pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,25 +19,25 @@ __all__ = ['OidcKeyArgs', 'OidcKey']
20
19
  @pulumi.input_type
21
20
  class OidcKeyArgs:
22
21
  def __init__(__self__, *,
23
- algorithm: Optional[pulumi.Input[builtins.str]] = None,
24
- allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
25
- name: Optional[pulumi.Input[builtins.str]] = None,
26
- namespace: Optional[pulumi.Input[builtins.str]] = None,
27
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
28
- verification_ttl: Optional[pulumi.Input[builtins.int]] = None):
22
+ algorithm: Optional[pulumi.Input[_builtins.str]] = None,
23
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ name: Optional[pulumi.Input[_builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
27
+ verification_ttl: Optional[pulumi.Input[_builtins.int]] = None):
29
28
  """
30
29
  The set of arguments for constructing a OidcKey resource.
31
- :param pulumi.Input[builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
30
+ :param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
32
31
  Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
33
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
32
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
34
33
  empty, no roles are allowed. If `["*"]`, all roles are allowed.
35
- :param pulumi.Input[builtins.str] name: Name of the OIDC Key to create.
36
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
34
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
36
  The value should not contain leading or trailing forward slashes.
38
37
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
38
  *Available only for Vault Enterprise*.
40
- :param pulumi.Input[builtins.int] rotation_period: How often to generate a new signing key in number of seconds
41
- :param pulumi.Input[builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
39
+ :param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
40
+ :param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
42
41
  available for verification after being rotated in seconds.
43
42
  """
44
43
  if algorithm is not None:
@@ -54,9 +53,9 @@ class OidcKeyArgs:
54
53
  if verification_ttl is not None:
55
54
  pulumi.set(__self__, "verification_ttl", verification_ttl)
56
55
 
57
- @property
56
+ @_builtins.property
58
57
  @pulumi.getter
59
- def algorithm(self) -> Optional[pulumi.Input[builtins.str]]:
58
+ def algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
60
59
  """
61
60
  Signing algorithm to use. Signing algorithm to use.
62
61
  Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
@@ -64,12 +63,12 @@ class OidcKeyArgs:
64
63
  return pulumi.get(self, "algorithm")
65
64
 
66
65
  @algorithm.setter
67
- def algorithm(self, value: Optional[pulumi.Input[builtins.str]]):
66
+ def algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
68
67
  pulumi.set(self, "algorithm", value)
69
68
 
70
- @property
69
+ @_builtins.property
71
70
  @pulumi.getter(name="allowedClientIds")
72
- def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
71
+ def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
73
72
  """
74
73
  Array of role client ID allowed to use this key for signing. If
75
74
  empty, no roles are allowed. If `["*"]`, all roles are allowed.
@@ -77,24 +76,24 @@ class OidcKeyArgs:
77
76
  return pulumi.get(self, "allowed_client_ids")
78
77
 
79
78
  @allowed_client_ids.setter
80
- def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
79
+ def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
81
80
  pulumi.set(self, "allowed_client_ids", value)
82
81
 
83
- @property
82
+ @_builtins.property
84
83
  @pulumi.getter
85
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
84
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
86
85
  """
87
86
  Name of the OIDC Key to create.
88
87
  """
89
88
  return pulumi.get(self, "name")
90
89
 
91
90
  @name.setter
92
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
91
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
93
92
  pulumi.set(self, "name", value)
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter
97
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
96
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
98
97
  """
99
98
  The namespace to provision the resource in.
100
99
  The value should not contain leading or trailing forward slashes.
@@ -104,24 +103,24 @@ class OidcKeyArgs:
104
103
  return pulumi.get(self, "namespace")
105
104
 
106
105
  @namespace.setter
107
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
106
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
108
107
  pulumi.set(self, "namespace", value)
109
108
 
110
- @property
109
+ @_builtins.property
111
110
  @pulumi.getter(name="rotationPeriod")
112
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
111
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
113
112
  """
114
113
  How often to generate a new signing key in number of seconds
115
114
  """
116
115
  return pulumi.get(self, "rotation_period")
117
116
 
118
117
  @rotation_period.setter
119
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
118
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
120
119
  pulumi.set(self, "rotation_period", value)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter(name="verificationTtl")
124
- def verification_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
123
+ def verification_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
125
124
  """
126
125
  "Controls how long the public portion of a signing key will be
127
126
  available for verification after being rotated in seconds.
@@ -129,32 +128,32 @@ class OidcKeyArgs:
129
128
  return pulumi.get(self, "verification_ttl")
130
129
 
131
130
  @verification_ttl.setter
132
- def verification_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
131
+ def verification_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
133
132
  pulumi.set(self, "verification_ttl", value)
134
133
 
135
134
 
136
135
  @pulumi.input_type
137
136
  class _OidcKeyState:
138
137
  def __init__(__self__, *,
139
- algorithm: Optional[pulumi.Input[builtins.str]] = None,
140
- allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
141
- name: Optional[pulumi.Input[builtins.str]] = None,
142
- namespace: Optional[pulumi.Input[builtins.str]] = None,
143
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
144
- verification_ttl: Optional[pulumi.Input[builtins.int]] = None):
138
+ algorithm: Optional[pulumi.Input[_builtins.str]] = None,
139
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
140
+ name: Optional[pulumi.Input[_builtins.str]] = None,
141
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
142
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
143
+ verification_ttl: Optional[pulumi.Input[_builtins.int]] = None):
145
144
  """
146
145
  Input properties used for looking up and filtering OidcKey resources.
147
- :param pulumi.Input[builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
146
+ :param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
148
147
  Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
149
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
148
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
150
149
  empty, no roles are allowed. If `["*"]`, all roles are allowed.
151
- :param pulumi.Input[builtins.str] name: Name of the OIDC Key to create.
152
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
150
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
151
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
153
152
  The value should not contain leading or trailing forward slashes.
154
153
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
155
154
  *Available only for Vault Enterprise*.
156
- :param pulumi.Input[builtins.int] rotation_period: How often to generate a new signing key in number of seconds
157
- :param pulumi.Input[builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
155
+ :param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
156
+ :param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
158
157
  available for verification after being rotated in seconds.
159
158
  """
160
159
  if algorithm is not None:
@@ -170,9 +169,9 @@ class _OidcKeyState:
170
169
  if verification_ttl is not None:
171
170
  pulumi.set(__self__, "verification_ttl", verification_ttl)
172
171
 
173
- @property
172
+ @_builtins.property
174
173
  @pulumi.getter
175
- def algorithm(self) -> Optional[pulumi.Input[builtins.str]]:
174
+ def algorithm(self) -> Optional[pulumi.Input[_builtins.str]]:
176
175
  """
177
176
  Signing algorithm to use. Signing algorithm to use.
178
177
  Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
@@ -180,12 +179,12 @@ class _OidcKeyState:
180
179
  return pulumi.get(self, "algorithm")
181
180
 
182
181
  @algorithm.setter
183
- def algorithm(self, value: Optional[pulumi.Input[builtins.str]]):
182
+ def algorithm(self, value: Optional[pulumi.Input[_builtins.str]]):
184
183
  pulumi.set(self, "algorithm", value)
185
184
 
186
- @property
185
+ @_builtins.property
187
186
  @pulumi.getter(name="allowedClientIds")
188
- def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
187
+ def allowed_client_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
189
188
  """
190
189
  Array of role client ID allowed to use this key for signing. If
191
190
  empty, no roles are allowed. If `["*"]`, all roles are allowed.
@@ -193,24 +192,24 @@ class _OidcKeyState:
193
192
  return pulumi.get(self, "allowed_client_ids")
194
193
 
195
194
  @allowed_client_ids.setter
196
- def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
195
+ def allowed_client_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
197
196
  pulumi.set(self, "allowed_client_ids", value)
198
197
 
199
- @property
198
+ @_builtins.property
200
199
  @pulumi.getter
201
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
200
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
202
201
  """
203
202
  Name of the OIDC Key to create.
204
203
  """
205
204
  return pulumi.get(self, "name")
206
205
 
207
206
  @name.setter
208
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
207
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
209
208
  pulumi.set(self, "name", value)
210
209
 
211
- @property
210
+ @_builtins.property
212
211
  @pulumi.getter
213
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
212
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
214
213
  """
215
214
  The namespace to provision the resource in.
216
215
  The value should not contain leading or trailing forward slashes.
@@ -220,24 +219,24 @@ class _OidcKeyState:
220
219
  return pulumi.get(self, "namespace")
221
220
 
222
221
  @namespace.setter
223
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
222
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
224
223
  pulumi.set(self, "namespace", value)
225
224
 
226
- @property
225
+ @_builtins.property
227
226
  @pulumi.getter(name="rotationPeriod")
228
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
227
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
229
228
  """
230
229
  How often to generate a new signing key in number of seconds
231
230
  """
232
231
  return pulumi.get(self, "rotation_period")
233
232
 
234
233
  @rotation_period.setter
235
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
234
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
236
235
  pulumi.set(self, "rotation_period", value)
237
236
 
238
- @property
237
+ @_builtins.property
239
238
  @pulumi.getter(name="verificationTtl")
240
- def verification_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
239
+ def verification_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
241
240
  """
242
241
  "Controls how long the public portion of a signing key will be
243
242
  available for verification after being rotated in seconds.
@@ -245,7 +244,7 @@ class _OidcKeyState:
245
244
  return pulumi.get(self, "verification_ttl")
246
245
 
247
246
  @verification_ttl.setter
248
- def verification_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
247
+ def verification_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
249
248
  pulumi.set(self, "verification_ttl", value)
250
249
 
251
250
 
@@ -255,12 +254,12 @@ class OidcKey(pulumi.CustomResource):
255
254
  def __init__(__self__,
256
255
  resource_name: str,
257
256
  opts: Optional[pulumi.ResourceOptions] = None,
258
- algorithm: Optional[pulumi.Input[builtins.str]] = None,
259
- allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
260
- name: Optional[pulumi.Input[builtins.str]] = None,
261
- namespace: Optional[pulumi.Input[builtins.str]] = None,
262
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
263
- verification_ttl: Optional[pulumi.Input[builtins.int]] = None,
257
+ algorithm: Optional[pulumi.Input[_builtins.str]] = None,
258
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
259
+ name: Optional[pulumi.Input[_builtins.str]] = None,
260
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
261
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
262
+ verification_ttl: Optional[pulumi.Input[_builtins.int]] = None,
264
263
  __props__=None):
265
264
  """
266
265
  ## Example Usage
@@ -290,17 +289,17 @@ class OidcKey(pulumi.CustomResource):
290
289
 
291
290
  :param str resource_name: The name of the resource.
292
291
  :param pulumi.ResourceOptions opts: Options for the resource.
293
- :param pulumi.Input[builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
292
+ :param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
294
293
  Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
295
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
294
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
296
295
  empty, no roles are allowed. If `["*"]`, all roles are allowed.
297
- :param pulumi.Input[builtins.str] name: Name of the OIDC Key to create.
298
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
296
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
297
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
299
298
  The value should not contain leading or trailing forward slashes.
300
299
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
301
300
  *Available only for Vault Enterprise*.
302
- :param pulumi.Input[builtins.int] rotation_period: How often to generate a new signing key in number of seconds
303
- :param pulumi.Input[builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
301
+ :param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
302
+ :param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
304
303
  available for verification after being rotated in seconds.
305
304
  """
306
305
  ...
@@ -350,12 +349,12 @@ class OidcKey(pulumi.CustomResource):
350
349
  def _internal_init(__self__,
351
350
  resource_name: str,
352
351
  opts: Optional[pulumi.ResourceOptions] = None,
353
- algorithm: Optional[pulumi.Input[builtins.str]] = None,
354
- allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
355
- name: Optional[pulumi.Input[builtins.str]] = None,
356
- namespace: Optional[pulumi.Input[builtins.str]] = None,
357
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
358
- verification_ttl: Optional[pulumi.Input[builtins.int]] = None,
352
+ algorithm: Optional[pulumi.Input[_builtins.str]] = None,
353
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
354
+ name: Optional[pulumi.Input[_builtins.str]] = None,
355
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
356
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
357
+ verification_ttl: Optional[pulumi.Input[_builtins.int]] = None,
359
358
  __props__=None):
360
359
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
361
360
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -381,12 +380,12 @@ class OidcKey(pulumi.CustomResource):
381
380
  def get(resource_name: str,
382
381
  id: pulumi.Input[str],
383
382
  opts: Optional[pulumi.ResourceOptions] = None,
384
- algorithm: Optional[pulumi.Input[builtins.str]] = None,
385
- allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
386
- name: Optional[pulumi.Input[builtins.str]] = None,
387
- namespace: Optional[pulumi.Input[builtins.str]] = None,
388
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
389
- verification_ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'OidcKey':
383
+ algorithm: Optional[pulumi.Input[_builtins.str]] = None,
384
+ allowed_client_ids: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
385
+ name: Optional[pulumi.Input[_builtins.str]] = None,
386
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
387
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
388
+ verification_ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'OidcKey':
390
389
  """
391
390
  Get an existing OidcKey resource's state with the given name, id, and optional extra
392
391
  properties used to qualify the lookup.
@@ -394,17 +393,17 @@ class OidcKey(pulumi.CustomResource):
394
393
  :param str resource_name: The unique name of the resulting resource.
395
394
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
396
395
  :param pulumi.ResourceOptions opts: Options for the resource.
397
- :param pulumi.Input[builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
396
+ :param pulumi.Input[_builtins.str] algorithm: Signing algorithm to use. Signing algorithm to use.
398
397
  Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
399
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
398
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_client_ids: Array of role client ID allowed to use this key for signing. If
400
399
  empty, no roles are allowed. If `["*"]`, all roles are allowed.
401
- :param pulumi.Input[builtins.str] name: Name of the OIDC Key to create.
402
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
400
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Key to create.
401
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
403
402
  The value should not contain leading or trailing forward slashes.
404
403
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
405
404
  *Available only for Vault Enterprise*.
406
- :param pulumi.Input[builtins.int] rotation_period: How often to generate a new signing key in number of seconds
407
- :param pulumi.Input[builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
405
+ :param pulumi.Input[_builtins.int] rotation_period: How often to generate a new signing key in number of seconds
406
+ :param pulumi.Input[_builtins.int] verification_ttl: "Controls how long the public portion of a signing key will be
408
407
  available for verification after being rotated in seconds.
409
408
  """
410
409
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -419,35 +418,35 @@ class OidcKey(pulumi.CustomResource):
419
418
  __props__.__dict__["verification_ttl"] = verification_ttl
420
419
  return OidcKey(resource_name, opts=opts, __props__=__props__)
421
420
 
422
- @property
421
+ @_builtins.property
423
422
  @pulumi.getter
424
- def algorithm(self) -> pulumi.Output[Optional[builtins.str]]:
423
+ def algorithm(self) -> pulumi.Output[Optional[_builtins.str]]:
425
424
  """
426
425
  Signing algorithm to use. Signing algorithm to use.
427
426
  Allowed values are: RS256 (default), RS384, RS512, ES256, ES384, ES512, EdDSA.
428
427
  """
429
428
  return pulumi.get(self, "algorithm")
430
429
 
431
- @property
430
+ @_builtins.property
432
431
  @pulumi.getter(name="allowedClientIds")
433
- def allowed_client_ids(self) -> pulumi.Output[Sequence[builtins.str]]:
432
+ def allowed_client_ids(self) -> pulumi.Output[Sequence[_builtins.str]]:
434
433
  """
435
434
  Array of role client ID allowed to use this key for signing. If
436
435
  empty, no roles are allowed. If `["*"]`, all roles are allowed.
437
436
  """
438
437
  return pulumi.get(self, "allowed_client_ids")
439
438
 
440
- @property
439
+ @_builtins.property
441
440
  @pulumi.getter
442
- def name(self) -> pulumi.Output[builtins.str]:
441
+ def name(self) -> pulumi.Output[_builtins.str]:
443
442
  """
444
443
  Name of the OIDC Key to create.
445
444
  """
446
445
  return pulumi.get(self, "name")
447
446
 
448
- @property
447
+ @_builtins.property
449
448
  @pulumi.getter
450
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
449
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
451
450
  """
452
451
  The namespace to provision the resource in.
453
452
  The value should not contain leading or trailing forward slashes.
@@ -456,17 +455,17 @@ class OidcKey(pulumi.CustomResource):
456
455
  """
457
456
  return pulumi.get(self, "namespace")
458
457
 
459
- @property
458
+ @_builtins.property
460
459
  @pulumi.getter(name="rotationPeriod")
461
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
460
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
462
461
  """
463
462
  How often to generate a new signing key in number of seconds
464
463
  """
465
464
  return pulumi.get(self, "rotation_period")
466
465
 
467
- @property
466
+ @_builtins.property
468
467
  @pulumi.getter(name="verificationTtl")
469
- def verification_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
468
+ def verification_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
470
469
  """
471
470
  "Controls how long the public portion of a signing key will be
472
471
  available for verification after being rotated in seconds.