pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,56 +20,56 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
19
20
  @pulumi.input_type
20
21
  class SecretBackendArgs:
21
22
  def __init__(__self__, *,
22
- credentials: Optional[pulumi.Input[str]] = None,
23
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
24
- description: Optional[pulumi.Input[str]] = None,
25
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
26
- disable_remount: Optional[pulumi.Input[bool]] = None,
27
- identity_token_audience: Optional[pulumi.Input[str]] = None,
28
- identity_token_key: Optional[pulumi.Input[str]] = None,
29
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
30
- local: Optional[pulumi.Input[bool]] = None,
31
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
32
- namespace: Optional[pulumi.Input[str]] = None,
33
- path: Optional[pulumi.Input[str]] = None,
34
- rotation_period: Optional[pulumi.Input[int]] = None,
35
- rotation_schedule: Optional[pulumi.Input[str]] = None,
36
- rotation_window: Optional[pulumi.Input[int]] = None,
37
- service_account_email: Optional[pulumi.Input[str]] = None):
23
+ credentials: Optional[pulumi.Input[builtins.str]] = None,
24
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
25
+ description: Optional[pulumi.Input[builtins.str]] = None,
26
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
27
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
28
+ identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
29
+ identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
30
+ identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
31
+ local: Optional[pulumi.Input[builtins.bool]] = None,
32
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
33
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
34
+ path: Optional[pulumi.Input[builtins.str]] = None,
35
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
36
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
37
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
38
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None):
38
39
  """
39
40
  The set of arguments for constructing a SecretBackend resource.
40
- :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP
41
- :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials
41
+ :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
42
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
42
43
  issued by this backend. Defaults to '0'.
43
- :param pulumi.Input[str] description: A human-friendly description for this backend.
44
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
44
+ :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
45
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
45
46
  *Available only for Vault Enterprise*.
46
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
47
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
47
48
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
48
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
49
+ :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
49
50
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
50
51
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
51
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
52
+ :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
52
53
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
53
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
54
- :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
55
- :param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
54
+ :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
55
+ :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
56
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
56
57
  for credentials issued by this backend. Defaults to '0'.
57
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
58
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
58
59
  The value should not contain leading or trailing forward slashes.
59
60
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
60
61
  *Available only for Vault Enterprise*.
61
- :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
62
+ :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
62
63
  not begin or end with a `/`. Defaults to `gcp`.
63
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
64
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
64
65
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
65
66
  *Available only for Vault Enterprise*.
66
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
67
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
67
68
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
68
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
69
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
69
70
  a rotation when a scheduled token rotation occurs. The default rotation window is
70
71
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
71
- :param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
72
+ :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
72
73
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
73
74
  """
74
75
  if credentials is not None:
@@ -106,19 +107,19 @@ class SecretBackendArgs:
106
107
 
107
108
  @property
108
109
  @pulumi.getter
109
- def credentials(self) -> Optional[pulumi.Input[str]]:
110
+ def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
110
111
  """
111
112
  JSON-encoded credentials to use to connect to GCP
112
113
  """
113
114
  return pulumi.get(self, "credentials")
114
115
 
115
116
  @credentials.setter
116
- def credentials(self, value: Optional[pulumi.Input[str]]):
117
+ def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
117
118
  pulumi.set(self, "credentials", value)
118
119
 
119
120
  @property
120
121
  @pulumi.getter(name="defaultLeaseTtlSeconds")
121
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
122
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
122
123
  """
123
124
  The default TTL for credentials
124
125
  issued by this backend. Defaults to '0'.
@@ -126,24 +127,24 @@ class SecretBackendArgs:
126
127
  return pulumi.get(self, "default_lease_ttl_seconds")
127
128
 
128
129
  @default_lease_ttl_seconds.setter
129
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
130
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
130
131
  pulumi.set(self, "default_lease_ttl_seconds", value)
131
132
 
132
133
  @property
133
134
  @pulumi.getter
134
- def description(self) -> Optional[pulumi.Input[str]]:
135
+ def description(self) -> Optional[pulumi.Input[builtins.str]]:
135
136
  """
136
137
  A human-friendly description for this backend.
137
138
  """
138
139
  return pulumi.get(self, "description")
139
140
 
140
141
  @description.setter
141
- def description(self, value: Optional[pulumi.Input[str]]):
142
+ def description(self, value: Optional[pulumi.Input[builtins.str]]):
142
143
  pulumi.set(self, "description", value)
143
144
 
144
145
  @property
145
146
  @pulumi.getter(name="disableAutomatedRotation")
146
- def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
147
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
147
148
  """
148
149
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
149
150
  *Available only for Vault Enterprise*.
@@ -151,12 +152,12 @@ class SecretBackendArgs:
151
152
  return pulumi.get(self, "disable_automated_rotation")
152
153
 
153
154
  @disable_automated_rotation.setter
154
- def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
155
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
155
156
  pulumi.set(self, "disable_automated_rotation", value)
156
157
 
157
158
  @property
158
159
  @pulumi.getter(name="disableRemount")
159
- def disable_remount(self) -> Optional[pulumi.Input[bool]]:
160
+ def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
160
161
  """
161
162
  If set, opts out of mount migration on path updates.
162
163
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -164,12 +165,12 @@ class SecretBackendArgs:
164
165
  return pulumi.get(self, "disable_remount")
165
166
 
166
167
  @disable_remount.setter
167
- def disable_remount(self, value: Optional[pulumi.Input[bool]]):
168
+ def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
168
169
  pulumi.set(self, "disable_remount", value)
169
170
 
170
171
  @property
171
172
  @pulumi.getter(name="identityTokenAudience")
172
- def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
173
+ def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
173
174
  """
174
175
  The audience claim value for plugin identity
175
176
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -178,12 +179,12 @@ class SecretBackendArgs:
178
179
  return pulumi.get(self, "identity_token_audience")
179
180
 
180
181
  @identity_token_audience.setter
181
- def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
182
+ def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
182
183
  pulumi.set(self, "identity_token_audience", value)
183
184
 
184
185
  @property
185
186
  @pulumi.getter(name="identityTokenKey")
186
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
187
+ def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
187
188
  """
188
189
  The key to use for signing plugin identity
189
190
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -191,36 +192,36 @@ class SecretBackendArgs:
191
192
  return pulumi.get(self, "identity_token_key")
192
193
 
193
194
  @identity_token_key.setter
194
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
195
+ def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
195
196
  pulumi.set(self, "identity_token_key", value)
196
197
 
197
198
  @property
198
199
  @pulumi.getter(name="identityTokenTtl")
199
- def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
200
+ def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
200
201
  """
201
202
  The TTL of generated tokens.
202
203
  """
203
204
  return pulumi.get(self, "identity_token_ttl")
204
205
 
205
206
  @identity_token_ttl.setter
206
- def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
207
+ def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
207
208
  pulumi.set(self, "identity_token_ttl", value)
208
209
 
209
210
  @property
210
211
  @pulumi.getter
211
- def local(self) -> Optional[pulumi.Input[bool]]:
212
+ def local(self) -> Optional[pulumi.Input[builtins.bool]]:
212
213
  """
213
214
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
214
215
  """
215
216
  return pulumi.get(self, "local")
216
217
 
217
218
  @local.setter
218
- def local(self, value: Optional[pulumi.Input[bool]]):
219
+ def local(self, value: Optional[pulumi.Input[builtins.bool]]):
219
220
  pulumi.set(self, "local", value)
220
221
 
221
222
  @property
222
223
  @pulumi.getter(name="maxLeaseTtlSeconds")
223
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
224
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
224
225
  """
225
226
  The maximum TTL that can be requested
226
227
  for credentials issued by this backend. Defaults to '0'.
@@ -228,12 +229,12 @@ class SecretBackendArgs:
228
229
  return pulumi.get(self, "max_lease_ttl_seconds")
229
230
 
230
231
  @max_lease_ttl_seconds.setter
231
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
232
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
232
233
  pulumi.set(self, "max_lease_ttl_seconds", value)
233
234
 
234
235
  @property
235
236
  @pulumi.getter
236
- def namespace(self) -> Optional[pulumi.Input[str]]:
237
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
237
238
  """
238
239
  The namespace to provision the resource in.
239
240
  The value should not contain leading or trailing forward slashes.
@@ -243,12 +244,12 @@ class SecretBackendArgs:
243
244
  return pulumi.get(self, "namespace")
244
245
 
245
246
  @namespace.setter
246
- def namespace(self, value: Optional[pulumi.Input[str]]):
247
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
247
248
  pulumi.set(self, "namespace", value)
248
249
 
249
250
  @property
250
251
  @pulumi.getter
251
- def path(self) -> Optional[pulumi.Input[str]]:
252
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
252
253
  """
253
254
  The unique path this backend should be mounted at. Must
254
255
  not begin or end with a `/`. Defaults to `gcp`.
@@ -256,12 +257,12 @@ class SecretBackendArgs:
256
257
  return pulumi.get(self, "path")
257
258
 
258
259
  @path.setter
259
- def path(self, value: Optional[pulumi.Input[str]]):
260
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
260
261
  pulumi.set(self, "path", value)
261
262
 
262
263
  @property
263
264
  @pulumi.getter(name="rotationPeriod")
264
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
265
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
265
266
  """
266
267
  The amount of time in seconds Vault should wait before rotating the root credential.
267
268
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -270,12 +271,12 @@ class SecretBackendArgs:
270
271
  return pulumi.get(self, "rotation_period")
271
272
 
272
273
  @rotation_period.setter
273
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
274
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
274
275
  pulumi.set(self, "rotation_period", value)
275
276
 
276
277
  @property
277
278
  @pulumi.getter(name="rotationSchedule")
278
- def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
279
+ def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
279
280
  """
280
281
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
281
282
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
@@ -283,12 +284,12 @@ class SecretBackendArgs:
283
284
  return pulumi.get(self, "rotation_schedule")
284
285
 
285
286
  @rotation_schedule.setter
286
- def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
287
+ def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
287
288
  pulumi.set(self, "rotation_schedule", value)
288
289
 
289
290
  @property
290
291
  @pulumi.getter(name="rotationWindow")
291
- def rotation_window(self) -> Optional[pulumi.Input[int]]:
292
+ def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
292
293
  """
293
294
  The maximum amount of time in seconds allowed to complete
294
295
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -297,12 +298,12 @@ class SecretBackendArgs:
297
298
  return pulumi.get(self, "rotation_window")
298
299
 
299
300
  @rotation_window.setter
300
- def rotation_window(self, value: Optional[pulumi.Input[int]]):
301
+ def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
301
302
  pulumi.set(self, "rotation_window", value)
302
303
 
303
304
  @property
304
305
  @pulumi.getter(name="serviceAccountEmail")
305
- def service_account_email(self) -> Optional[pulumi.Input[str]]:
306
+ def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
306
307
  """
307
308
  Service Account to impersonate for plugin workload identity federation.
308
309
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -310,65 +311,65 @@ class SecretBackendArgs:
310
311
  return pulumi.get(self, "service_account_email")
311
312
 
312
313
  @service_account_email.setter
313
- def service_account_email(self, value: Optional[pulumi.Input[str]]):
314
+ def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
314
315
  pulumi.set(self, "service_account_email", value)
315
316
 
316
317
 
317
318
  @pulumi.input_type
318
319
  class _SecretBackendState:
319
320
  def __init__(__self__, *,
320
- accessor: Optional[pulumi.Input[str]] = None,
321
- credentials: Optional[pulumi.Input[str]] = None,
322
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
323
- description: Optional[pulumi.Input[str]] = None,
324
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
325
- disable_remount: Optional[pulumi.Input[bool]] = None,
326
- identity_token_audience: Optional[pulumi.Input[str]] = None,
327
- identity_token_key: Optional[pulumi.Input[str]] = None,
328
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
329
- local: Optional[pulumi.Input[bool]] = None,
330
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
331
- namespace: Optional[pulumi.Input[str]] = None,
332
- path: Optional[pulumi.Input[str]] = None,
333
- rotation_period: Optional[pulumi.Input[int]] = None,
334
- rotation_schedule: Optional[pulumi.Input[str]] = None,
335
- rotation_window: Optional[pulumi.Input[int]] = None,
336
- service_account_email: Optional[pulumi.Input[str]] = None):
321
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
322
+ credentials: Optional[pulumi.Input[builtins.str]] = None,
323
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
324
+ description: Optional[pulumi.Input[builtins.str]] = None,
325
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
326
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
327
+ identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
328
+ identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
329
+ identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
330
+ local: Optional[pulumi.Input[builtins.bool]] = None,
331
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
332
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
333
+ path: Optional[pulumi.Input[builtins.str]] = None,
334
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
335
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
336
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
337
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None):
337
338
  """
338
339
  Input properties used for looking up and filtering SecretBackend resources.
339
- :param pulumi.Input[str] accessor: The accessor of the created GCP mount.
340
- :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP
341
- :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials
340
+ :param pulumi.Input[builtins.str] accessor: The accessor of the created GCP mount.
341
+ :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
342
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
342
343
  issued by this backend. Defaults to '0'.
343
- :param pulumi.Input[str] description: A human-friendly description for this backend.
344
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
344
+ :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
345
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
345
346
  *Available only for Vault Enterprise*.
346
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
347
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
347
348
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
348
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
349
+ :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
349
350
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
350
351
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
351
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
352
+ :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
352
353
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
353
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
354
- :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
355
- :param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
354
+ :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
355
+ :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
356
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
356
357
  for credentials issued by this backend. Defaults to '0'.
357
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
358
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
358
359
  The value should not contain leading or trailing forward slashes.
359
360
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
360
361
  *Available only for Vault Enterprise*.
361
- :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
362
+ :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
362
363
  not begin or end with a `/`. Defaults to `gcp`.
363
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
364
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
364
365
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
365
366
  *Available only for Vault Enterprise*.
366
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
367
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
367
368
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
368
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
369
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
369
370
  a rotation when a scheduled token rotation occurs. The default rotation window is
370
371
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
371
- :param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
372
+ :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
372
373
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
373
374
  """
374
375
  if accessor is not None:
@@ -408,31 +409,31 @@ class _SecretBackendState:
408
409
 
409
410
  @property
410
411
  @pulumi.getter
411
- def accessor(self) -> Optional[pulumi.Input[str]]:
412
+ def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
412
413
  """
413
414
  The accessor of the created GCP mount.
414
415
  """
415
416
  return pulumi.get(self, "accessor")
416
417
 
417
418
  @accessor.setter
418
- def accessor(self, value: Optional[pulumi.Input[str]]):
419
+ def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
419
420
  pulumi.set(self, "accessor", value)
420
421
 
421
422
  @property
422
423
  @pulumi.getter
423
- def credentials(self) -> Optional[pulumi.Input[str]]:
424
+ def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
424
425
  """
425
426
  JSON-encoded credentials to use to connect to GCP
426
427
  """
427
428
  return pulumi.get(self, "credentials")
428
429
 
429
430
  @credentials.setter
430
- def credentials(self, value: Optional[pulumi.Input[str]]):
431
+ def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
431
432
  pulumi.set(self, "credentials", value)
432
433
 
433
434
  @property
434
435
  @pulumi.getter(name="defaultLeaseTtlSeconds")
435
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
436
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
436
437
  """
437
438
  The default TTL for credentials
438
439
  issued by this backend. Defaults to '0'.
@@ -440,24 +441,24 @@ class _SecretBackendState:
440
441
  return pulumi.get(self, "default_lease_ttl_seconds")
441
442
 
442
443
  @default_lease_ttl_seconds.setter
443
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
444
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
444
445
  pulumi.set(self, "default_lease_ttl_seconds", value)
445
446
 
446
447
  @property
447
448
  @pulumi.getter
448
- def description(self) -> Optional[pulumi.Input[str]]:
449
+ def description(self) -> Optional[pulumi.Input[builtins.str]]:
449
450
  """
450
451
  A human-friendly description for this backend.
451
452
  """
452
453
  return pulumi.get(self, "description")
453
454
 
454
455
  @description.setter
455
- def description(self, value: Optional[pulumi.Input[str]]):
456
+ def description(self, value: Optional[pulumi.Input[builtins.str]]):
456
457
  pulumi.set(self, "description", value)
457
458
 
458
459
  @property
459
460
  @pulumi.getter(name="disableAutomatedRotation")
460
- def disable_automated_rotation(self) -> Optional[pulumi.Input[bool]]:
461
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
461
462
  """
462
463
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
463
464
  *Available only for Vault Enterprise*.
@@ -465,12 +466,12 @@ class _SecretBackendState:
465
466
  return pulumi.get(self, "disable_automated_rotation")
466
467
 
467
468
  @disable_automated_rotation.setter
468
- def disable_automated_rotation(self, value: Optional[pulumi.Input[bool]]):
469
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
469
470
  pulumi.set(self, "disable_automated_rotation", value)
470
471
 
471
472
  @property
472
473
  @pulumi.getter(name="disableRemount")
473
- def disable_remount(self) -> Optional[pulumi.Input[bool]]:
474
+ def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
474
475
  """
475
476
  If set, opts out of mount migration on path updates.
476
477
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -478,12 +479,12 @@ class _SecretBackendState:
478
479
  return pulumi.get(self, "disable_remount")
479
480
 
480
481
  @disable_remount.setter
481
- def disable_remount(self, value: Optional[pulumi.Input[bool]]):
482
+ def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
482
483
  pulumi.set(self, "disable_remount", value)
483
484
 
484
485
  @property
485
486
  @pulumi.getter(name="identityTokenAudience")
486
- def identity_token_audience(self) -> Optional[pulumi.Input[str]]:
487
+ def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
487
488
  """
488
489
  The audience claim value for plugin identity
489
490
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -492,12 +493,12 @@ class _SecretBackendState:
492
493
  return pulumi.get(self, "identity_token_audience")
493
494
 
494
495
  @identity_token_audience.setter
495
- def identity_token_audience(self, value: Optional[pulumi.Input[str]]):
496
+ def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
496
497
  pulumi.set(self, "identity_token_audience", value)
497
498
 
498
499
  @property
499
500
  @pulumi.getter(name="identityTokenKey")
500
- def identity_token_key(self) -> Optional[pulumi.Input[str]]:
501
+ def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
501
502
  """
502
503
  The key to use for signing plugin identity
503
504
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -505,36 +506,36 @@ class _SecretBackendState:
505
506
  return pulumi.get(self, "identity_token_key")
506
507
 
507
508
  @identity_token_key.setter
508
- def identity_token_key(self, value: Optional[pulumi.Input[str]]):
509
+ def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
509
510
  pulumi.set(self, "identity_token_key", value)
510
511
 
511
512
  @property
512
513
  @pulumi.getter(name="identityTokenTtl")
513
- def identity_token_ttl(self) -> Optional[pulumi.Input[int]]:
514
+ def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
514
515
  """
515
516
  The TTL of generated tokens.
516
517
  """
517
518
  return pulumi.get(self, "identity_token_ttl")
518
519
 
519
520
  @identity_token_ttl.setter
520
- def identity_token_ttl(self, value: Optional[pulumi.Input[int]]):
521
+ def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
521
522
  pulumi.set(self, "identity_token_ttl", value)
522
523
 
523
524
  @property
524
525
  @pulumi.getter
525
- def local(self) -> Optional[pulumi.Input[bool]]:
526
+ def local(self) -> Optional[pulumi.Input[builtins.bool]]:
526
527
  """
527
528
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
528
529
  """
529
530
  return pulumi.get(self, "local")
530
531
 
531
532
  @local.setter
532
- def local(self, value: Optional[pulumi.Input[bool]]):
533
+ def local(self, value: Optional[pulumi.Input[builtins.bool]]):
533
534
  pulumi.set(self, "local", value)
534
535
 
535
536
  @property
536
537
  @pulumi.getter(name="maxLeaseTtlSeconds")
537
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
538
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
538
539
  """
539
540
  The maximum TTL that can be requested
540
541
  for credentials issued by this backend. Defaults to '0'.
@@ -542,12 +543,12 @@ class _SecretBackendState:
542
543
  return pulumi.get(self, "max_lease_ttl_seconds")
543
544
 
544
545
  @max_lease_ttl_seconds.setter
545
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
546
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
546
547
  pulumi.set(self, "max_lease_ttl_seconds", value)
547
548
 
548
549
  @property
549
550
  @pulumi.getter
550
- def namespace(self) -> Optional[pulumi.Input[str]]:
551
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
551
552
  """
552
553
  The namespace to provision the resource in.
553
554
  The value should not contain leading or trailing forward slashes.
@@ -557,12 +558,12 @@ class _SecretBackendState:
557
558
  return pulumi.get(self, "namespace")
558
559
 
559
560
  @namespace.setter
560
- def namespace(self, value: Optional[pulumi.Input[str]]):
561
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
561
562
  pulumi.set(self, "namespace", value)
562
563
 
563
564
  @property
564
565
  @pulumi.getter
565
- def path(self) -> Optional[pulumi.Input[str]]:
566
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
566
567
  """
567
568
  The unique path this backend should be mounted at. Must
568
569
  not begin or end with a `/`. Defaults to `gcp`.
@@ -570,12 +571,12 @@ class _SecretBackendState:
570
571
  return pulumi.get(self, "path")
571
572
 
572
573
  @path.setter
573
- def path(self, value: Optional[pulumi.Input[str]]):
574
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
574
575
  pulumi.set(self, "path", value)
575
576
 
576
577
  @property
577
578
  @pulumi.getter(name="rotationPeriod")
578
- def rotation_period(self) -> Optional[pulumi.Input[int]]:
579
+ def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
579
580
  """
580
581
  The amount of time in seconds Vault should wait before rotating the root credential.
581
582
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -584,12 +585,12 @@ class _SecretBackendState:
584
585
  return pulumi.get(self, "rotation_period")
585
586
 
586
587
  @rotation_period.setter
587
- def rotation_period(self, value: Optional[pulumi.Input[int]]):
588
+ def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
588
589
  pulumi.set(self, "rotation_period", value)
589
590
 
590
591
  @property
591
592
  @pulumi.getter(name="rotationSchedule")
592
- def rotation_schedule(self) -> Optional[pulumi.Input[str]]:
593
+ def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
593
594
  """
594
595
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
595
596
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
@@ -597,12 +598,12 @@ class _SecretBackendState:
597
598
  return pulumi.get(self, "rotation_schedule")
598
599
 
599
600
  @rotation_schedule.setter
600
- def rotation_schedule(self, value: Optional[pulumi.Input[str]]):
601
+ def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
601
602
  pulumi.set(self, "rotation_schedule", value)
602
603
 
603
604
  @property
604
605
  @pulumi.getter(name="rotationWindow")
605
- def rotation_window(self) -> Optional[pulumi.Input[int]]:
606
+ def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
606
607
  """
607
608
  The maximum amount of time in seconds allowed to complete
608
609
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -611,12 +612,12 @@ class _SecretBackendState:
611
612
  return pulumi.get(self, "rotation_window")
612
613
 
613
614
  @rotation_window.setter
614
- def rotation_window(self, value: Optional[pulumi.Input[int]]):
615
+ def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
615
616
  pulumi.set(self, "rotation_window", value)
616
617
 
617
618
  @property
618
619
  @pulumi.getter(name="serviceAccountEmail")
619
- def service_account_email(self) -> Optional[pulumi.Input[str]]:
620
+ def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
620
621
  """
621
622
  Service Account to impersonate for plugin workload identity federation.
622
623
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -624,7 +625,7 @@ class _SecretBackendState:
624
625
  return pulumi.get(self, "service_account_email")
625
626
 
626
627
  @service_account_email.setter
627
- def service_account_email(self, value: Optional[pulumi.Input[str]]):
628
+ def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
628
629
  pulumi.set(self, "service_account_email", value)
629
630
 
630
631
 
@@ -633,22 +634,22 @@ class SecretBackend(pulumi.CustomResource):
633
634
  def __init__(__self__,
634
635
  resource_name: str,
635
636
  opts: Optional[pulumi.ResourceOptions] = None,
636
- credentials: Optional[pulumi.Input[str]] = None,
637
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
638
- description: Optional[pulumi.Input[str]] = None,
639
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
640
- disable_remount: Optional[pulumi.Input[bool]] = None,
641
- identity_token_audience: Optional[pulumi.Input[str]] = None,
642
- identity_token_key: Optional[pulumi.Input[str]] = None,
643
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
644
- local: Optional[pulumi.Input[bool]] = None,
645
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
646
- namespace: Optional[pulumi.Input[str]] = None,
647
- path: Optional[pulumi.Input[str]] = None,
648
- rotation_period: Optional[pulumi.Input[int]] = None,
649
- rotation_schedule: Optional[pulumi.Input[str]] = None,
650
- rotation_window: Optional[pulumi.Input[int]] = None,
651
- service_account_email: Optional[pulumi.Input[str]] = None,
637
+ credentials: Optional[pulumi.Input[builtins.str]] = None,
638
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
639
+ description: Optional[pulumi.Input[builtins.str]] = None,
640
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
641
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
642
+ identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
643
+ identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
644
+ identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
645
+ local: Optional[pulumi.Input[builtins.bool]] = None,
646
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
647
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
648
+ path: Optional[pulumi.Input[builtins.str]] = None,
649
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
650
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
651
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
652
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
652
653
  __props__=None):
653
654
  """
654
655
  ## Example Usage
@@ -680,38 +681,38 @@ class SecretBackend(pulumi.CustomResource):
680
681
 
681
682
  :param str resource_name: The name of the resource.
682
683
  :param pulumi.ResourceOptions opts: Options for the resource.
683
- :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP
684
- :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials
684
+ :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
685
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
685
686
  issued by this backend. Defaults to '0'.
686
- :param pulumi.Input[str] description: A human-friendly description for this backend.
687
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
687
+ :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
688
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
688
689
  *Available only for Vault Enterprise*.
689
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
690
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
690
691
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
691
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
692
+ :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
692
693
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
693
694
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
694
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
695
+ :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
695
696
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
696
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
697
- :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
698
- :param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
697
+ :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
698
+ :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
699
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
699
700
  for credentials issued by this backend. Defaults to '0'.
700
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
701
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
701
702
  The value should not contain leading or trailing forward slashes.
702
703
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
703
704
  *Available only for Vault Enterprise*.
704
- :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
705
+ :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
705
706
  not begin or end with a `/`. Defaults to `gcp`.
706
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
707
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
707
708
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
708
709
  *Available only for Vault Enterprise*.
709
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
710
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
710
711
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
711
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
712
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
712
713
  a rotation when a scheduled token rotation occurs. The default rotation window is
713
714
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
714
- :param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
715
+ :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
715
716
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
716
717
  """
717
718
  ...
@@ -763,22 +764,22 @@ class SecretBackend(pulumi.CustomResource):
763
764
  def _internal_init(__self__,
764
765
  resource_name: str,
765
766
  opts: Optional[pulumi.ResourceOptions] = None,
766
- credentials: Optional[pulumi.Input[str]] = None,
767
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
768
- description: Optional[pulumi.Input[str]] = None,
769
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
770
- disable_remount: Optional[pulumi.Input[bool]] = None,
771
- identity_token_audience: Optional[pulumi.Input[str]] = None,
772
- identity_token_key: Optional[pulumi.Input[str]] = None,
773
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
774
- local: Optional[pulumi.Input[bool]] = None,
775
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
776
- namespace: Optional[pulumi.Input[str]] = None,
777
- path: Optional[pulumi.Input[str]] = None,
778
- rotation_period: Optional[pulumi.Input[int]] = None,
779
- rotation_schedule: Optional[pulumi.Input[str]] = None,
780
- rotation_window: Optional[pulumi.Input[int]] = None,
781
- service_account_email: Optional[pulumi.Input[str]] = None,
767
+ credentials: Optional[pulumi.Input[builtins.str]] = None,
768
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
769
+ description: Optional[pulumi.Input[builtins.str]] = None,
770
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
771
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
772
+ identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
773
+ identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
774
+ identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
775
+ local: Optional[pulumi.Input[builtins.bool]] = None,
776
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
777
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
778
+ path: Optional[pulumi.Input[builtins.str]] = None,
779
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
780
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
781
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
782
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None,
782
783
  __props__=None):
783
784
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
784
785
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -817,23 +818,23 @@ class SecretBackend(pulumi.CustomResource):
817
818
  def get(resource_name: str,
818
819
  id: pulumi.Input[str],
819
820
  opts: Optional[pulumi.ResourceOptions] = None,
820
- accessor: Optional[pulumi.Input[str]] = None,
821
- credentials: Optional[pulumi.Input[str]] = None,
822
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
823
- description: Optional[pulumi.Input[str]] = None,
824
- disable_automated_rotation: Optional[pulumi.Input[bool]] = None,
825
- disable_remount: Optional[pulumi.Input[bool]] = None,
826
- identity_token_audience: Optional[pulumi.Input[str]] = None,
827
- identity_token_key: Optional[pulumi.Input[str]] = None,
828
- identity_token_ttl: Optional[pulumi.Input[int]] = None,
829
- local: Optional[pulumi.Input[bool]] = None,
830
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
831
- namespace: Optional[pulumi.Input[str]] = None,
832
- path: Optional[pulumi.Input[str]] = None,
833
- rotation_period: Optional[pulumi.Input[int]] = None,
834
- rotation_schedule: Optional[pulumi.Input[str]] = None,
835
- rotation_window: Optional[pulumi.Input[int]] = None,
836
- service_account_email: Optional[pulumi.Input[str]] = None) -> 'SecretBackend':
821
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
822
+ credentials: Optional[pulumi.Input[builtins.str]] = None,
823
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
824
+ description: Optional[pulumi.Input[builtins.str]] = None,
825
+ disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
826
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
827
+ identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
828
+ identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
829
+ identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
830
+ local: Optional[pulumi.Input[builtins.bool]] = None,
831
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
832
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
833
+ path: Optional[pulumi.Input[builtins.str]] = None,
834
+ rotation_period: Optional[pulumi.Input[builtins.int]] = None,
835
+ rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
836
+ rotation_window: Optional[pulumi.Input[builtins.int]] = None,
837
+ service_account_email: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
837
838
  """
838
839
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
839
840
  properties used to qualify the lookup.
@@ -841,39 +842,39 @@ class SecretBackend(pulumi.CustomResource):
841
842
  :param str resource_name: The unique name of the resulting resource.
842
843
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
843
844
  :param pulumi.ResourceOptions opts: Options for the resource.
844
- :param pulumi.Input[str] accessor: The accessor of the created GCP mount.
845
- :param pulumi.Input[str] credentials: JSON-encoded credentials to use to connect to GCP
846
- :param pulumi.Input[int] default_lease_ttl_seconds: The default TTL for credentials
845
+ :param pulumi.Input[builtins.str] accessor: The accessor of the created GCP mount.
846
+ :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
847
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
847
848
  issued by this backend. Defaults to '0'.
848
- :param pulumi.Input[str] description: A human-friendly description for this backend.
849
- :param pulumi.Input[bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
849
+ :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
850
+ :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
850
851
  *Available only for Vault Enterprise*.
851
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
852
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
852
853
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
853
- :param pulumi.Input[str] identity_token_audience: The audience claim value for plugin identity
854
+ :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
854
855
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
855
856
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
856
- :param pulumi.Input[str] identity_token_key: The key to use for signing plugin identity
857
+ :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
857
858
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
858
- :param pulumi.Input[int] identity_token_ttl: The TTL of generated tokens.
859
- :param pulumi.Input[bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
860
- :param pulumi.Input[int] max_lease_ttl_seconds: The maximum TTL that can be requested
859
+ :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
860
+ :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
861
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
861
862
  for credentials issued by this backend. Defaults to '0'.
862
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
863
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
863
864
  The value should not contain leading or trailing forward slashes.
864
865
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
865
866
  *Available only for Vault Enterprise*.
866
- :param pulumi.Input[str] path: The unique path this backend should be mounted at. Must
867
+ :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
867
868
  not begin or end with a `/`. Defaults to `gcp`.
868
- :param pulumi.Input[int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
869
+ :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
869
870
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
870
871
  *Available only for Vault Enterprise*.
871
- :param pulumi.Input[str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
872
+ :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
872
873
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
873
- :param pulumi.Input[int] rotation_window: The maximum amount of time in seconds allowed to complete
874
+ :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
874
875
  a rotation when a scheduled token rotation occurs. The default rotation window is
875
876
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
876
- :param pulumi.Input[str] service_account_email: Service Account to impersonate for plugin workload identity federation.
877
+ :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
877
878
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
878
879
  """
879
880
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -901,7 +902,7 @@ class SecretBackend(pulumi.CustomResource):
901
902
 
902
903
  @property
903
904
  @pulumi.getter
904
- def accessor(self) -> pulumi.Output[str]:
905
+ def accessor(self) -> pulumi.Output[builtins.str]:
905
906
  """
906
907
  The accessor of the created GCP mount.
907
908
  """
@@ -909,7 +910,7 @@ class SecretBackend(pulumi.CustomResource):
909
910
 
910
911
  @property
911
912
  @pulumi.getter
912
- def credentials(self) -> pulumi.Output[Optional[str]]:
913
+ def credentials(self) -> pulumi.Output[Optional[builtins.str]]:
913
914
  """
914
915
  JSON-encoded credentials to use to connect to GCP
915
916
  """
@@ -917,7 +918,7 @@ class SecretBackend(pulumi.CustomResource):
917
918
 
918
919
  @property
919
920
  @pulumi.getter(name="defaultLeaseTtlSeconds")
920
- def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[int]]:
921
+ def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
921
922
  """
922
923
  The default TTL for credentials
923
924
  issued by this backend. Defaults to '0'.
@@ -926,7 +927,7 @@ class SecretBackend(pulumi.CustomResource):
926
927
 
927
928
  @property
928
929
  @pulumi.getter
929
- def description(self) -> pulumi.Output[Optional[str]]:
930
+ def description(self) -> pulumi.Output[Optional[builtins.str]]:
930
931
  """
931
932
  A human-friendly description for this backend.
932
933
  """
@@ -934,7 +935,7 @@ class SecretBackend(pulumi.CustomResource):
934
935
 
935
936
  @property
936
937
  @pulumi.getter(name="disableAutomatedRotation")
937
- def disable_automated_rotation(self) -> pulumi.Output[Optional[bool]]:
938
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
938
939
  """
939
940
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
940
941
  *Available only for Vault Enterprise*.
@@ -943,7 +944,7 @@ class SecretBackend(pulumi.CustomResource):
943
944
 
944
945
  @property
945
946
  @pulumi.getter(name="disableRemount")
946
- def disable_remount(self) -> pulumi.Output[Optional[bool]]:
947
+ def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
947
948
  """
948
949
  If set, opts out of mount migration on path updates.
949
950
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -952,7 +953,7 @@ class SecretBackend(pulumi.CustomResource):
952
953
 
953
954
  @property
954
955
  @pulumi.getter(name="identityTokenAudience")
955
- def identity_token_audience(self) -> pulumi.Output[Optional[str]]:
956
+ def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
956
957
  """
957
958
  The audience claim value for plugin identity
958
959
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -962,7 +963,7 @@ class SecretBackend(pulumi.CustomResource):
962
963
 
963
964
  @property
964
965
  @pulumi.getter(name="identityTokenKey")
965
- def identity_token_key(self) -> pulumi.Output[Optional[str]]:
966
+ def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
966
967
  """
967
968
  The key to use for signing plugin identity
968
969
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -971,7 +972,7 @@ class SecretBackend(pulumi.CustomResource):
971
972
 
972
973
  @property
973
974
  @pulumi.getter(name="identityTokenTtl")
974
- def identity_token_ttl(self) -> pulumi.Output[Optional[int]]:
975
+ def identity_token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
975
976
  """
976
977
  The TTL of generated tokens.
977
978
  """
@@ -979,7 +980,7 @@ class SecretBackend(pulumi.CustomResource):
979
980
 
980
981
  @property
981
982
  @pulumi.getter
982
- def local(self) -> pulumi.Output[Optional[bool]]:
983
+ def local(self) -> pulumi.Output[Optional[builtins.bool]]:
983
984
  """
984
985
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
985
986
  """
@@ -987,7 +988,7 @@ class SecretBackend(pulumi.CustomResource):
987
988
 
988
989
  @property
989
990
  @pulumi.getter(name="maxLeaseTtlSeconds")
990
- def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[int]]:
991
+ def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
991
992
  """
992
993
  The maximum TTL that can be requested
993
994
  for credentials issued by this backend. Defaults to '0'.
@@ -996,7 +997,7 @@ class SecretBackend(pulumi.CustomResource):
996
997
 
997
998
  @property
998
999
  @pulumi.getter
999
- def namespace(self) -> pulumi.Output[Optional[str]]:
1000
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1000
1001
  """
1001
1002
  The namespace to provision the resource in.
1002
1003
  The value should not contain leading or trailing forward slashes.
@@ -1007,7 +1008,7 @@ class SecretBackend(pulumi.CustomResource):
1007
1008
 
1008
1009
  @property
1009
1010
  @pulumi.getter
1010
- def path(self) -> pulumi.Output[Optional[str]]:
1011
+ def path(self) -> pulumi.Output[Optional[builtins.str]]:
1011
1012
  """
1012
1013
  The unique path this backend should be mounted at. Must
1013
1014
  not begin or end with a `/`. Defaults to `gcp`.
@@ -1016,7 +1017,7 @@ class SecretBackend(pulumi.CustomResource):
1016
1017
 
1017
1018
  @property
1018
1019
  @pulumi.getter(name="rotationPeriod")
1019
- def rotation_period(self) -> pulumi.Output[Optional[int]]:
1020
+ def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
1020
1021
  """
1021
1022
  The amount of time in seconds Vault should wait before rotating the root credential.
1022
1023
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -1026,7 +1027,7 @@ class SecretBackend(pulumi.CustomResource):
1026
1027
 
1027
1028
  @property
1028
1029
  @pulumi.getter(name="rotationSchedule")
1029
- def rotation_schedule(self) -> pulumi.Output[Optional[str]]:
1030
+ def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
1030
1031
  """
1031
1032
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1032
1033
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
@@ -1035,7 +1036,7 @@ class SecretBackend(pulumi.CustomResource):
1035
1036
 
1036
1037
  @property
1037
1038
  @pulumi.getter(name="rotationWindow")
1038
- def rotation_window(self) -> pulumi.Output[Optional[int]]:
1039
+ def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
1039
1040
  """
1040
1041
  The maximum amount of time in seconds allowed to complete
1041
1042
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1045,7 +1046,7 @@ class SecretBackend(pulumi.CustomResource):
1045
1046
 
1046
1047
  @property
1047
1048
  @pulumi.getter(name="serviceAccountEmail")
1048
- def service_account_email(self) -> pulumi.Output[Optional[str]]:
1049
+ def service_account_email(self) -> pulumi.Output[Optional[builtins.str]]:
1049
1050
  """
1050
1051
  Service Account to impersonate for plugin workload identity federation.
1051
1052
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.