pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,14 +19,14 @@ __all__ = ['OidcKeyAllowedClientIDArgs', 'OidcKeyAllowedClientID']
20
19
  @pulumi.input_type
21
20
  class OidcKeyAllowedClientIDArgs:
22
21
  def __init__(__self__, *,
23
- allowed_client_id: pulumi.Input[builtins.str],
24
- key_name: pulumi.Input[builtins.str],
25
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ allowed_client_id: pulumi.Input[_builtins.str],
23
+ key_name: pulumi.Input[_builtins.str],
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
26
25
  """
27
26
  The set of arguments for constructing a OidcKeyAllowedClientID resource.
28
- :param pulumi.Input[builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
29
- :param pulumi.Input[builtins.str] key_name: Name of the OIDC Key allow the Client ID.
30
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
27
+ :param pulumi.Input[_builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
28
+ :param pulumi.Input[_builtins.str] key_name: Name of the OIDC Key allow the Client ID.
29
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
31
30
  The value should not contain leading or trailing forward slashes.
32
31
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
33
32
  *Available only for Vault Enterprise*.
@@ -37,33 +36,33 @@ class OidcKeyAllowedClientIDArgs:
37
36
  if namespace is not None:
38
37
  pulumi.set(__self__, "namespace", namespace)
39
38
 
40
- @property
39
+ @_builtins.property
41
40
  @pulumi.getter(name="allowedClientId")
42
- def allowed_client_id(self) -> pulumi.Input[builtins.str]:
41
+ def allowed_client_id(self) -> pulumi.Input[_builtins.str]:
43
42
  """
44
43
  Client ID to allow usage with the OIDC named key
45
44
  """
46
45
  return pulumi.get(self, "allowed_client_id")
47
46
 
48
47
  @allowed_client_id.setter
49
- def allowed_client_id(self, value: pulumi.Input[builtins.str]):
48
+ def allowed_client_id(self, value: pulumi.Input[_builtins.str]):
50
49
  pulumi.set(self, "allowed_client_id", value)
51
50
 
52
- @property
51
+ @_builtins.property
53
52
  @pulumi.getter(name="keyName")
54
- def key_name(self) -> pulumi.Input[builtins.str]:
53
+ def key_name(self) -> pulumi.Input[_builtins.str]:
55
54
  """
56
55
  Name of the OIDC Key allow the Client ID.
57
56
  """
58
57
  return pulumi.get(self, "key_name")
59
58
 
60
59
  @key_name.setter
61
- def key_name(self, value: pulumi.Input[builtins.str]):
60
+ def key_name(self, value: pulumi.Input[_builtins.str]):
62
61
  pulumi.set(self, "key_name", value)
63
62
 
64
- @property
63
+ @_builtins.property
65
64
  @pulumi.getter
66
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
65
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
67
66
  """
68
67
  The namespace to provision the resource in.
69
68
  The value should not contain leading or trailing forward slashes.
@@ -73,21 +72,21 @@ class OidcKeyAllowedClientIDArgs:
73
72
  return pulumi.get(self, "namespace")
74
73
 
75
74
  @namespace.setter
76
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
75
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
77
76
  pulumi.set(self, "namespace", value)
78
77
 
79
78
 
80
79
  @pulumi.input_type
81
80
  class _OidcKeyAllowedClientIDState:
82
81
  def __init__(__self__, *,
83
- allowed_client_id: Optional[pulumi.Input[builtins.str]] = None,
84
- key_name: Optional[pulumi.Input[builtins.str]] = None,
85
- namespace: Optional[pulumi.Input[builtins.str]] = None):
82
+ allowed_client_id: Optional[pulumi.Input[_builtins.str]] = None,
83
+ key_name: Optional[pulumi.Input[_builtins.str]] = None,
84
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
86
85
  """
87
86
  Input properties used for looking up and filtering OidcKeyAllowedClientID resources.
88
- :param pulumi.Input[builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
89
- :param pulumi.Input[builtins.str] key_name: Name of the OIDC Key allow the Client ID.
90
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
87
+ :param pulumi.Input[_builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
88
+ :param pulumi.Input[_builtins.str] key_name: Name of the OIDC Key allow the Client ID.
89
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
91
90
  The value should not contain leading or trailing forward slashes.
92
91
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
93
92
  *Available only for Vault Enterprise*.
@@ -99,33 +98,33 @@ class _OidcKeyAllowedClientIDState:
99
98
  if namespace is not None:
100
99
  pulumi.set(__self__, "namespace", namespace)
101
100
 
102
- @property
101
+ @_builtins.property
103
102
  @pulumi.getter(name="allowedClientId")
104
- def allowed_client_id(self) -> Optional[pulumi.Input[builtins.str]]:
103
+ def allowed_client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
105
104
  """
106
105
  Client ID to allow usage with the OIDC named key
107
106
  """
108
107
  return pulumi.get(self, "allowed_client_id")
109
108
 
110
109
  @allowed_client_id.setter
111
- def allowed_client_id(self, value: Optional[pulumi.Input[builtins.str]]):
110
+ def allowed_client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
112
111
  pulumi.set(self, "allowed_client_id", value)
113
112
 
114
- @property
113
+ @_builtins.property
115
114
  @pulumi.getter(name="keyName")
116
- def key_name(self) -> Optional[pulumi.Input[builtins.str]]:
115
+ def key_name(self) -> Optional[pulumi.Input[_builtins.str]]:
117
116
  """
118
117
  Name of the OIDC Key allow the Client ID.
119
118
  """
120
119
  return pulumi.get(self, "key_name")
121
120
 
122
121
  @key_name.setter
123
- def key_name(self, value: Optional[pulumi.Input[builtins.str]]):
122
+ def key_name(self, value: Optional[pulumi.Input[_builtins.str]]):
124
123
  pulumi.set(self, "key_name", value)
125
124
 
126
- @property
125
+ @_builtins.property
127
126
  @pulumi.getter
128
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
127
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
129
128
  """
130
129
  The namespace to provision the resource in.
131
130
  The value should not contain leading or trailing forward slashes.
@@ -135,7 +134,7 @@ class _OidcKeyAllowedClientIDState:
135
134
  return pulumi.get(self, "namespace")
136
135
 
137
136
  @namespace.setter
138
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
137
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
139
138
  pulumi.set(self, "namespace", value)
140
139
 
141
140
 
@@ -145,9 +144,9 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
145
144
  def __init__(__self__,
146
145
  resource_name: str,
147
146
  opts: Optional[pulumi.ResourceOptions] = None,
148
- allowed_client_id: Optional[pulumi.Input[builtins.str]] = None,
149
- key_name: Optional[pulumi.Input[builtins.str]] = None,
150
- namespace: Optional[pulumi.Input[builtins.str]] = None,
147
+ allowed_client_id: Optional[pulumi.Input[_builtins.str]] = None,
148
+ key_name: Optional[pulumi.Input[_builtins.str]] = None,
149
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
151
150
  __props__=None):
152
151
  """
153
152
  ## Example Usage
@@ -169,9 +168,9 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
169
168
 
170
169
  :param str resource_name: The name of the resource.
171
170
  :param pulumi.ResourceOptions opts: Options for the resource.
172
- :param pulumi.Input[builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
173
- :param pulumi.Input[builtins.str] key_name: Name of the OIDC Key allow the Client ID.
174
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
171
+ :param pulumi.Input[_builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
172
+ :param pulumi.Input[_builtins.str] key_name: Name of the OIDC Key allow the Client ID.
173
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
175
174
  The value should not contain leading or trailing forward slashes.
176
175
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
177
176
  *Available only for Vault Enterprise*.
@@ -215,9 +214,9 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
215
214
  def _internal_init(__self__,
216
215
  resource_name: str,
217
216
  opts: Optional[pulumi.ResourceOptions] = None,
218
- allowed_client_id: Optional[pulumi.Input[builtins.str]] = None,
219
- key_name: Optional[pulumi.Input[builtins.str]] = None,
220
- namespace: Optional[pulumi.Input[builtins.str]] = None,
217
+ allowed_client_id: Optional[pulumi.Input[_builtins.str]] = None,
218
+ key_name: Optional[pulumi.Input[_builtins.str]] = None,
219
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
221
220
  __props__=None):
222
221
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
223
222
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -244,9 +243,9 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
244
243
  def get(resource_name: str,
245
244
  id: pulumi.Input[str],
246
245
  opts: Optional[pulumi.ResourceOptions] = None,
247
- allowed_client_id: Optional[pulumi.Input[builtins.str]] = None,
248
- key_name: Optional[pulumi.Input[builtins.str]] = None,
249
- namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'OidcKeyAllowedClientID':
246
+ allowed_client_id: Optional[pulumi.Input[_builtins.str]] = None,
247
+ key_name: Optional[pulumi.Input[_builtins.str]] = None,
248
+ namespace: Optional[pulumi.Input[_builtins.str]] = None) -> 'OidcKeyAllowedClientID':
250
249
  """
251
250
  Get an existing OidcKeyAllowedClientID resource's state with the given name, id, and optional extra
252
251
  properties used to qualify the lookup.
@@ -254,9 +253,9 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
254
253
  :param str resource_name: The unique name of the resulting resource.
255
254
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
256
255
  :param pulumi.ResourceOptions opts: Options for the resource.
257
- :param pulumi.Input[builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
258
- :param pulumi.Input[builtins.str] key_name: Name of the OIDC Key allow the Client ID.
259
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
256
+ :param pulumi.Input[_builtins.str] allowed_client_id: Client ID to allow usage with the OIDC named key
257
+ :param pulumi.Input[_builtins.str] key_name: Name of the OIDC Key allow the Client ID.
258
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
260
259
  The value should not contain leading or trailing forward slashes.
261
260
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
262
261
  *Available only for Vault Enterprise*.
@@ -270,25 +269,25 @@ class OidcKeyAllowedClientID(pulumi.CustomResource):
270
269
  __props__.__dict__["namespace"] = namespace
271
270
  return OidcKeyAllowedClientID(resource_name, opts=opts, __props__=__props__)
272
271
 
273
- @property
272
+ @_builtins.property
274
273
  @pulumi.getter(name="allowedClientId")
275
- def allowed_client_id(self) -> pulumi.Output[builtins.str]:
274
+ def allowed_client_id(self) -> pulumi.Output[_builtins.str]:
276
275
  """
277
276
  Client ID to allow usage with the OIDC named key
278
277
  """
279
278
  return pulumi.get(self, "allowed_client_id")
280
279
 
281
- @property
280
+ @_builtins.property
282
281
  @pulumi.getter(name="keyName")
283
- def key_name(self) -> pulumi.Output[builtins.str]:
282
+ def key_name(self) -> pulumi.Output[_builtins.str]:
284
283
  """
285
284
  Name of the OIDC Key allow the Client ID.
286
285
  """
287
286
  return pulumi.get(self, "key_name")
288
287
 
289
- @property
288
+ @_builtins.property
290
289
  @pulumi.getter
291
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
290
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
292
291
  """
293
292
  The namespace to provision the resource in.
294
293
  The value should not contain leading or trailing forward slashes.