pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,28 +19,28 @@ __all__ = ['OidcRoleArgs', 'OidcRole']
20
19
  @pulumi.input_type
21
20
  class OidcRoleArgs:
22
21
  def __init__(__self__, *,
23
- key: pulumi.Input[builtins.str],
24
- client_id: Optional[pulumi.Input[builtins.str]] = None,
25
- name: Optional[pulumi.Input[builtins.str]] = None,
26
- namespace: Optional[pulumi.Input[builtins.str]] = None,
27
- template: Optional[pulumi.Input[builtins.str]] = None,
28
- ttl: Optional[pulumi.Input[builtins.int]] = None):
22
+ key: pulumi.Input[_builtins.str],
23
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
24
+ name: Optional[pulumi.Input[_builtins.str]] = None,
25
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
26
+ template: Optional[pulumi.Input[_builtins.str]] = None,
27
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
29
28
  """
30
29
  The set of arguments for constructing a OidcRole resource.
31
- :param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
30
+ :param pulumi.Input[_builtins.str] key: A configured named key, the key must already exist
32
31
  before tokens can be issued.
33
- :param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
32
+ :param pulumi.Input[_builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
34
33
  tokens issued by this role
35
- :param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
36
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
34
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Role to create.
35
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
37
36
  The value should not contain leading or trailing forward slashes.
38
37
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
39
38
  *Available only for Vault Enterprise*.
40
- :param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
39
+ :param pulumi.Input[_builtins.str] template: The template string to use for generating tokens. This may be in
41
40
  string-ified JSON or base64 format. See the
42
41
  [documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
43
42
  for the template format.
44
- :param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
43
+ :param pulumi.Input[_builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
45
44
  """
46
45
  pulumi.set(__self__, "key", key)
47
46
  if client_id is not None:
@@ -55,9 +54,9 @@ class OidcRoleArgs:
55
54
  if ttl is not None:
56
55
  pulumi.set(__self__, "ttl", ttl)
57
56
 
58
- @property
57
+ @_builtins.property
59
58
  @pulumi.getter
60
- def key(self) -> pulumi.Input[builtins.str]:
59
+ def key(self) -> pulumi.Input[_builtins.str]:
61
60
  """
62
61
  A configured named key, the key must already exist
63
62
  before tokens can be issued.
@@ -65,12 +64,12 @@ class OidcRoleArgs:
65
64
  return pulumi.get(self, "key")
66
65
 
67
66
  @key.setter
68
- def key(self, value: pulumi.Input[builtins.str]):
67
+ def key(self, value: pulumi.Input[_builtins.str]):
69
68
  pulumi.set(self, "key", value)
70
69
 
71
- @property
70
+ @_builtins.property
72
71
  @pulumi.getter(name="clientId")
73
- def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
72
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
74
73
  """
75
74
  The value that will be included in the `aud` field of all the OIDC identity
76
75
  tokens issued by this role
@@ -78,24 +77,24 @@ class OidcRoleArgs:
78
77
  return pulumi.get(self, "client_id")
79
78
 
80
79
  @client_id.setter
81
- def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
80
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
82
81
  pulumi.set(self, "client_id", value)
83
82
 
84
- @property
83
+ @_builtins.property
85
84
  @pulumi.getter
86
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
85
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
87
86
  """
88
87
  Name of the OIDC Role to create.
89
88
  """
90
89
  return pulumi.get(self, "name")
91
90
 
92
91
  @name.setter
93
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
92
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
94
93
  pulumi.set(self, "name", value)
95
94
 
96
- @property
95
+ @_builtins.property
97
96
  @pulumi.getter
98
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
97
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
99
98
  """
100
99
  The namespace to provision the resource in.
101
100
  The value should not contain leading or trailing forward slashes.
@@ -105,12 +104,12 @@ class OidcRoleArgs:
105
104
  return pulumi.get(self, "namespace")
106
105
 
107
106
  @namespace.setter
108
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
107
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
109
108
  pulumi.set(self, "namespace", value)
110
109
 
111
- @property
110
+ @_builtins.property
112
111
  @pulumi.getter
113
- def template(self) -> Optional[pulumi.Input[builtins.str]]:
112
+ def template(self) -> Optional[pulumi.Input[_builtins.str]]:
114
113
  """
115
114
  The template string to use for generating tokens. This may be in
116
115
  string-ified JSON or base64 format. See the
@@ -120,47 +119,47 @@ class OidcRoleArgs:
120
119
  return pulumi.get(self, "template")
121
120
 
122
121
  @template.setter
123
- def template(self, value: Optional[pulumi.Input[builtins.str]]):
122
+ def template(self, value: Optional[pulumi.Input[_builtins.str]]):
124
123
  pulumi.set(self, "template", value)
125
124
 
126
- @property
125
+ @_builtins.property
127
126
  @pulumi.getter
128
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
127
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
129
128
  """
130
129
  TTL of the tokens generated against the role in number of seconds.
131
130
  """
132
131
  return pulumi.get(self, "ttl")
133
132
 
134
133
  @ttl.setter
135
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
134
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
136
135
  pulumi.set(self, "ttl", value)
137
136
 
138
137
 
139
138
  @pulumi.input_type
140
139
  class _OidcRoleState:
141
140
  def __init__(__self__, *,
142
- client_id: Optional[pulumi.Input[builtins.str]] = None,
143
- key: Optional[pulumi.Input[builtins.str]] = None,
144
- name: Optional[pulumi.Input[builtins.str]] = None,
145
- namespace: Optional[pulumi.Input[builtins.str]] = None,
146
- template: Optional[pulumi.Input[builtins.str]] = None,
147
- ttl: Optional[pulumi.Input[builtins.int]] = None):
141
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
142
+ key: Optional[pulumi.Input[_builtins.str]] = None,
143
+ name: Optional[pulumi.Input[_builtins.str]] = None,
144
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
145
+ template: Optional[pulumi.Input[_builtins.str]] = None,
146
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
148
147
  """
149
148
  Input properties used for looking up and filtering OidcRole resources.
150
- :param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
149
+ :param pulumi.Input[_builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
151
150
  tokens issued by this role
152
- :param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
151
+ :param pulumi.Input[_builtins.str] key: A configured named key, the key must already exist
153
152
  before tokens can be issued.
154
- :param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
155
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
153
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Role to create.
154
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
156
155
  The value should not contain leading or trailing forward slashes.
157
156
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
158
157
  *Available only for Vault Enterprise*.
159
- :param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
158
+ :param pulumi.Input[_builtins.str] template: The template string to use for generating tokens. This may be in
160
159
  string-ified JSON or base64 format. See the
161
160
  [documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
162
161
  for the template format.
163
- :param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
162
+ :param pulumi.Input[_builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
164
163
  """
165
164
  if client_id is not None:
166
165
  pulumi.set(__self__, "client_id", client_id)
@@ -175,9 +174,9 @@ class _OidcRoleState:
175
174
  if ttl is not None:
176
175
  pulumi.set(__self__, "ttl", ttl)
177
176
 
178
- @property
177
+ @_builtins.property
179
178
  @pulumi.getter(name="clientId")
180
- def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
179
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
181
180
  """
182
181
  The value that will be included in the `aud` field of all the OIDC identity
183
182
  tokens issued by this role
@@ -185,12 +184,12 @@ class _OidcRoleState:
185
184
  return pulumi.get(self, "client_id")
186
185
 
187
186
  @client_id.setter
188
- def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
187
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
189
188
  pulumi.set(self, "client_id", value)
190
189
 
191
- @property
190
+ @_builtins.property
192
191
  @pulumi.getter
193
- def key(self) -> Optional[pulumi.Input[builtins.str]]:
192
+ def key(self) -> Optional[pulumi.Input[_builtins.str]]:
194
193
  """
195
194
  A configured named key, the key must already exist
196
195
  before tokens can be issued.
@@ -198,24 +197,24 @@ class _OidcRoleState:
198
197
  return pulumi.get(self, "key")
199
198
 
200
199
  @key.setter
201
- def key(self, value: Optional[pulumi.Input[builtins.str]]):
200
+ def key(self, value: Optional[pulumi.Input[_builtins.str]]):
202
201
  pulumi.set(self, "key", value)
203
202
 
204
- @property
203
+ @_builtins.property
205
204
  @pulumi.getter
206
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
205
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
207
206
  """
208
207
  Name of the OIDC Role to create.
209
208
  """
210
209
  return pulumi.get(self, "name")
211
210
 
212
211
  @name.setter
213
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
212
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
214
213
  pulumi.set(self, "name", value)
215
214
 
216
- @property
215
+ @_builtins.property
217
216
  @pulumi.getter
218
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
217
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
219
218
  """
220
219
  The namespace to provision the resource in.
221
220
  The value should not contain leading or trailing forward slashes.
@@ -225,12 +224,12 @@ class _OidcRoleState:
225
224
  return pulumi.get(self, "namespace")
226
225
 
227
226
  @namespace.setter
228
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
227
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
229
228
  pulumi.set(self, "namespace", value)
230
229
 
231
- @property
230
+ @_builtins.property
232
231
  @pulumi.getter
233
- def template(self) -> Optional[pulumi.Input[builtins.str]]:
232
+ def template(self) -> Optional[pulumi.Input[_builtins.str]]:
234
233
  """
235
234
  The template string to use for generating tokens. This may be in
236
235
  string-ified JSON or base64 format. See the
@@ -240,19 +239,19 @@ class _OidcRoleState:
240
239
  return pulumi.get(self, "template")
241
240
 
242
241
  @template.setter
243
- def template(self, value: Optional[pulumi.Input[builtins.str]]):
242
+ def template(self, value: Optional[pulumi.Input[_builtins.str]]):
244
243
  pulumi.set(self, "template", value)
245
244
 
246
- @property
245
+ @_builtins.property
247
246
  @pulumi.getter
248
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
247
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
249
248
  """
250
249
  TTL of the tokens generated against the role in number of seconds.
251
250
  """
252
251
  return pulumi.get(self, "ttl")
253
252
 
254
253
  @ttl.setter
255
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
254
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
256
255
  pulumi.set(self, "ttl", value)
257
256
 
258
257
 
@@ -262,12 +261,12 @@ class OidcRole(pulumi.CustomResource):
262
261
  def __init__(__self__,
263
262
  resource_name: str,
264
263
  opts: Optional[pulumi.ResourceOptions] = None,
265
- client_id: Optional[pulumi.Input[builtins.str]] = None,
266
- key: Optional[pulumi.Input[builtins.str]] = None,
267
- name: Optional[pulumi.Input[builtins.str]] = None,
268
- namespace: Optional[pulumi.Input[builtins.str]] = None,
269
- template: Optional[pulumi.Input[builtins.str]] = None,
270
- ttl: Optional[pulumi.Input[builtins.int]] = None,
264
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
265
+ key: Optional[pulumi.Input[_builtins.str]] = None,
266
+ name: Optional[pulumi.Input[_builtins.str]] = None,
267
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
268
+ template: Optional[pulumi.Input[_builtins.str]] = None,
269
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
271
270
  __props__=None):
272
271
  """
273
272
  ## Example Usage
@@ -324,20 +323,20 @@ class OidcRole(pulumi.CustomResource):
324
323
 
325
324
  :param str resource_name: The name of the resource.
326
325
  :param pulumi.ResourceOptions opts: Options for the resource.
327
- :param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
326
+ :param pulumi.Input[_builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
328
327
  tokens issued by this role
329
- :param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
328
+ :param pulumi.Input[_builtins.str] key: A configured named key, the key must already exist
330
329
  before tokens can be issued.
331
- :param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
332
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
330
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Role to create.
331
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
333
332
  The value should not contain leading or trailing forward slashes.
334
333
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
335
334
  *Available only for Vault Enterprise*.
336
- :param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
335
+ :param pulumi.Input[_builtins.str] template: The template string to use for generating tokens. This may be in
337
336
  string-ified JSON or base64 format. See the
338
337
  [documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
339
338
  for the template format.
340
- :param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
339
+ :param pulumi.Input[_builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
341
340
  """
342
341
  ...
343
342
  @overload
@@ -413,12 +412,12 @@ class OidcRole(pulumi.CustomResource):
413
412
  def _internal_init(__self__,
414
413
  resource_name: str,
415
414
  opts: Optional[pulumi.ResourceOptions] = None,
416
- client_id: Optional[pulumi.Input[builtins.str]] = None,
417
- key: Optional[pulumi.Input[builtins.str]] = None,
418
- name: Optional[pulumi.Input[builtins.str]] = None,
419
- namespace: Optional[pulumi.Input[builtins.str]] = None,
420
- template: Optional[pulumi.Input[builtins.str]] = None,
421
- ttl: Optional[pulumi.Input[builtins.int]] = None,
415
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
416
+ key: Optional[pulumi.Input[_builtins.str]] = None,
417
+ name: Optional[pulumi.Input[_builtins.str]] = None,
418
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
419
+ template: Optional[pulumi.Input[_builtins.str]] = None,
420
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
422
421
  __props__=None):
423
422
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
424
423
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -446,12 +445,12 @@ class OidcRole(pulumi.CustomResource):
446
445
  def get(resource_name: str,
447
446
  id: pulumi.Input[str],
448
447
  opts: Optional[pulumi.ResourceOptions] = None,
449
- client_id: Optional[pulumi.Input[builtins.str]] = None,
450
- key: Optional[pulumi.Input[builtins.str]] = None,
451
- name: Optional[pulumi.Input[builtins.str]] = None,
452
- namespace: Optional[pulumi.Input[builtins.str]] = None,
453
- template: Optional[pulumi.Input[builtins.str]] = None,
454
- ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'OidcRole':
448
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
449
+ key: Optional[pulumi.Input[_builtins.str]] = None,
450
+ name: Optional[pulumi.Input[_builtins.str]] = None,
451
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
452
+ template: Optional[pulumi.Input[_builtins.str]] = None,
453
+ ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'OidcRole':
455
454
  """
456
455
  Get an existing OidcRole resource's state with the given name, id, and optional extra
457
456
  properties used to qualify the lookup.
@@ -459,20 +458,20 @@ class OidcRole(pulumi.CustomResource):
459
458
  :param str resource_name: The unique name of the resulting resource.
460
459
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
461
460
  :param pulumi.ResourceOptions opts: Options for the resource.
462
- :param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
461
+ :param pulumi.Input[_builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
463
462
  tokens issued by this role
464
- :param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
463
+ :param pulumi.Input[_builtins.str] key: A configured named key, the key must already exist
465
464
  before tokens can be issued.
466
- :param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
467
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
465
+ :param pulumi.Input[_builtins.str] name: Name of the OIDC Role to create.
466
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
468
467
  The value should not contain leading or trailing forward slashes.
469
468
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
470
469
  *Available only for Vault Enterprise*.
471
- :param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
470
+ :param pulumi.Input[_builtins.str] template: The template string to use for generating tokens. This may be in
472
471
  string-ified JSON or base64 format. See the
473
472
  [documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
474
473
  for the template format.
475
- :param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
474
+ :param pulumi.Input[_builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
476
475
  """
477
476
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
478
477
 
@@ -486,35 +485,35 @@ class OidcRole(pulumi.CustomResource):
486
485
  __props__.__dict__["ttl"] = ttl
487
486
  return OidcRole(resource_name, opts=opts, __props__=__props__)
488
487
 
489
- @property
488
+ @_builtins.property
490
489
  @pulumi.getter(name="clientId")
491
- def client_id(self) -> pulumi.Output[builtins.str]:
490
+ def client_id(self) -> pulumi.Output[_builtins.str]:
492
491
  """
493
492
  The value that will be included in the `aud` field of all the OIDC identity
494
493
  tokens issued by this role
495
494
  """
496
495
  return pulumi.get(self, "client_id")
497
496
 
498
- @property
497
+ @_builtins.property
499
498
  @pulumi.getter
500
- def key(self) -> pulumi.Output[builtins.str]:
499
+ def key(self) -> pulumi.Output[_builtins.str]:
501
500
  """
502
501
  A configured named key, the key must already exist
503
502
  before tokens can be issued.
504
503
  """
505
504
  return pulumi.get(self, "key")
506
505
 
507
- @property
506
+ @_builtins.property
508
507
  @pulumi.getter
509
- def name(self) -> pulumi.Output[builtins.str]:
508
+ def name(self) -> pulumi.Output[_builtins.str]:
510
509
  """
511
510
  Name of the OIDC Role to create.
512
511
  """
513
512
  return pulumi.get(self, "name")
514
513
 
515
- @property
514
+ @_builtins.property
516
515
  @pulumi.getter
517
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
516
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
518
517
  """
519
518
  The namespace to provision the resource in.
520
519
  The value should not contain leading or trailing forward slashes.
@@ -523,9 +522,9 @@ class OidcRole(pulumi.CustomResource):
523
522
  """
524
523
  return pulumi.get(self, "namespace")
525
524
 
526
- @property
525
+ @_builtins.property
527
526
  @pulumi.getter
528
- def template(self) -> pulumi.Output[Optional[builtins.str]]:
527
+ def template(self) -> pulumi.Output[Optional[_builtins.str]]:
529
528
  """
530
529
  The template string to use for generating tokens. This may be in
531
530
  string-ified JSON or base64 format. See the
@@ -534,9 +533,9 @@ class OidcRole(pulumi.CustomResource):
534
533
  """
535
534
  return pulumi.get(self, "template")
536
535
 
537
- @property
536
+ @_builtins.property
538
537
  @pulumi.getter
539
- def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
538
+ def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
540
539
  """
541
540
  TTL of the tokens generated against the role in number of seconds.
542
541
  """