pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,32 +20,32 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
19
20
  @pulumi.input_type
20
21
  class SecretBackendStaticRoleArgs:
21
22
  def __init__(__self__, *,
22
- rotation_period: pulumi.Input[int],
23
- username: pulumi.Input[str],
24
- assume_role_arn: Optional[pulumi.Input[str]] = None,
25
- assume_role_session_name: Optional[pulumi.Input[str]] = None,
26
- backend: Optional[pulumi.Input[str]] = None,
27
- external_id: Optional[pulumi.Input[str]] = None,
28
- name: Optional[pulumi.Input[str]] = None,
29
- namespace: Optional[pulumi.Input[str]] = None):
23
+ rotation_period: pulumi.Input[builtins.int],
24
+ username: pulumi.Input[builtins.str],
25
+ assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
26
+ assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
27
+ backend: Optional[pulumi.Input[builtins.str]] = None,
28
+ external_id: Optional[pulumi.Input[builtins.str]] = None,
29
+ name: Optional[pulumi.Input[builtins.str]] = None,
30
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
30
31
  """
31
32
  The set of arguments for constructing a SecretBackendStaticRole resource.
32
- :param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
33
- :param pulumi.Input[str] username: The username of the existing AWS IAM to manage password rotation for.
34
- :param pulumi.Input[str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
33
+ :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
34
+ :param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
35
+ :param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
35
36
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
36
37
  If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
37
38
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
38
- :param pulumi.Input[str] assume_role_session_name: Specifies the session name to use when assuming the role.
39
+ :param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
39
40
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
40
41
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
41
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
42
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
42
43
  not begin or end with a `/`. Defaults to `aws`
43
- :param pulumi.Input[str] external_id: Specifies the external ID to use when assuming the role.
44
+ :param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
44
45
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
45
- :param pulumi.Input[str] name: The name to identify this role within the backend.
46
+ :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
46
47
  Must be unique within the backend.
47
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
48
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
48
49
  The value should not contain leading or trailing forward slashes.
49
50
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
51
  *Available only for Vault Enterprise*.
@@ -66,31 +67,31 @@ class SecretBackendStaticRoleArgs:
66
67
 
67
68
  @property
68
69
  @pulumi.getter(name="rotationPeriod")
69
- def rotation_period(self) -> pulumi.Input[int]:
70
+ def rotation_period(self) -> pulumi.Input[builtins.int]:
70
71
  """
71
72
  How often Vault should rotate the password of the user entry.
72
73
  """
73
74
  return pulumi.get(self, "rotation_period")
74
75
 
75
76
  @rotation_period.setter
76
- def rotation_period(self, value: pulumi.Input[int]):
77
+ def rotation_period(self, value: pulumi.Input[builtins.int]):
77
78
  pulumi.set(self, "rotation_period", value)
78
79
 
79
80
  @property
80
81
  @pulumi.getter
81
- def username(self) -> pulumi.Input[str]:
82
+ def username(self) -> pulumi.Input[builtins.str]:
82
83
  """
83
84
  The username of the existing AWS IAM to manage password rotation for.
84
85
  """
85
86
  return pulumi.get(self, "username")
86
87
 
87
88
  @username.setter
88
- def username(self, value: pulumi.Input[str]):
89
+ def username(self, value: pulumi.Input[builtins.str]):
89
90
  pulumi.set(self, "username", value)
90
91
 
91
92
  @property
92
93
  @pulumi.getter(name="assumeRoleArn")
93
- def assume_role_arn(self) -> Optional[pulumi.Input[str]]:
94
+ def assume_role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
94
95
  """
95
96
  Specifies the ARN of the role that Vault should assume.
96
97
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
@@ -100,12 +101,12 @@ class SecretBackendStaticRoleArgs:
100
101
  return pulumi.get(self, "assume_role_arn")
101
102
 
102
103
  @assume_role_arn.setter
103
- def assume_role_arn(self, value: Optional[pulumi.Input[str]]):
104
+ def assume_role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
104
105
  pulumi.set(self, "assume_role_arn", value)
105
106
 
106
107
  @property
107
108
  @pulumi.getter(name="assumeRoleSessionName")
108
- def assume_role_session_name(self) -> Optional[pulumi.Input[str]]:
109
+ def assume_role_session_name(self) -> Optional[pulumi.Input[builtins.str]]:
109
110
  """
110
111
  Specifies the session name to use when assuming the role.
111
112
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
@@ -114,12 +115,12 @@ class SecretBackendStaticRoleArgs:
114
115
  return pulumi.get(self, "assume_role_session_name")
115
116
 
116
117
  @assume_role_session_name.setter
117
- def assume_role_session_name(self, value: Optional[pulumi.Input[str]]):
118
+ def assume_role_session_name(self, value: Optional[pulumi.Input[builtins.str]]):
118
119
  pulumi.set(self, "assume_role_session_name", value)
119
120
 
120
121
  @property
121
122
  @pulumi.getter
122
- def backend(self) -> Optional[pulumi.Input[str]]:
123
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
123
124
  """
124
125
  The unique path this backend should be mounted at. Must
125
126
  not begin or end with a `/`. Defaults to `aws`
@@ -127,12 +128,12 @@ class SecretBackendStaticRoleArgs:
127
128
  return pulumi.get(self, "backend")
128
129
 
129
130
  @backend.setter
130
- def backend(self, value: Optional[pulumi.Input[str]]):
131
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
131
132
  pulumi.set(self, "backend", value)
132
133
 
133
134
  @property
134
135
  @pulumi.getter(name="externalId")
135
- def external_id(self) -> Optional[pulumi.Input[str]]:
136
+ def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
136
137
  """
137
138
  Specifies the external ID to use when assuming the role.
138
139
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
@@ -140,12 +141,12 @@ class SecretBackendStaticRoleArgs:
140
141
  return pulumi.get(self, "external_id")
141
142
 
142
143
  @external_id.setter
143
- def external_id(self, value: Optional[pulumi.Input[str]]):
144
+ def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
144
145
  pulumi.set(self, "external_id", value)
145
146
 
146
147
  @property
147
148
  @pulumi.getter
148
- def name(self) -> Optional[pulumi.Input[str]]:
149
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
149
150
  """
150
151
  The name to identify this role within the backend.
151
152
  Must be unique within the backend.
@@ -153,12 +154,12 @@ class SecretBackendStaticRoleArgs:
153
154
  return pulumi.get(self, "name")
154
155
 
155
156
  @name.setter
156
- def name(self, value: Optional[pulumi.Input[str]]):
157
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
157
158
  pulumi.set(self, "name", value)
158
159
 
159
160
  @property
160
161
  @pulumi.getter
161
- def namespace(self) -> Optional[pulumi.Input[str]]:
162
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
162
163
  """
163
164
  The namespace to provision the resource in.
164
165
  The value should not contain leading or trailing forward slashes.
@@ -168,42 +169,42 @@ class SecretBackendStaticRoleArgs:
168
169
  return pulumi.get(self, "namespace")
169
170
 
170
171
  @namespace.setter
171
- def namespace(self, value: Optional[pulumi.Input[str]]):
172
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
172
173
  pulumi.set(self, "namespace", value)
173
174
 
174
175
 
175
176
  @pulumi.input_type
176
177
  class _SecretBackendStaticRoleState:
177
178
  def __init__(__self__, *,
178
- assume_role_arn: Optional[pulumi.Input[str]] = None,
179
- assume_role_session_name: Optional[pulumi.Input[str]] = None,
180
- backend: Optional[pulumi.Input[str]] = None,
181
- external_id: Optional[pulumi.Input[str]] = None,
182
- name: Optional[pulumi.Input[str]] = None,
183
- namespace: Optional[pulumi.Input[str]] = None,
184
- rotation_period: Optional[pulumi.Input[int]] = None,
185
- username: Optional[pulumi.Input[str]] = None):
179
+ assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
180
+ assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
181
+ backend: Optional[pulumi.Input[builtins.str]] = None,
182
+ external_id: Optional[pulumi.Input[builtins.str]] = None,
183
+ name: Optional[pulumi.Input[builtins.str]] = None,
184
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
185
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
186
+ username: Optional[pulumi.Input[builtins.str]] = None):
186
187
  """
187
188
  Input properties used for looking up and filtering SecretBackendStaticRole resources.
188
- :param pulumi.Input[str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
189
+ :param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
189
190
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
190
191
  If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
191
192
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
192
- :param pulumi.Input[str] assume_role_session_name: Specifies the session name to use when assuming the role.
193
+ :param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
193
194
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
194
195
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
195
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
196
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
196
197
  not begin or end with a `/`. Defaults to `aws`
197
- :param pulumi.Input[str] external_id: Specifies the external ID to use when assuming the role.
198
+ :param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
198
199
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
199
- :param pulumi.Input[str] name: The name to identify this role within the backend.
200
+ :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
200
201
  Must be unique within the backend.
201
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
202
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
202
203
  The value should not contain leading or trailing forward slashes.
203
204
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
204
205
  *Available only for Vault Enterprise*.
205
- :param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
206
- :param pulumi.Input[str] username: The username of the existing AWS IAM to manage password rotation for.
206
+ :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
207
+ :param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
207
208
  """
208
209
  if assume_role_arn is not None:
209
210
  pulumi.set(__self__, "assume_role_arn", assume_role_arn)
@@ -224,7 +225,7 @@ class _SecretBackendStaticRoleState:
224
225
 
225
226
  @property
226
227
  @pulumi.getter(name="assumeRoleArn")
227
- def assume_role_arn(self) -> Optional[pulumi.Input[str]]:
228
+ def assume_role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
228
229
  """
229
230
  Specifies the ARN of the role that Vault should assume.
230
231
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
@@ -234,12 +235,12 @@ class _SecretBackendStaticRoleState:
234
235
  return pulumi.get(self, "assume_role_arn")
235
236
 
236
237
  @assume_role_arn.setter
237
- def assume_role_arn(self, value: Optional[pulumi.Input[str]]):
238
+ def assume_role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
238
239
  pulumi.set(self, "assume_role_arn", value)
239
240
 
240
241
  @property
241
242
  @pulumi.getter(name="assumeRoleSessionName")
242
- def assume_role_session_name(self) -> Optional[pulumi.Input[str]]:
243
+ def assume_role_session_name(self) -> Optional[pulumi.Input[builtins.str]]:
243
244
  """
244
245
  Specifies the session name to use when assuming the role.
245
246
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
@@ -248,12 +249,12 @@ class _SecretBackendStaticRoleState:
248
249
  return pulumi.get(self, "assume_role_session_name")
249
250
 
250
251
  @assume_role_session_name.setter
251
- def assume_role_session_name(self, value: Optional[pulumi.Input[str]]):
252
+ def assume_role_session_name(self, value: Optional[pulumi.Input[builtins.str]]):
252
253
  pulumi.set(self, "assume_role_session_name", value)
253
254
 
254
255
  @property
255
256
  @pulumi.getter
256
- def backend(self) -> Optional[pulumi.Input[str]]:
257
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
257
258
  """
258
259
  The unique path this backend should be mounted at. Must
259
260
  not begin or end with a `/`. Defaults to `aws`
@@ -261,12 +262,12 @@ class _SecretBackendStaticRoleState:
261
262
  return pulumi.get(self, "backend")
262
263
 
263
264
  @backend.setter
264
- def backend(self, value: Optional[pulumi.Input[str]]):
265
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
265
266
  pulumi.set(self, "backend", value)
266
267
 
267
268
  @property
268
269
  @pulumi.getter(name="externalId")
269
- def external_id(self) -> Optional[pulumi.Input[str]]:
270
+ def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
270
271
  """
271
272
  Specifies the external ID to use when assuming the role.
272
273
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
@@ -274,12 +275,12 @@ class _SecretBackendStaticRoleState:
274
275
  return pulumi.get(self, "external_id")
275
276
 
276
277
  @external_id.setter
277
- def external_id(self, value: Optional[pulumi.Input[str]]):
278
+ def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
278
279
  pulumi.set(self, "external_id", value)
279
280
 
280
281
  @property
281
282
  @pulumi.getter
282
- def name(self) -> Optional[pulumi.Input[str]]:
283
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
283
284
  """
284
285
  The name to identify this role within the backend.
285
286
  Must be unique within the backend.
@@ -287,12 +288,12 @@ class _SecretBackendStaticRoleState:
287
288
  return pulumi.get(self, "name")
288
289
 
289
290
  @name.setter
290
- def name(self, value: Optional[pulumi.Input[str]]):
291
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
291
292
  pulumi.set(self, "name", value)
292
293
 
293
294
  @property
294
295
  @pulumi.getter
295
- def namespace(self) -> Optional[pulumi.Input[str]]:
296
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
296
297
  """
297
298
  The namespace to provision the resource in.
298
299
  The value should not contain leading or trailing forward slashes.
@@ -302,31 +303,31 @@ class _SecretBackendStaticRoleState:
302
303
  return pulumi.get(self, "namespace")
303
304
 
304
305
  @namespace.setter
305
- def namespace(self, value: Optional[pulumi.Input[str]]):
306
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
306
307
  pulumi.set(self, "namespace", value)
307
308
 
308
309
  @property
309
310
  @pulumi.getter(name="rotationPeriod")
310
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
311
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
311
312
  """
312
313
  How often Vault should rotate the password of the user entry.
313
314
  """
314
315
  return pulumi.get(self, "rotation_period")
315
316
 
316
317
  @rotation_period.setter
317
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
318
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
318
319
  pulumi.set(self, "rotation_period", value)
319
320
 
320
321
  @property
321
322
  @pulumi.getter
322
- def username(self) -> Optional[pulumi.Input[str]]:
323
+ def username(self) -> Optional[pulumi.Input[builtins.str]]:
323
324
  """
324
325
  The username of the existing AWS IAM to manage password rotation for.
325
326
  """
326
327
  return pulumi.get(self, "username")
327
328
 
328
329
  @username.setter
329
- def username(self, value: Optional[pulumi.Input[str]]):
330
+ def username(self, value: Optional[pulumi.Input[builtins.str]]):
330
331
  pulumi.set(self, "username", value)
331
332
 
332
333
 
@@ -335,14 +336,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
335
336
  def __init__(__self__,
336
337
  resource_name: str,
337
338
  opts: Optional[pulumi.ResourceOptions] = None,
338
- assume_role_arn: Optional[pulumi.Input[str]] = None,
339
- assume_role_session_name: Optional[pulumi.Input[str]] = None,
340
- backend: Optional[pulumi.Input[str]] = None,
341
- external_id: Optional[pulumi.Input[str]] = None,
342
- name: Optional[pulumi.Input[str]] = None,
343
- namespace: Optional[pulumi.Input[str]] = None,
344
- rotation_period: Optional[pulumi.Input[int]] = None,
345
- username: Optional[pulumi.Input[str]] = None,
339
+ assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
340
+ assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
341
+ backend: Optional[pulumi.Input[builtins.str]] = None,
342
+ external_id: Optional[pulumi.Input[builtins.str]] = None,
343
+ name: Optional[pulumi.Input[builtins.str]] = None,
344
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
345
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
346
+ username: Optional[pulumi.Input[builtins.str]] = None,
346
347
  __props__=None):
347
348
  """
348
349
  ## Example Usage
@@ -389,25 +390,25 @@ class SecretBackendStaticRole(pulumi.CustomResource):
389
390
 
390
391
  :param str resource_name: The name of the resource.
391
392
  :param pulumi.ResourceOptions opts: Options for the resource.
392
- :param pulumi.Input[str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
393
+ :param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
393
394
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
394
395
  If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
395
396
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
396
- :param pulumi.Input[str] assume_role_session_name: Specifies the session name to use when assuming the role.
397
+ :param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
397
398
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
398
399
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
399
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
400
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
400
401
  not begin or end with a `/`. Defaults to `aws`
401
- :param pulumi.Input[str] external_id: Specifies the external ID to use when assuming the role.
402
+ :param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
402
403
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
403
- :param pulumi.Input[str] name: The name to identify this role within the backend.
404
+ :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
404
405
  Must be unique within the backend.
405
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
406
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
406
407
  The value should not contain leading or trailing forward slashes.
407
408
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
408
409
  *Available only for Vault Enterprise*.
409
- :param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
410
- :param pulumi.Input[str] username: The username of the existing AWS IAM to manage password rotation for.
410
+ :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
411
+ :param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
411
412
  """
412
413
  ...
413
414
  @overload
@@ -473,14 +474,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
473
474
  def _internal_init(__self__,
474
475
  resource_name: str,
475
476
  opts: Optional[pulumi.ResourceOptions] = None,
476
- assume_role_arn: Optional[pulumi.Input[str]] = None,
477
- assume_role_session_name: Optional[pulumi.Input[str]] = None,
478
- backend: Optional[pulumi.Input[str]] = None,
479
- external_id: Optional[pulumi.Input[str]] = None,
480
- name: Optional[pulumi.Input[str]] = None,
481
- namespace: Optional[pulumi.Input[str]] = None,
482
- rotation_period: Optional[pulumi.Input[int]] = None,
483
- username: Optional[pulumi.Input[str]] = None,
477
+ assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
478
+ assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
479
+ backend: Optional[pulumi.Input[builtins.str]] = None,
480
+ external_id: Optional[pulumi.Input[builtins.str]] = None,
481
+ name: Optional[pulumi.Input[builtins.str]] = None,
482
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
483
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
484
+ username: Optional[pulumi.Input[builtins.str]] = None,
484
485
  __props__=None):
485
486
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
486
487
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -512,14 +513,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
512
513
  def get(resource_name: str,
513
514
  id: pulumi.Input[str],
514
515
  opts: Optional[pulumi.ResourceOptions] = None,
515
- assume_role_arn: Optional[pulumi.Input[str]] = None,
516
- assume_role_session_name: Optional[pulumi.Input[str]] = None,
517
- backend: Optional[pulumi.Input[str]] = None,
518
- external_id: Optional[pulumi.Input[str]] = None,
519
- name: Optional[pulumi.Input[str]] = None,
520
- namespace: Optional[pulumi.Input[str]] = None,
521
- rotation_period: Optional[pulumi.Input[int]] = None,
522
- username: Optional[pulumi.Input[str]] = None) -> 'SecretBackendStaticRole':
516
+ assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
517
+ assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
518
+ backend: Optional[pulumi.Input[builtins.str]] = None,
519
+ external_id: Optional[pulumi.Input[builtins.str]] = None,
520
+ name: Optional[pulumi.Input[builtins.str]] = None,
521
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
522
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
523
+ username: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendStaticRole':
523
524
  """
524
525
  Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
525
526
  properties used to qualify the lookup.
@@ -527,25 +528,25 @@ class SecretBackendStaticRole(pulumi.CustomResource):
527
528
  :param str resource_name: The unique name of the resulting resource.
528
529
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
529
530
  :param pulumi.ResourceOptions opts: Options for the resource.
530
- :param pulumi.Input[str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
531
+ :param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
531
532
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
532
533
  If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
533
534
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
534
- :param pulumi.Input[str] assume_role_session_name: Specifies the session name to use when assuming the role.
535
+ :param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
535
536
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
536
537
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
537
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
538
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
538
539
  not begin or end with a `/`. Defaults to `aws`
539
- :param pulumi.Input[str] external_id: Specifies the external ID to use when assuming the role.
540
+ :param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
540
541
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
541
- :param pulumi.Input[str] name: The name to identify this role within the backend.
542
+ :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
542
543
  Must be unique within the backend.
543
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
544
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
544
545
  The value should not contain leading or trailing forward slashes.
545
546
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
546
547
  *Available only for Vault Enterprise*.
547
- :param pulumi.Input[int] rotation_period: How often Vault should rotate the password of the user entry.
548
- :param pulumi.Input[str] username: The username of the existing AWS IAM to manage password rotation for.
548
+ :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
549
+ :param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
549
550
  """
550
551
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
551
552
 
@@ -563,7 +564,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
563
564
 
564
565
  @property
565
566
  @pulumi.getter(name="assumeRoleArn")
566
- def assume_role_arn(self) -> pulumi.Output[Optional[str]]:
567
+ def assume_role_arn(self) -> pulumi.Output[Optional[builtins.str]]:
567
568
  """
568
569
  Specifies the ARN of the role that Vault should assume.
569
570
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
@@ -574,7 +575,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
574
575
 
575
576
  @property
576
577
  @pulumi.getter(name="assumeRoleSessionName")
577
- def assume_role_session_name(self) -> pulumi.Output[Optional[str]]:
578
+ def assume_role_session_name(self) -> pulumi.Output[Optional[builtins.str]]:
578
579
  """
579
580
  Specifies the session name to use when assuming the role.
580
581
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
@@ -584,7 +585,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
584
585
 
585
586
  @property
586
587
  @pulumi.getter
587
- def backend(self) -> pulumi.Output[Optional[str]]:
588
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
588
589
  """
589
590
  The unique path this backend should be mounted at. Must
590
591
  not begin or end with a `/`. Defaults to `aws`
@@ -593,7 +594,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
593
594
 
594
595
  @property
595
596
  @pulumi.getter(name="externalId")
596
- def external_id(self) -> pulumi.Output[Optional[str]]:
597
+ def external_id(self) -> pulumi.Output[Optional[builtins.str]]:
597
598
  """
598
599
  Specifies the external ID to use when assuming the role.
599
600
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
@@ -602,7 +603,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
602
603
 
603
604
  @property
604
605
  @pulumi.getter
605
- def name(self) -> pulumi.Output[str]:
606
+ def name(self) -> pulumi.Output[builtins.str]:
606
607
  """
607
608
  The name to identify this role within the backend.
608
609
  Must be unique within the backend.
@@ -611,7 +612,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
611
612
 
612
613
  @property
613
614
  @pulumi.getter
614
- def namespace(self) -> pulumi.Output[Optional[str]]:
615
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
615
616
  """
616
617
  The namespace to provision the resource in.
617
618
  The value should not contain leading or trailing forward slashes.
@@ -622,7 +623,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
622
623
 
623
624
  @property
624
625
  @pulumi.getter(name="rotationPeriod")
625
- def rotation_period(self) -> pulumi.Output[int]:
626
+ def rotation_period(self) -> pulumi.Output[builtins.int]:
626
627
  """
627
628
  How often Vault should rotate the password of the user entry.
628
629
  """
@@ -630,7 +631,7 @@ class SecretBackendStaticRole(pulumi.CustomResource):
630
631
 
631
632
  @property
632
633
  @pulumi.getter
633
- def username(self) -> pulumi.Output[str]:
634
+ def username(self) -> pulumi.Output[builtins.str]:
634
635
  """
635
636
  The username of the existing AWS IAM to manage password rotation for.
636
637
  """
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  from .. import _utilities
6
7
  import typing
7
8
  # Export this package's modules as members: