slashes.
333
332
  The `namespace` is always relative to the provider's configured namespace.
334
333
  *Available only for Vault Enterprise*.
335
- :param builtins.str role_name: The name of the role to retrieve the Role ID for.
336
- :param Sequence[builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
334
+ :param _builtins.str role_name: The name of the role to retrieve the Role ID for.
335
+ :param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
337
336
  addresses which can authenticate successfully, and ties the resulting token to these blocks
338
337
  as well.
339
- :param builtins.int token_explicit_max_ttl: If set, will encode an
338
+ :param _builtins.int token_explicit_max_ttl: If set, will encode an
340
339
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
341
340
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
342
341
  `token_max_ttl` would otherwise allow a renewal.
343
- :param builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
342
+ :param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
344
343
  Its current value will be referenced at renewal time.
345
- :param builtins.bool token_no_default_policy: If set, the default policy will not be set on
344
+ :param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
346
345
  generated tokens; otherwise it will be added to the policies set in token_policies.
347
- :param builtins.int token_num_uses: The
346
+ :param _builtins.int token_num_uses: The
348
347
  [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
349
348
  if any, in number of seconds to set on the token.
350
- :param builtins.int token_period: (Optional) If set, indicates that the
349
+ :param _builtins.int token_period: (Optional) If set, indicates that the
351
350
  token generated using this role should never expire. The token should be renewed within the
352
351
  duration specified by this value. At each renewal, the token's TTL will be set to the
353
352
  value of this field. Specified in seconds.
354
- :param Sequence[builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
353
+ :param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
355
354
  on the auth method, this list may be supplemented by user/group/other values.
356
- :param builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
355
+ :param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
357
356
  Its current value will be referenced at renewal time.
358
- :param builtins.str token_type: The type of token that should be generated. Can be `service`,
357
+ :param _builtins.str token_type: The type of token that should be generated. Can be `service`,
359
358
  `batch`, or `default` to use the mount's tuned default (which unless changed will be
360
359
  `service` tokens). For token store roles, there are two additional possibilities:
361
360
  `default-service` and `default-batch` which specify the type to return unless the client
@@ -399,18 +398,18 @@ def get_auth_backend_role(backend: Optional[builtins.str] = None,
399
398
  token_ttl=pulumi.get(__ret__, 'token_ttl'),
400
399
  token_type=pulumi.get(__ret__, 'token_type'),
401
400
  type=pulumi.get(__ret__, 'type'))
402
- def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[builtins.str]]] = None,
403
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
404
- role_name: Optional[pulumi.Input[builtins.str]] = None,
405
- token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
406
- token_explicit_max_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
407
- token_max_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
408
- token_no_default_policy: Optional[pulumi.Input[Optional[builtins.bool]]] = None,
409
- token_num_uses: Optional[pulumi.Input[Optional[builtins.int]]] = None,
410
- token_period: Optional[pulumi.Input[Optional[builtins.int]]] = None,
411
- token_policies: Optional[pulumi.Input[Optional[Sequence[builtins.str]]]] = None,
412
- token_ttl: Optional[pulumi.Input[Optional[builtins.int]]] = None,
413
- token_type: Optional[pulumi.Input[Optional[builtins.str]]] = None,
401
+ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
402
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
403
+ role_name: Optional[pulumi.Input[_builtins.str]] = None,
404
+ token_bound_cidrs: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
405
+ token_explicit_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
406
+ token_max_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
407
+ token_no_default_policy: Optional[pulumi.Input[Optional[_builtins.bool]]] = None,
408
+ token_num_uses: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
409
+ token_period: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
410
+ token_policies: Optional[pulumi.Input[Optional[Sequence[_builtins.str]]]] = None,
411
+ token_ttl: Optional[pulumi.Input[Optional[_builtins.int]]] = None,
412
+ token_type: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
414
413
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetAuthBackendRoleResult]:
415
414
  """
416
415
  Reads a GCP auth role from a Vault server.
@@ -427,35 +426,35 @@ def get_auth_backend_role_output(backend: Optional[pulumi.Input[Optional[builtin
427
426
  ```
428
427
 
429
428
 
430
- :param builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
431
- :param builtins.str namespace: The namespace of the target resource.
429
+ :param _builtins.str backend: The unique name for the GCP backend from which to fetch the role. Defaults to "gcp".
430
+ :param _builtins.str namespace: The namespace of the target resource.
432
431
  The value should not contain leading or trailing forward slashes.
433
432
  The `namespace` is always relative to the provider's configured namespace.
434
433
  *Available only for Vault Enterprise*.
435
- :param builtins.str role_name: The name of the role to retrieve the Role ID for.
436
- :param Sequence[builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
434
+ :param _builtins.str role_name: The name of the role to retrieve the Role ID for.
435
+ :param Sequence[_builtins.str] token_bound_cidrs: List of CIDR blocks; if set, specifies blocks of IP
437
436
  addresses which can authenticate successfully, and ties the resulting token to these blocks
438
437
  as well.
439
- :param builtins.int token_explicit_max_ttl: If set, will encode an
438
+ :param _builtins.int token_explicit_max_ttl: If set, will encode an
440
439
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
441
440
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
442
441
  `token_max_ttl` would otherwise allow a renewal.
443
- :param builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
442
+ :param _builtins.int token_max_ttl: The maximum lifetime for generated tokens in number of seconds.
444
443
  Its current value will be referenced at renewal time.
445
- :param builtins.bool token_no_default_policy: If set, the default policy will not be set on
444
+ :param _builtins.bool token_no_default_policy: If set, the default policy will not be set on
446
445
  generated tokens; otherwise it will be added to the policies set in token_policies.
447
- :param builtins.int token_num_uses: The
446
+ :param _builtins.int token_num_uses: The
448
447
  [period](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls),
449
448
  if any, in number of seconds to set on the token.
450
- :param builtins.int token_period: (Optional) If set, indicates that the
449
+ :param _builtins.int token_period: (Optional) If set, indicates that the
451
450
  token generated using this role should never expire. The token should be renewed within the
452
451
  duration specified by this value. At each renewal, the token's TTL will be set to the
453
452
  value of this field. Specified in seconds.
454
- :param Sequence[builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
453
+ :param Sequence[_builtins.str] token_policies: List of policies to encode onto generated tokens. Depending
455
454
  on the auth method, this list may be supplemented by user/group/other values.
456
- :param builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
455
+ :param _builtins.int token_ttl: The incremental lifetime for generated tokens in number of seconds.
457
456
  Its current value will be referenced at renewal time.
458
- :param builtins.str token_type: The type of token that should be generated. Can be `service`,
457
+ :param _builtins.str token_type: The type of token that should be generated. Can be `service`,
459
458
  `batch`, or `default` to use the mount's tuned default (which unless changed will be
460
459
  `service` tokens). For token store roles, there are two additional possibilities:
461
460
  `default-service` and `default-batch` which specify the type to return unless the client