pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -41,30 +40,30 @@ class GetSecretsListResult:
41
40
  raise TypeError("Expected argument 'path' to be a str")
42
41
  pulumi.set(__self__, "path", path)
43
42
 
44
- @property
43
+ @_builtins.property
45
44
  @pulumi.getter
46
- def id(self) -> builtins.str:
45
+ def id(self) -> _builtins.str:
47
46
  """
48
47
  The provider-assigned unique ID for this managed resource.
49
48
  """
50
49
  return pulumi.get(self, "id")
51
50
 
52
- @property
51
+ @_builtins.property
53
52
  @pulumi.getter
54
- def names(self) -> Sequence[builtins.str]:
53
+ def names(self) -> Sequence[_builtins.str]:
55
54
  """
56
55
  List of all secret names listed under the given path.
57
56
  """
58
57
  return pulumi.get(self, "names")
59
58
 
60
- @property
59
+ @_builtins.property
61
60
  @pulumi.getter
62
- def namespace(self) -> Optional[builtins.str]:
61
+ def namespace(self) -> Optional[_builtins.str]:
63
62
  return pulumi.get(self, "namespace")
64
63
 
65
- @property
64
+ @_builtins.property
66
65
  @pulumi.getter
67
- def path(self) -> builtins.str:
66
+ def path(self) -> _builtins.str:
68
67
  return pulumi.get(self, "path")
69
68
 
70
69
 
@@ -80,8 +79,8 @@ class AwaitableGetSecretsListResult(GetSecretsListResult):
80
79
  path=self.path)
81
80
 
82
81
 
83
- def get_secrets_list(namespace: Optional[builtins.str] = None,
84
- path: Optional[builtins.str] = None,
82
+ def get_secrets_list(namespace: Optional[_builtins.str] = None,
83
+ path: Optional[_builtins.str] = None,
85
84
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretsListResult:
86
85
  """
87
86
  ## Example Usage
@@ -116,11 +115,11 @@ def get_secrets_list(namespace: Optional[builtins.str] = None,
116
115
  Use of this resource requires the `read` capability on the given path.
117
116
 
118
117
 
119
- :param builtins.str namespace: The namespace of the target resource.
118
+ :param _builtins.str namespace: The namespace of the target resource.
120
119
  The value should not contain leading or trailing forward slashes.
121
120
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
122
121
  *Available only for Vault Enterprise*.
123
- :param builtins.str path: Full KV-V1 path where secrets will be listed.
122
+ :param _builtins.str path: Full KV-V1 path where secrets will be listed.
124
123
  """
125
124
  __args__ = dict()
126
125
  __args__['namespace'] = namespace
@@ -133,8 +132,8 @@ def get_secrets_list(namespace: Optional[builtins.str] = None,
133
132
  names=pulumi.get(__ret__, 'names'),
134
133
  namespace=pulumi.get(__ret__, 'namespace'),
135
134
  path=pulumi.get(__ret__, 'path'))
136
- def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
137
- path: Optional[pulumi.Input[builtins.str]] = None,
135
+ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
136
+ path: Optional[pulumi.Input[_builtins.str]] = None,
138
137
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretsListResult]:
139
138
  """
140
139
  ## Example Usage
@@ -169,11 +168,11 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[builtins.s
169
168
  Use of this resource requires the `read` capability on the given path.
170
169
 
171
170
 
172
- :param builtins.str namespace: The namespace of the target resource.
171
+ :param _builtins.str namespace: The namespace of the target resource.
173
172
  The value should not contain leading or trailing forward slashes.
174
173
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
175
174
  *Available only for Vault Enterprise*.
176
- :param builtins.str path: Full KV-V1 path where secrets will be listed.
175
+ :param _builtins.str path: Full KV-V1 path where secrets will be listed.
177
176
  """
178
177
  __args__ = dict()
179
178
  __args__['namespace'] = namespace
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -47,40 +46,40 @@ class GetSecretsListV2Result:
47
46
  raise TypeError("Expected argument 'path' to be a str")
48
47
  pulumi.set(__self__, "path", path)
49
48
 
50
- @property
49
+ @_builtins.property
51
50
  @pulumi.getter
52
- def id(self) -> builtins.str:
51
+ def id(self) -> _builtins.str:
53
52
  """
54
53
  The provider-assigned unique ID for this managed resource.
55
54
  """
56
55
  return pulumi.get(self, "id")
57
56
 
58
- @property
57
+ @_builtins.property
59
58
  @pulumi.getter
60
- def mount(self) -> builtins.str:
59
+ def mount(self) -> _builtins.str:
61
60
  return pulumi.get(self, "mount")
62
61
 
63
- @property
62
+ @_builtins.property
64
63
  @pulumi.getter
65
- def name(self) -> Optional[builtins.str]:
64
+ def name(self) -> Optional[_builtins.str]:
66
65
  return pulumi.get(self, "name")
67
66
 
68
- @property
67
+ @_builtins.property
69
68
  @pulumi.getter
70
- def names(self) -> Sequence[builtins.str]:
69
+ def names(self) -> Sequence[_builtins.str]:
71
70
  """
72
71
  List of all secret names listed under the given path.
73
72
  """
74
73
  return pulumi.get(self, "names")
75
74
 
76
- @property
75
+ @_builtins.property
77
76
  @pulumi.getter
78
- def namespace(self) -> Optional[builtins.str]:
77
+ def namespace(self) -> Optional[_builtins.str]:
79
78
  return pulumi.get(self, "namespace")
80
79
 
81
- @property
80
+ @_builtins.property
82
81
  @pulumi.getter
83
- def path(self) -> builtins.str:
82
+ def path(self) -> _builtins.str:
84
83
  """
85
84
  Full path where the KV-V2 secrets are listed.
86
85
  """
@@ -101,9 +100,9 @@ class AwaitableGetSecretsListV2Result(GetSecretsListV2Result):
101
100
  path=self.path)
102
101
 
103
102
 
104
- def get_secrets_list_v2(mount: Optional[builtins.str] = None,
105
- name: Optional[builtins.str] = None,
106
- namespace: Optional[builtins.str] = None,
103
+ def get_secrets_list_v2(mount: Optional[_builtins.str] = None,
104
+ name: Optional[_builtins.str] = None,
105
+ namespace: Optional[_builtins.str] = None,
107
106
  opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretsListV2Result:
108
107
  """
109
108
  ## Example Usage
@@ -148,12 +147,12 @@ def get_secrets_list_v2(mount: Optional[builtins.str] = None,
148
147
  Use of this resource requires the `read` capability on the given path.
149
148
 
150
149
 
151
- :param builtins.str mount: Path where KV-V2 engine is mounted.
152
- :param builtins.str name: Full name of the secret. For a nested secret
150
+ :param _builtins.str mount: Path where KV-V2 engine is mounted.
151
+ :param _builtins.str name: Full name of the secret. For a nested secret
153
152
  the name is the nested path excluding the mount and data
154
153
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
155
154
  the name is `foo/bar/baz`.
156
- :param builtins.str namespace: The namespace of the target resource.
155
+ :param _builtins.str namespace: The namespace of the target resource.
157
156
  The value should not contain leading or trailing forward slashes.
158
157
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
159
158
  *Available only for Vault Enterprise*.
@@ -172,9 +171,9 @@ def get_secrets_list_v2(mount: Optional[builtins.str] = None,
172
171
  names=pulumi.get(__ret__, 'names'),
173
172
  namespace=pulumi.get(__ret__, 'namespace'),
174
173
  path=pulumi.get(__ret__, 'path'))
175
- def get_secrets_list_v2_output(mount: Optional[pulumi.Input[builtins.str]] = None,
176
- name: Optional[pulumi.Input[Optional[builtins.str]]] = None,
177
- namespace: Optional[pulumi.Input[Optional[builtins.str]]] = None,
174
+ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[_builtins.str]] = None,
175
+ name: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
176
+ namespace: Optional[pulumi.Input[Optional[_builtins.str]]] = None,
178
177
  opts: Optional[Union[pulumi.InvokeOptions, pulumi.InvokeOutputOptions]] = None) -> pulumi.Output[GetSecretsListV2Result]:
179
178
  """
180
179
  ## Example Usage
@@ -219,12 +218,12 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[builtins.str]] = Non
219
218
  Use of this resource requires the `read` capability on the given path.
220
219
 
221
220
 
222
- :param builtins.str mount: Path where KV-V2 engine is mounted.
223
- :param builtins.str name: Full name of the secret. For a nested secret
221
+ :param _builtins.str mount: Path where KV-V2 engine is mounted.
222
+ :param _builtins.str name: Full name of the secret. For a nested secret
224
223
  the name is the nested path excluding the mount and data
225
224
  prefix. For example, for a secret at `kvv2/data/foo/bar/baz`
226
225
  the name is `foo/bar/baz`.
227
- :param builtins.str namespace: The namespace of the target resource.
226
+ :param _builtins.str namespace: The namespace of the target resource.
228
227
  The value should not contain leading or trailing forward slashes.
229
228
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
230
229
  *Available only for Vault Enterprise*.
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -43,18 +42,18 @@ class SecretV2CustomMetadata(dict):
43
42
  return super().get(key, default)
44
43
 
45
44
  def __init__(__self__, *,
46
- cas_required: Optional[builtins.bool] = None,
47
- data: Optional[Mapping[str, builtins.str]] = None,
48
- delete_version_after: Optional[builtins.int] = None,
49
- max_versions: Optional[builtins.int] = None):
45
+ cas_required: Optional[_builtins.bool] = None,
46
+ data: Optional[Mapping[str, _builtins.str]] = None,
47
+ delete_version_after: Optional[_builtins.int] = None,
48
+ max_versions: Optional[_builtins.int] = None):
50
49
  """
51
- :param builtins.bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
52
- :param Mapping[str, builtins.str] data: **Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
50
+ :param _builtins.bool cas_required: If true, all keys will require the cas parameter to be set on all write requests.
51
+ :param Mapping[str, _builtins.str] data: **Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
53
52
  secret data from Vault**. A mapping whose keys are the top-level data keys returned from
54
53
  Vault and whose values are the corresponding values. This map can only represent string data,
55
54
  so any non-string values returned from Vault are serialized as JSON.
56
- :param builtins.int delete_version_after: If set, specifies the length of time before a version is deleted.
57
- :param builtins.int max_versions: The number of versions to keep per key.
55
+ :param _builtins.int delete_version_after: If set, specifies the length of time before a version is deleted.
56
+ :param _builtins.int max_versions: The number of versions to keep per key.
58
57
  """
59
58
  if cas_required is not None:
60
59
  pulumi.set(__self__, "cas_required", cas_required)
@@ -65,17 +64,17 @@ class SecretV2CustomMetadata(dict):
65
64
  if max_versions is not None:
66
65
  pulumi.set(__self__, "max_versions", max_versions)
67
66
 
68
- @property
67
+ @_builtins.property
69
68
  @pulumi.getter(name="casRequired")
70
- def cas_required(self) -> Optional[builtins.bool]:
69
+ def cas_required(self) -> Optional[_builtins.bool]:
71
70
  """
72
71
  If true, all keys will require the cas parameter to be set on all write requests.
73
72
  """
74
73
  return pulumi.get(self, "cas_required")
75
74
 
76
- @property
75
+ @_builtins.property
77
76
  @pulumi.getter
78
- def data(self) -> Optional[Mapping[str, builtins.str]]:
77
+ def data(self) -> Optional[Mapping[str, _builtins.str]]:
79
78
  """
80
79
  **Deprecated. Please use new ephemeral resource `kv.SecretV2` to read back
81
80
  secret data from Vault**. A mapping whose keys are the top-level data keys returned from
@@ -84,17 +83,17 @@ class SecretV2CustomMetadata(dict):
84
83
  """
85
84
  return pulumi.get(self, "data")
86
85
 
87
- @property
86
+ @_builtins.property
88
87
  @pulumi.getter(name="deleteVersionAfter")
89
- def delete_version_after(self) -> Optional[builtins.int]:
88
+ def delete_version_after(self) -> Optional[_builtins.int]:
90
89
  """
91
90
  If set, specifies the length of time before a version is deleted.
92
91
  """
93
92
  return pulumi.get(self, "delete_version_after")
94
93
 
95
- @property
94
+ @_builtins.property
96
95
  @pulumi.getter(name="maxVersions")
97
- def max_versions(self) -> Optional[builtins.int]:
96
+ def max_versions(self) -> Optional[_builtins.int]:
98
97
  """
99
98
  The number of versions to keep per key.
100
99
  """
pulumi_vault/kv/secret.py CHANGED
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,15 +19,15 @@ __all__ = ['SecretArgs', 'Secret']
20
19
  @pulumi.input_type
21
20
  class SecretArgs:
22
21
  def __init__(__self__, *,
23
- data_json: pulumi.Input[builtins.str],
24
- path: pulumi.Input[builtins.str],
25
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ data_json: pulumi.Input[_builtins.str],
23
+ path: pulumi.Input[_builtins.str],
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
26
25
  """
27
26
  The set of arguments for constructing a Secret resource.
28
- :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
27
+ :param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
29
28
  written as the secret data at the given path.
30
- :param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
31
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
29
+ :param pulumi.Input[_builtins.str] path: Full path of the KV-V1 secret.
30
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
32
31
  The value should not contain leading or trailing forward slashes.
33
32
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
33
  *Available only for Vault Enterprise*.
@@ -38,9 +37,9 @@ class SecretArgs:
38
37
  if namespace is not None:
39
38
  pulumi.set(__self__, "namespace", namespace)
40
39
 
41
- @property
40
+ @_builtins.property
42
41
  @pulumi.getter(name="dataJson")
43
- def data_json(self) -> pulumi.Input[builtins.str]:
42
+ def data_json(self) -> pulumi.Input[_builtins.str]:
44
43
  """
45
44
  JSON-encoded string that will be
46
45
  written as the secret data at the given path.
@@ -48,24 +47,24 @@ class SecretArgs:
48
47
  return pulumi.get(self, "data_json")
49
48
 
50
49
  @data_json.setter
51
- def data_json(self, value: pulumi.Input[builtins.str]):
50
+ def data_json(self, value: pulumi.Input[_builtins.str]):
52
51
  pulumi.set(self, "data_json", value)
53
52
 
54
- @property
53
+ @_builtins.property
55
54
  @pulumi.getter
56
- def path(self) -> pulumi.Input[builtins.str]:
55
+ def path(self) -> pulumi.Input[_builtins.str]:
57
56
  """
58
57
  Full path of the KV-V1 secret.
59
58
  """
60
59
  return pulumi.get(self, "path")
61
60
 
62
61
  @path.setter
63
- def path(self, value: pulumi.Input[builtins.str]):
62
+ def path(self, value: pulumi.Input[_builtins.str]):
64
63
  pulumi.set(self, "path", value)
65
64
 
66
- @property
65
+ @_builtins.property
67
66
  @pulumi.getter
68
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
67
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
69
68
  """
70
69
  The namespace to provision the resource in.
71
70
  The value should not contain leading or trailing forward slashes.
@@ -75,30 +74,30 @@ class SecretArgs:
75
74
  return pulumi.get(self, "namespace")
76
75
 
77
76
  @namespace.setter
78
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
77
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
79
78
  pulumi.set(self, "namespace", value)
80
79
 
81
80
 
82
81
  @pulumi.input_type
83
82
  class _SecretState:
84
83
  def __init__(__self__, *,
85
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
86
- data_json: Optional[pulumi.Input[builtins.str]] = None,
87
- namespace: Optional[pulumi.Input[builtins.str]] = None,
88
- path: Optional[pulumi.Input[builtins.str]] = None):
84
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
85
+ data_json: Optional[pulumi.Input[_builtins.str]] = None,
86
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
87
+ path: Optional[pulumi.Input[_builtins.str]] = None):
89
88
  """
90
89
  Input properties used for looking up and filtering Secret resources.
91
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
90
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
92
91
  Vault and whose values are the corresponding values. This map can only
93
92
  represent string data, so any non-string values returned from Vault are
94
93
  serialized as JSON.
95
- :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
94
+ :param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
96
95
  written as the secret data at the given path.
97
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
96
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
98
97
  The value should not contain leading or trailing forward slashes.
99
98
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
100
99
  *Available only for Vault Enterprise*.
101
- :param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
100
+ :param pulumi.Input[_builtins.str] path: Full path of the KV-V1 secret.
102
101
  """
103
102
  if data is not None:
104
103
  pulumi.set(__self__, "data", data)
@@ -109,9 +108,9 @@ class _SecretState:
109
108
  if path is not None:
110
109
  pulumi.set(__self__, "path", path)
111
110
 
112
- @property
111
+ @_builtins.property
113
112
  @pulumi.getter
114
- def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
113
+ def data(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
115
114
  """
116
115
  A mapping whose keys are the top-level data keys returned from
117
116
  Vault and whose values are the corresponding values. This map can only
@@ -121,12 +120,12 @@ class _SecretState:
121
120
  return pulumi.get(self, "data")
122
121
 
123
122
  @data.setter
124
- def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
123
+ def data(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
125
124
  pulumi.set(self, "data", value)
126
125
 
127
- @property
126
+ @_builtins.property
128
127
  @pulumi.getter(name="dataJson")
129
- def data_json(self) -> Optional[pulumi.Input[builtins.str]]:
128
+ def data_json(self) -> Optional[pulumi.Input[_builtins.str]]:
130
129
  """
131
130
  JSON-encoded string that will be
132
131
  written as the secret data at the given path.
@@ -134,12 +133,12 @@ class _SecretState:
134
133
  return pulumi.get(self, "data_json")
135
134
 
136
135
  @data_json.setter
137
- def data_json(self, value: Optional[pulumi.Input[builtins.str]]):
136
+ def data_json(self, value: Optional[pulumi.Input[_builtins.str]]):
138
137
  pulumi.set(self, "data_json", value)
139
138
 
140
- @property
139
+ @_builtins.property
141
140
  @pulumi.getter
142
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
141
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
143
142
  """
144
143
  The namespace to provision the resource in.
145
144
  The value should not contain leading or trailing forward slashes.
@@ -149,19 +148,19 @@ class _SecretState:
149
148
  return pulumi.get(self, "namespace")
150
149
 
151
150
  @namespace.setter
152
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
151
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
153
152
  pulumi.set(self, "namespace", value)
154
153
 
155
- @property
154
+ @_builtins.property
156
155
  @pulumi.getter
157
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
156
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
158
157
  """
159
158
  Full path of the KV-V1 secret.
160
159
  """
161
160
  return pulumi.get(self, "path")
162
161
 
163
162
  @path.setter
164
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
163
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
165
164
  pulumi.set(self, "path", value)
166
165
 
167
166
 
@@ -171,9 +170,9 @@ class Secret(pulumi.CustomResource):
171
170
  def __init__(__self__,
172
171
  resource_name: str,
173
172
  opts: Optional[pulumi.ResourceOptions] = None,
174
- data_json: Optional[pulumi.Input[builtins.str]] = None,
175
- namespace: Optional[pulumi.Input[builtins.str]] = None,
176
- path: Optional[pulumi.Input[builtins.str]] = None,
173
+ data_json: Optional[pulumi.Input[_builtins.str]] = None,
174
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
175
+ path: Optional[pulumi.Input[_builtins.str]] = None,
177
176
  __props__=None):
178
177
  """
179
178
  Writes a KV-V1 secret to a given path in Vault.
@@ -220,13 +219,13 @@ class Secret(pulumi.CustomResource):
220
219
 
221
220
  :param str resource_name: The name of the resource.
222
221
  :param pulumi.ResourceOptions opts: Options for the resource.
223
- :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
222
+ :param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
224
223
  written as the secret data at the given path.
225
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
224
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
226
225
  The value should not contain leading or trailing forward slashes.
227
226
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
228
227
  *Available only for Vault Enterprise*.
229
- :param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
228
+ :param pulumi.Input[_builtins.str] path: Full path of the KV-V1 secret.
230
229
  """
231
230
  ...
232
231
  @overload
@@ -292,9 +291,9 @@ class Secret(pulumi.CustomResource):
292
291
  def _internal_init(__self__,
293
292
  resource_name: str,
294
293
  opts: Optional[pulumi.ResourceOptions] = None,
295
- data_json: Optional[pulumi.Input[builtins.str]] = None,
296
- namespace: Optional[pulumi.Input[builtins.str]] = None,
297
- path: Optional[pulumi.Input[builtins.str]] = None,
294
+ data_json: Optional[pulumi.Input[_builtins.str]] = None,
295
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
296
+ path: Optional[pulumi.Input[_builtins.str]] = None,
298
297
  __props__=None):
299
298
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
300
299
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -324,10 +323,10 @@ class Secret(pulumi.CustomResource):
324
323
  def get(resource_name: str,
325
324
  id: pulumi.Input[str],
326
325
  opts: Optional[pulumi.ResourceOptions] = None,
327
- data: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
328
- data_json: Optional[pulumi.Input[builtins.str]] = None,
329
- namespace: Optional[pulumi.Input[builtins.str]] = None,
330
- path: Optional[pulumi.Input[builtins.str]] = None) -> 'Secret':
326
+ data: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
327
+ data_json: Optional[pulumi.Input[_builtins.str]] = None,
328
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
329
+ path: Optional[pulumi.Input[_builtins.str]] = None) -> 'Secret':
331
330
  """
332
331
  Get an existing Secret resource's state with the given name, id, and optional extra
333
332
  properties used to qualify the lookup.
@@ -335,17 +334,17 @@ class Secret(pulumi.CustomResource):
335
334
  :param str resource_name: The unique name of the resulting resource.
336
335
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
337
336
  :param pulumi.ResourceOptions opts: Options for the resource.
338
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
337
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] data: A mapping whose keys are the top-level data keys returned from
339
338
  Vault and whose values are the corresponding values. This map can only
340
339
  represent string data, so any non-string values returned from Vault are
341
340
  serialized as JSON.
342
- :param pulumi.Input[builtins.str] data_json: JSON-encoded string that will be
341
+ :param pulumi.Input[_builtins.str] data_json: JSON-encoded string that will be
343
342
  written as the secret data at the given path.
344
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
343
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
345
344
  The value should not contain leading or trailing forward slashes.
346
345
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
347
346
  *Available only for Vault Enterprise*.
348
- :param pulumi.Input[builtins.str] path: Full path of the KV-V1 secret.
347
+ :param pulumi.Input[_builtins.str] path: Full path of the KV-V1 secret.
349
348
  """
350
349
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
351
350
 
@@ -357,9 +356,9 @@ class Secret(pulumi.CustomResource):
357
356
  __props__.__dict__["path"] = path
358
357
  return Secret(resource_name, opts=opts, __props__=__props__)
359
358
 
360
- @property
359
+ @_builtins.property
361
360
  @pulumi.getter
362
- def data(self) -> pulumi.Output[Mapping[str, builtins.str]]:
361
+ def data(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
363
362
  """
364
363
  A mapping whose keys are the top-level data keys returned from
365
364
  Vault and whose values are the corresponding values. This map can only
@@ -368,18 +367,18 @@ class Secret(pulumi.CustomResource):
368
367
  """
369
368
  return pulumi.get(self, "data")
370
369
 
371
- @property
370
+ @_builtins.property
372
371
  @pulumi.getter(name="dataJson")
373
- def data_json(self) -> pulumi.Output[builtins.str]:
372
+ def data_json(self) -> pulumi.Output[_builtins.str]:
374
373
  """
375
374
  JSON-encoded string that will be
376
375
  written as the secret data at the given path.
377
376
  """
378
377
  return pulumi.get(self, "data_json")
379
378
 
380
- @property
379
+ @_builtins.property
381
380
  @pulumi.getter
382
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
381
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
383
382
  """
384
383
  The namespace to provision the resource in.
385
384
  The value should not contain leading or trailing forward slashes.
@@ -388,9 +387,9 @@ class Secret(pulumi.CustomResource):
388
387
  """
389
388
  return pulumi.get(self, "namespace")
390
389
 
391
- @property
390
+ @_builtins.property
392
391
  @pulumi.getter
393
- def path(self) -> pulumi.Output[builtins.str]:
392
+ def path(self) -> pulumi.Output[_builtins.str]:
394
393
  """
395
394
  Full path of the KV-V1 secret.
396
395
  """