pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,608 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['TransformationArgs', 'Transformation']
18
+
19
+ @pulumi.input_type
20
+ class TransformationArgs:
21
+ def __init__(__self__, *,
22
+ path: pulumi.Input[_builtins.str],
23
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ deletion_allowed: Optional[pulumi.Input[_builtins.bool]] = None,
25
+ masking_character: Optional[pulumi.Input[_builtins.str]] = None,
26
+ name: Optional[pulumi.Input[_builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
28
+ template: Optional[pulumi.Input[_builtins.str]] = None,
29
+ templates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
30
+ tweak_source: Optional[pulumi.Input[_builtins.str]] = None,
31
+ type: Optional[pulumi.Input[_builtins.str]] = None):
32
+ """
33
+ The set of arguments for constructing a Transformation resource.
34
+ :param pulumi.Input[_builtins.str] path: Path to where the back-end is mounted within Vault.
35
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: The set of roles allowed to perform this transformation.
36
+ :param pulumi.Input[_builtins.bool] deletion_allowed: If true, this transform can be deleted.
37
+ Otherwise, deletion is blocked while this value remains false. Default: `false`
38
+ *Only supported on vault-1.12+*
39
+ :param pulumi.Input[_builtins.str] masking_character: The character used to replace data when in masking mode
40
+ :param pulumi.Input[_builtins.str] name: The name of the transformation.
41
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
42
+ The value should not contain leading or trailing forward slashes.
43
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
44
+ *Available only for Vault Enterprise*.
45
+ :param pulumi.Input[_builtins.str] template: The name of the template to use.
46
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] templates: Templates configured for transformation.
47
+ :param pulumi.Input[_builtins.str] tweak_source: The source of where the tweak value comes from. Only valid when in FPE mode.
48
+ :param pulumi.Input[_builtins.str] type: The type of transformation to perform.
49
+ """
50
+ pulumi.set(__self__, "path", path)
51
+ if allowed_roles is not None:
52
+ pulumi.set(__self__, "allowed_roles", allowed_roles)
53
+ if deletion_allowed is not None:
54
+ pulumi.set(__self__, "deletion_allowed", deletion_allowed)
55
+ if masking_character is not None:
56
+ pulumi.set(__self__, "masking_character", masking_character)
57
+ if name is not None:
58
+ pulumi.set(__self__, "name", name)
59
+ if namespace is not None:
60
+ pulumi.set(__self__, "namespace", namespace)
61
+ if template is not None:
62
+ pulumi.set(__self__, "template", template)
63
+ if templates is not None:
64
+ pulumi.set(__self__, "templates", templates)
65
+ if tweak_source is not None:
66
+ pulumi.set(__self__, "tweak_source", tweak_source)
67
+ if type is not None:
68
+ pulumi.set(__self__, "type", type)
69
+
70
+ @_builtins.property
71
+ @pulumi.getter
72
+ def path(self) -> pulumi.Input[_builtins.str]:
73
+ """
74
+ Path to where the back-end is mounted within Vault.
75
+ """
76
+ return pulumi.get(self, "path")
77
+
78
+ @path.setter
79
+ def path(self, value: pulumi.Input[_builtins.str]):
80
+ pulumi.set(self, "path", value)
81
+
82
+ @_builtins.property
83
+ @pulumi.getter(name="allowedRoles")
84
+ def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
85
+ """
86
+ The set of roles allowed to perform this transformation.
87
+ """
88
+ return pulumi.get(self, "allowed_roles")
89
+
90
+ @allowed_roles.setter
91
+ def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
92
+ pulumi.set(self, "allowed_roles", value)
93
+
94
+ @_builtins.property
95
+ @pulumi.getter(name="deletionAllowed")
96
+ def deletion_allowed(self) -> Optional[pulumi.Input[_builtins.bool]]:
97
+ """
98
+ If true, this transform can be deleted.
99
+ Otherwise, deletion is blocked while this value remains false. Default: `false`
100
+ *Only supported on vault-1.12+*
101
+ """
102
+ return pulumi.get(self, "deletion_allowed")
103
+
104
+ @deletion_allowed.setter
105
+ def deletion_allowed(self, value: Optional[pulumi.Input[_builtins.bool]]):
106
+ pulumi.set(self, "deletion_allowed", value)
107
+
108
+ @_builtins.property
109
+ @pulumi.getter(name="maskingCharacter")
110
+ def masking_character(self) -> Optional[pulumi.Input[_builtins.str]]:
111
+ """
112
+ The character used to replace data when in masking mode
113
+ """
114
+ return pulumi.get(self, "masking_character")
115
+
116
+ @masking_character.setter
117
+ def masking_character(self, value: Optional[pulumi.Input[_builtins.str]]):
118
+ pulumi.set(self, "masking_character", value)
119
+
120
+ @_builtins.property
121
+ @pulumi.getter
122
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
123
+ """
124
+ The name of the transformation.
125
+ """
126
+ return pulumi.get(self, "name")
127
+
128
+ @name.setter
129
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
130
+ pulumi.set(self, "name", value)
131
+
132
+ @_builtins.property
133
+ @pulumi.getter
134
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
135
+ """
136
+ The namespace to provision the resource in.
137
+ The value should not contain leading or trailing forward slashes.
138
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
139
+ *Available only for Vault Enterprise*.
140
+ """
141
+ return pulumi.get(self, "namespace")
142
+
143
+ @namespace.setter
144
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
145
+ pulumi.set(self, "namespace", value)
146
+
147
+ @_builtins.property
148
+ @pulumi.getter
149
+ def template(self) -> Optional[pulumi.Input[_builtins.str]]:
150
+ """
151
+ The name of the template to use.
152
+ """
153
+ return pulumi.get(self, "template")
154
+
155
+ @template.setter
156
+ def template(self, value: Optional[pulumi.Input[_builtins.str]]):
157
+ pulumi.set(self, "template", value)
158
+
159
+ @_builtins.property
160
+ @pulumi.getter
161
+ def templates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
162
+ """
163
+ Templates configured for transformation.
164
+ """
165
+ return pulumi.get(self, "templates")
166
+
167
+ @templates.setter
168
+ def templates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
169
+ pulumi.set(self, "templates", value)
170
+
171
+ @_builtins.property
172
+ @pulumi.getter(name="tweakSource")
173
+ def tweak_source(self) -> Optional[pulumi.Input[_builtins.str]]:
174
+ """
175
+ The source of where the tweak value comes from. Only valid when in FPE mode.
176
+ """
177
+ return pulumi.get(self, "tweak_source")
178
+
179
+ @tweak_source.setter
180
+ def tweak_source(self, value: Optional[pulumi.Input[_builtins.str]]):
181
+ pulumi.set(self, "tweak_source", value)
182
+
183
+ @_builtins.property
184
+ @pulumi.getter
185
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
186
+ """
187
+ The type of transformation to perform.
188
+ """
189
+ return pulumi.get(self, "type")
190
+
191
+ @type.setter
192
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
193
+ pulumi.set(self, "type", value)
194
+
195
+
196
+ @pulumi.input_type
197
+ class _TransformationState:
198
+ def __init__(__self__, *,
199
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
200
+ deletion_allowed: Optional[pulumi.Input[_builtins.bool]] = None,
201
+ masking_character: Optional[pulumi.Input[_builtins.str]] = None,
202
+ name: Optional[pulumi.Input[_builtins.str]] = None,
203
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
204
+ path: Optional[pulumi.Input[_builtins.str]] = None,
205
+ template: Optional[pulumi.Input[_builtins.str]] = None,
206
+ templates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
207
+ tweak_source: Optional[pulumi.Input[_builtins.str]] = None,
208
+ type: Optional[pulumi.Input[_builtins.str]] = None):
209
+ """
210
+ Input properties used for looking up and filtering Transformation resources.
211
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: The set of roles allowed to perform this transformation.
212
+ :param pulumi.Input[_builtins.bool] deletion_allowed: If true, this transform can be deleted.
213
+ Otherwise, deletion is blocked while this value remains false. Default: `false`
214
+ *Only supported on vault-1.12+*
215
+ :param pulumi.Input[_builtins.str] masking_character: The character used to replace data when in masking mode
216
+ :param pulumi.Input[_builtins.str] name: The name of the transformation.
217
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
218
+ The value should not contain leading or trailing forward slashes.
219
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
220
+ *Available only for Vault Enterprise*.
221
+ :param pulumi.Input[_builtins.str] path: Path to where the back-end is mounted within Vault.
222
+ :param pulumi.Input[_builtins.str] template: The name of the template to use.
223
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] templates: Templates configured for transformation.
224
+ :param pulumi.Input[_builtins.str] tweak_source: The source of where the tweak value comes from. Only valid when in FPE mode.
225
+ :param pulumi.Input[_builtins.str] type: The type of transformation to perform.
226
+ """
227
+ if allowed_roles is not None:
228
+ pulumi.set(__self__, "allowed_roles", allowed_roles)
229
+ if deletion_allowed is not None:
230
+ pulumi.set(__self__, "deletion_allowed", deletion_allowed)
231
+ if masking_character is not None:
232
+ pulumi.set(__self__, "masking_character", masking_character)
233
+ if name is not None:
234
+ pulumi.set(__self__, "name", name)
235
+ if namespace is not None:
236
+ pulumi.set(__self__, "namespace", namespace)
237
+ if path is not None:
238
+ pulumi.set(__self__, "path", path)
239
+ if template is not None:
240
+ pulumi.set(__self__, "template", template)
241
+ if templates is not None:
242
+ pulumi.set(__self__, "templates", templates)
243
+ if tweak_source is not None:
244
+ pulumi.set(__self__, "tweak_source", tweak_source)
245
+ if type is not None:
246
+ pulumi.set(__self__, "type", type)
247
+
248
+ @_builtins.property
249
+ @pulumi.getter(name="allowedRoles")
250
+ def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
251
+ """
252
+ The set of roles allowed to perform this transformation.
253
+ """
254
+ return pulumi.get(self, "allowed_roles")
255
+
256
+ @allowed_roles.setter
257
+ def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
258
+ pulumi.set(self, "allowed_roles", value)
259
+
260
+ @_builtins.property
261
+ @pulumi.getter(name="deletionAllowed")
262
+ def deletion_allowed(self) -> Optional[pulumi.Input[_builtins.bool]]:
263
+ """
264
+ If true, this transform can be deleted.
265
+ Otherwise, deletion is blocked while this value remains false. Default: `false`
266
+ *Only supported on vault-1.12+*
267
+ """
268
+ return pulumi.get(self, "deletion_allowed")
269
+
270
+ @deletion_allowed.setter
271
+ def deletion_allowed(self, value: Optional[pulumi.Input[_builtins.bool]]):
272
+ pulumi.set(self, "deletion_allowed", value)
273
+
274
+ @_builtins.property
275
+ @pulumi.getter(name="maskingCharacter")
276
+ def masking_character(self) -> Optional[pulumi.Input[_builtins.str]]:
277
+ """
278
+ The character used to replace data when in masking mode
279
+ """
280
+ return pulumi.get(self, "masking_character")
281
+
282
+ @masking_character.setter
283
+ def masking_character(self, value: Optional[pulumi.Input[_builtins.str]]):
284
+ pulumi.set(self, "masking_character", value)
285
+
286
+ @_builtins.property
287
+ @pulumi.getter
288
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
289
+ """
290
+ The name of the transformation.
291
+ """
292
+ return pulumi.get(self, "name")
293
+
294
+ @name.setter
295
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
296
+ pulumi.set(self, "name", value)
297
+
298
+ @_builtins.property
299
+ @pulumi.getter
300
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
301
+ """
302
+ The namespace to provision the resource in.
303
+ The value should not contain leading or trailing forward slashes.
304
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
305
+ *Available only for Vault Enterprise*.
306
+ """
307
+ return pulumi.get(self, "namespace")
308
+
309
+ @namespace.setter
310
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
311
+ pulumi.set(self, "namespace", value)
312
+
313
+ @_builtins.property
314
+ @pulumi.getter
315
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
316
+ """
317
+ Path to where the back-end is mounted within Vault.
318
+ """
319
+ return pulumi.get(self, "path")
320
+
321
+ @path.setter
322
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
323
+ pulumi.set(self, "path", value)
324
+
325
+ @_builtins.property
326
+ @pulumi.getter
327
+ def template(self) -> Optional[pulumi.Input[_builtins.str]]:
328
+ """
329
+ The name of the template to use.
330
+ """
331
+ return pulumi.get(self, "template")
332
+
333
+ @template.setter
334
+ def template(self, value: Optional[pulumi.Input[_builtins.str]]):
335
+ pulumi.set(self, "template", value)
336
+
337
+ @_builtins.property
338
+ @pulumi.getter
339
+ def templates(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
340
+ """
341
+ Templates configured for transformation.
342
+ """
343
+ return pulumi.get(self, "templates")
344
+
345
+ @templates.setter
346
+ def templates(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
347
+ pulumi.set(self, "templates", value)
348
+
349
+ @_builtins.property
350
+ @pulumi.getter(name="tweakSource")
351
+ def tweak_source(self) -> Optional[pulumi.Input[_builtins.str]]:
352
+ """
353
+ The source of where the tweak value comes from. Only valid when in FPE mode.
354
+ """
355
+ return pulumi.get(self, "tweak_source")
356
+
357
+ @tweak_source.setter
358
+ def tweak_source(self, value: Optional[pulumi.Input[_builtins.str]]):
359
+ pulumi.set(self, "tweak_source", value)
360
+
361
+ @_builtins.property
362
+ @pulumi.getter
363
+ def type(self) -> Optional[pulumi.Input[_builtins.str]]:
364
+ """
365
+ The type of transformation to perform.
366
+ """
367
+ return pulumi.get(self, "type")
368
+
369
+ @type.setter
370
+ def type(self, value: Optional[pulumi.Input[_builtins.str]]):
371
+ pulumi.set(self, "type", value)
372
+
373
+
374
+ @pulumi.type_token("vault:transform/transformation:Transformation")
375
+ class Transformation(pulumi.CustomResource):
376
+ @overload
377
+ def __init__(__self__,
378
+ resource_name: str,
379
+ opts: Optional[pulumi.ResourceOptions] = None,
380
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
381
+ deletion_allowed: Optional[pulumi.Input[_builtins.bool]] = None,
382
+ masking_character: Optional[pulumi.Input[_builtins.str]] = None,
383
+ name: Optional[pulumi.Input[_builtins.str]] = None,
384
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
385
+ path: Optional[pulumi.Input[_builtins.str]] = None,
386
+ template: Optional[pulumi.Input[_builtins.str]] = None,
387
+ templates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
388
+ tweak_source: Optional[pulumi.Input[_builtins.str]] = None,
389
+ type: Optional[pulumi.Input[_builtins.str]] = None,
390
+ __props__=None):
391
+ """
392
+ Create a Transformation resource with the given unique name, props, and options.
393
+ :param str resource_name: The name of the resource.
394
+ :param pulumi.ResourceOptions opts: Options for the resource.
395
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: The set of roles allowed to perform this transformation.
396
+ :param pulumi.Input[_builtins.bool] deletion_allowed: If true, this transform can be deleted.
397
+ Otherwise, deletion is blocked while this value remains false. Default: `false`
398
+ *Only supported on vault-1.12+*
399
+ :param pulumi.Input[_builtins.str] masking_character: The character used to replace data when in masking mode
400
+ :param pulumi.Input[_builtins.str] name: The name of the transformation.
401
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
402
+ The value should not contain leading or trailing forward slashes.
403
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
404
+ *Available only for Vault Enterprise*.
405
+ :param pulumi.Input[_builtins.str] path: Path to where the back-end is mounted within Vault.
406
+ :param pulumi.Input[_builtins.str] template: The name of the template to use.
407
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] templates: Templates configured for transformation.
408
+ :param pulumi.Input[_builtins.str] tweak_source: The source of where the tweak value comes from. Only valid when in FPE mode.
409
+ :param pulumi.Input[_builtins.str] type: The type of transformation to perform.
410
+ """
411
+ ...
412
+ @overload
413
+ def __init__(__self__,
414
+ resource_name: str,
415
+ args: TransformationArgs,
416
+ opts: Optional[pulumi.ResourceOptions] = None):
417
+ """
418
+ Create a Transformation resource with the given unique name, props, and options.
419
+ :param str resource_name: The name of the resource.
420
+ :param TransformationArgs args: The arguments to use to populate this resource's properties.
421
+ :param pulumi.ResourceOptions opts: Options for the resource.
422
+ """
423
+ ...
424
+ def __init__(__self__, resource_name: str, *args, **kwargs):
425
+ resource_args, opts = _utilities.get_resource_args_opts(TransformationArgs, pulumi.ResourceOptions, *args, **kwargs)
426
+ if resource_args is not None:
427
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
428
+ else:
429
+ __self__._internal_init(resource_name, *args, **kwargs)
430
+
431
+ def _internal_init(__self__,
432
+ resource_name: str,
433
+ opts: Optional[pulumi.ResourceOptions] = None,
434
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
435
+ deletion_allowed: Optional[pulumi.Input[_builtins.bool]] = None,
436
+ masking_character: Optional[pulumi.Input[_builtins.str]] = None,
437
+ name: Optional[pulumi.Input[_builtins.str]] = None,
438
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
439
+ path: Optional[pulumi.Input[_builtins.str]] = None,
440
+ template: Optional[pulumi.Input[_builtins.str]] = None,
441
+ templates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
442
+ tweak_source: Optional[pulumi.Input[_builtins.str]] = None,
443
+ type: Optional[pulumi.Input[_builtins.str]] = None,
444
+ __props__=None):
445
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
446
+ if not isinstance(opts, pulumi.ResourceOptions):
447
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
448
+ if opts.id is None:
449
+ if __props__ is not None:
450
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
451
+ __props__ = TransformationArgs.__new__(TransformationArgs)
452
+
453
+ __props__.__dict__["allowed_roles"] = allowed_roles
454
+ __props__.__dict__["deletion_allowed"] = deletion_allowed
455
+ __props__.__dict__["masking_character"] = masking_character
456
+ __props__.__dict__["name"] = name
457
+ __props__.__dict__["namespace"] = namespace
458
+ if path is None and not opts.urn:
459
+ raise TypeError("Missing required property 'path'")
460
+ __props__.__dict__["path"] = path
461
+ __props__.__dict__["template"] = template
462
+ __props__.__dict__["templates"] = templates
463
+ __props__.__dict__["tweak_source"] = tweak_source
464
+ __props__.__dict__["type"] = type
465
+ super(Transformation, __self__).__init__(
466
+ 'vault:transform/transformation:Transformation',
467
+ resource_name,
468
+ __props__,
469
+ opts)
470
+
471
+ @staticmethod
472
+ def get(resource_name: str,
473
+ id: pulumi.Input[str],
474
+ opts: Optional[pulumi.ResourceOptions] = None,
475
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
476
+ deletion_allowed: Optional[pulumi.Input[_builtins.bool]] = None,
477
+ masking_character: Optional[pulumi.Input[_builtins.str]] = None,
478
+ name: Optional[pulumi.Input[_builtins.str]] = None,
479
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
480
+ path: Optional[pulumi.Input[_builtins.str]] = None,
481
+ template: Optional[pulumi.Input[_builtins.str]] = None,
482
+ templates: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
483
+ tweak_source: Optional[pulumi.Input[_builtins.str]] = None,
484
+ type: Optional[pulumi.Input[_builtins.str]] = None) -> 'Transformation':
485
+ """
486
+ Get an existing Transformation resource's state with the given name, id, and optional extra
487
+ properties used to qualify the lookup.
488
+
489
+ :param str resource_name: The unique name of the resulting resource.
490
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
491
+ :param pulumi.ResourceOptions opts: Options for the resource.
492
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_roles: The set of roles allowed to perform this transformation.
493
+ :param pulumi.Input[_builtins.bool] deletion_allowed: If true, this transform can be deleted.
494
+ Otherwise, deletion is blocked while this value remains false. Default: `false`
495
+ *Only supported on vault-1.12+*
496
+ :param pulumi.Input[_builtins.str] masking_character: The character used to replace data when in masking mode
497
+ :param pulumi.Input[_builtins.str] name: The name of the transformation.
498
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
499
+ The value should not contain leading or trailing forward slashes.
500
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
501
+ *Available only for Vault Enterprise*.
502
+ :param pulumi.Input[_builtins.str] path: Path to where the back-end is mounted within Vault.
503
+ :param pulumi.Input[_builtins.str] template: The name of the template to use.
504
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] templates: Templates configured for transformation.
505
+ :param pulumi.Input[_builtins.str] tweak_source: The source of where the tweak value comes from. Only valid when in FPE mode.
506
+ :param pulumi.Input[_builtins.str] type: The type of transformation to perform.
507
+ """
508
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
509
+
510
+ __props__ = _TransformationState.__new__(_TransformationState)
511
+
512
+ __props__.__dict__["allowed_roles"] = allowed_roles
513
+ __props__.__dict__["deletion_allowed"] = deletion_allowed
514
+ __props__.__dict__["masking_character"] = masking_character
515
+ __props__.__dict__["name"] = name
516
+ __props__.__dict__["namespace"] = namespace
517
+ __props__.__dict__["path"] = path
518
+ __props__.__dict__["template"] = template
519
+ __props__.__dict__["templates"] = templates
520
+ __props__.__dict__["tweak_source"] = tweak_source
521
+ __props__.__dict__["type"] = type
522
+ return Transformation(resource_name, opts=opts, __props__=__props__)
523
+
524
+ @_builtins.property
525
+ @pulumi.getter(name="allowedRoles")
526
+ def allowed_roles(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
527
+ """
528
+ The set of roles allowed to perform this transformation.
529
+ """
530
+ return pulumi.get(self, "allowed_roles")
531
+
532
+ @_builtins.property
533
+ @pulumi.getter(name="deletionAllowed")
534
+ def deletion_allowed(self) -> pulumi.Output[Optional[_builtins.bool]]:
535
+ """
536
+ If true, this transform can be deleted.
537
+ Otherwise, deletion is blocked while this value remains false. Default: `false`
538
+ *Only supported on vault-1.12+*
539
+ """
540
+ return pulumi.get(self, "deletion_allowed")
541
+
542
+ @_builtins.property
543
+ @pulumi.getter(name="maskingCharacter")
544
+ def masking_character(self) -> pulumi.Output[Optional[_builtins.str]]:
545
+ """
546
+ The character used to replace data when in masking mode
547
+ """
548
+ return pulumi.get(self, "masking_character")
549
+
550
+ @_builtins.property
551
+ @pulumi.getter
552
+ def name(self) -> pulumi.Output[_builtins.str]:
553
+ """
554
+ The name of the transformation.
555
+ """
556
+ return pulumi.get(self, "name")
557
+
558
+ @_builtins.property
559
+ @pulumi.getter
560
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
561
+ """
562
+ The namespace to provision the resource in.
563
+ The value should not contain leading or trailing forward slashes.
564
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
565
+ *Available only for Vault Enterprise*.
566
+ """
567
+ return pulumi.get(self, "namespace")
568
+
569
+ @_builtins.property
570
+ @pulumi.getter
571
+ def path(self) -> pulumi.Output[_builtins.str]:
572
+ """
573
+ Path to where the back-end is mounted within Vault.
574
+ """
575
+ return pulumi.get(self, "path")
576
+
577
+ @_builtins.property
578
+ @pulumi.getter
579
+ def template(self) -> pulumi.Output[Optional[_builtins.str]]:
580
+ """
581
+ The name of the template to use.
582
+ """
583
+ return pulumi.get(self, "template")
584
+
585
+ @_builtins.property
586
+ @pulumi.getter
587
+ def templates(self) -> pulumi.Output[Sequence[_builtins.str]]:
588
+ """
589
+ Templates configured for transformation.
590
+ """
591
+ return pulumi.get(self, "templates")
592
+
593
+ @_builtins.property
594
+ @pulumi.getter(name="tweakSource")
595
+ def tweak_source(self) -> pulumi.Output[Optional[_builtins.str]]:
596
+ """
597
+ The source of where the tweak value comes from. Only valid when in FPE mode.
598
+ """
599
+ return pulumi.get(self, "tweak_source")
600
+
601
+ @_builtins.property
602
+ @pulumi.getter
603
+ def type(self) -> pulumi.Output[Optional[_builtins.str]]:
604
+ """
605
+ The type of transformation to perform.
606
+ """
607
+ return pulumi.get(self, "type")
608
+
@@ -0,0 +1,15 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ from .. import _utilities
7
+ import typing
8
+ # Export this package's modules as members:
9
+ from .get_cmac import *
10
+ from .get_decrypt import *
11
+ from .get_encrypt import *
12
+ from .get_sign import *
13
+ from .get_verify import *
14
+ from .secret_backend_key import *
15
+ from .secret_cache_config import *