pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,32 +19,32 @@ __all__ = ['SecretBackendStaticRoleArgs', 'SecretBackendStaticRole']
20
19
  @pulumi.input_type
21
20
  class SecretBackendStaticRoleArgs:
22
21
  def __init__(__self__, *,
23
- rotation_period: pulumi.Input[builtins.int],
24
- username: pulumi.Input[builtins.str],
25
- assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
26
- assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
27
- backend: Optional[pulumi.Input[builtins.str]] = None,
28
- external_id: Optional[pulumi.Input[builtins.str]] = None,
29
- name: Optional[pulumi.Input[builtins.str]] = None,
30
- namespace: Optional[pulumi.Input[builtins.str]] = None):
22
+ rotation_period: pulumi.Input[_builtins.int],
23
+ username: pulumi.Input[_builtins.str],
24
+ assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
25
+ assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
26
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
27
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
28
+ name: Optional[pulumi.Input[_builtins.str]] = None,
29
+ namespace: Optional[pulumi.Input[_builtins.str]] = None):
31
30
  """
32
31
  The set of arguments for constructing a SecretBackendStaticRole resource.
33
- :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
34
- :param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
35
- :param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
32
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
33
+ :param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
34
+ :param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
36
35
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
37
36
  If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
38
37
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
39
- :param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
38
+ :param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
40
39
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
41
40
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
42
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
41
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
43
42
  not begin or end with a `/`. Defaults to `aws`
44
- :param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
43
+ :param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
45
44
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
46
- :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
45
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
47
46
  Must be unique within the backend.
48
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
47
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
49
48
  The value should not contain leading or trailing forward slashes.
50
49
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
51
50
  *Available only for Vault Enterprise*.
@@ -65,33 +64,33 @@ class SecretBackendStaticRoleArgs:
65
64
  if namespace is not None:
66
65
  pulumi.set(__self__, "namespace", namespace)
67
66
 
68
- @property
67
+ @_builtins.property
69
68
  @pulumi.getter(name="rotationPeriod")
70
- def rotation_period(self) -> pulumi.Input[builtins.int]:
69
+ def rotation_period(self) -> pulumi.Input[_builtins.int]:
71
70
  """
72
71
  How often Vault should rotate the password of the user entry.
73
72
  """
74
73
  return pulumi.get(self, "rotation_period")
75
74
 
76
75
  @rotation_period.setter
77
- def rotation_period(self, value: pulumi.Input[builtins.int]):
76
+ def rotation_period(self, value: pulumi.Input[_builtins.int]):
78
77
  pulumi.set(self, "rotation_period", value)
79
78
 
80
- @property
79
+ @_builtins.property
81
80
  @pulumi.getter
82
- def username(self) -> pulumi.Input[builtins.str]:
81
+ def username(self) -> pulumi.Input[_builtins.str]:
83
82
  """
84
83
  The username of the existing AWS IAM to manage password rotation for.
85
84
  """
86
85
  return pulumi.get(self, "username")
87
86
 
88
87
  @username.setter
89
- def username(self, value: pulumi.Input[builtins.str]):
88
+ def username(self, value: pulumi.Input[_builtins.str]):
90
89
  pulumi.set(self, "username", value)
91
90
 
92
- @property
91
+ @_builtins.property
93
92
  @pulumi.getter(name="assumeRoleArn")
94
- def assume_role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
93
+ def assume_role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
95
94
  """
96
95
  Specifies the ARN of the role that Vault should assume.
97
96
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
@@ -101,12 +100,12 @@ class SecretBackendStaticRoleArgs:
101
100
  return pulumi.get(self, "assume_role_arn")
102
101
 
103
102
  @assume_role_arn.setter
104
- def assume_role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
103
+ def assume_role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
105
104
  pulumi.set(self, "assume_role_arn", value)
106
105
 
107
- @property
106
+ @_builtins.property
108
107
  @pulumi.getter(name="assumeRoleSessionName")
109
- def assume_role_session_name(self) -> Optional[pulumi.Input[builtins.str]]:
108
+ def assume_role_session_name(self) -> Optional[pulumi.Input[_builtins.str]]:
110
109
  """
111
110
  Specifies the session name to use when assuming the role.
112
111
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
@@ -115,12 +114,12 @@ class SecretBackendStaticRoleArgs:
115
114
  return pulumi.get(self, "assume_role_session_name")
116
115
 
117
116
  @assume_role_session_name.setter
118
- def assume_role_session_name(self, value: Optional[pulumi.Input[builtins.str]]):
117
+ def assume_role_session_name(self, value: Optional[pulumi.Input[_builtins.str]]):
119
118
  pulumi.set(self, "assume_role_session_name", value)
120
119
 
121
- @property
120
+ @_builtins.property
122
121
  @pulumi.getter
123
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
122
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
124
123
  """
125
124
  The unique path this backend should be mounted at. Must
126
125
  not begin or end with a `/`. Defaults to `aws`
@@ -128,12 +127,12 @@ class SecretBackendStaticRoleArgs:
128
127
  return pulumi.get(self, "backend")
129
128
 
130
129
  @backend.setter
131
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
130
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
132
131
  pulumi.set(self, "backend", value)
133
132
 
134
- @property
133
+ @_builtins.property
135
134
  @pulumi.getter(name="externalId")
136
- def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
135
+ def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
137
136
  """
138
137
  Specifies the external ID to use when assuming the role.
139
138
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
@@ -141,12 +140,12 @@ class SecretBackendStaticRoleArgs:
141
140
  return pulumi.get(self, "external_id")
142
141
 
143
142
  @external_id.setter
144
- def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
143
+ def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
145
144
  pulumi.set(self, "external_id", value)
146
145
 
147
- @property
146
+ @_builtins.property
148
147
  @pulumi.getter
149
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
148
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
150
149
  """
151
150
  The name to identify this role within the backend.
152
151
  Must be unique within the backend.
@@ -154,12 +153,12 @@ class SecretBackendStaticRoleArgs:
154
153
  return pulumi.get(self, "name")
155
154
 
156
155
  @name.setter
157
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
156
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
158
157
  pulumi.set(self, "name", value)
159
158
 
160
- @property
159
+ @_builtins.property
161
160
  @pulumi.getter
162
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
161
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
163
162
  """
164
163
  The namespace to provision the resource in.
165
164
  The value should not contain leading or trailing forward slashes.
@@ -169,42 +168,42 @@ class SecretBackendStaticRoleArgs:
169
168
  return pulumi.get(self, "namespace")
170
169
 
171
170
  @namespace.setter
172
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
171
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
173
172
  pulumi.set(self, "namespace", value)
174
173
 
175
174
 
176
175
  @pulumi.input_type
177
176
  class _SecretBackendStaticRoleState:
178
177
  def __init__(__self__, *,
179
- assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
180
- assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
181
- backend: Optional[pulumi.Input[builtins.str]] = None,
182
- external_id: Optional[pulumi.Input[builtins.str]] = None,
183
- name: Optional[pulumi.Input[builtins.str]] = None,
184
- namespace: Optional[pulumi.Input[builtins.str]] = None,
185
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
186
- username: Optional[pulumi.Input[builtins.str]] = None):
178
+ assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
179
+ assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
180
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
181
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
182
+ name: Optional[pulumi.Input[_builtins.str]] = None,
183
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
184
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
185
+ username: Optional[pulumi.Input[_builtins.str]] = None):
187
186
  """
188
187
  Input properties used for looking up and filtering SecretBackendStaticRole resources.
189
- :param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
188
+ :param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
190
189
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
191
190
  If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
192
191
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
193
- :param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
192
+ :param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
194
193
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
195
194
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
196
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
195
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
197
196
  not begin or end with a `/`. Defaults to `aws`
198
- :param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
197
+ :param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
199
198
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
200
- :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
199
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
201
200
  Must be unique within the backend.
202
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
201
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
203
202
  The value should not contain leading or trailing forward slashes.
204
203
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
205
204
  *Available only for Vault Enterprise*.
206
- :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
207
- :param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
205
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
206
+ :param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
208
207
  """
209
208
  if assume_role_arn is not None:
210
209
  pulumi.set(__self__, "assume_role_arn", assume_role_arn)
@@ -223,9 +222,9 @@ class _SecretBackendStaticRoleState:
223
222
  if username is not None:
224
223
  pulumi.set(__self__, "username", username)
225
224
 
226
- @property
225
+ @_builtins.property
227
226
  @pulumi.getter(name="assumeRoleArn")
228
- def assume_role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
227
+ def assume_role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
229
228
  """
230
229
  Specifies the ARN of the role that Vault should assume.
231
230
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
@@ -235,12 +234,12 @@ class _SecretBackendStaticRoleState:
235
234
  return pulumi.get(self, "assume_role_arn")
236
235
 
237
236
  @assume_role_arn.setter
238
- def assume_role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
237
+ def assume_role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
239
238
  pulumi.set(self, "assume_role_arn", value)
240
239
 
241
- @property
240
+ @_builtins.property
242
241
  @pulumi.getter(name="assumeRoleSessionName")
243
- def assume_role_session_name(self) -> Optional[pulumi.Input[builtins.str]]:
242
+ def assume_role_session_name(self) -> Optional[pulumi.Input[_builtins.str]]:
244
243
  """
245
244
  Specifies the session name to use when assuming the role.
246
245
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
@@ -249,12 +248,12 @@ class _SecretBackendStaticRoleState:
249
248
  return pulumi.get(self, "assume_role_session_name")
250
249
 
251
250
  @assume_role_session_name.setter
252
- def assume_role_session_name(self, value: Optional[pulumi.Input[builtins.str]]):
251
+ def assume_role_session_name(self, value: Optional[pulumi.Input[_builtins.str]]):
253
252
  pulumi.set(self, "assume_role_session_name", value)
254
253
 
255
- @property
254
+ @_builtins.property
256
255
  @pulumi.getter
257
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
256
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
258
257
  """
259
258
  The unique path this backend should be mounted at. Must
260
259
  not begin or end with a `/`. Defaults to `aws`
@@ -262,12 +261,12 @@ class _SecretBackendStaticRoleState:
262
261
  return pulumi.get(self, "backend")
263
262
 
264
263
  @backend.setter
265
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
264
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
266
265
  pulumi.set(self, "backend", value)
267
266
 
268
- @property
267
+ @_builtins.property
269
268
  @pulumi.getter(name="externalId")
270
- def external_id(self) -> Optional[pulumi.Input[builtins.str]]:
269
+ def external_id(self) -> Optional[pulumi.Input[_builtins.str]]:
271
270
  """
272
271
  Specifies the external ID to use when assuming the role.
273
272
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
@@ -275,12 +274,12 @@ class _SecretBackendStaticRoleState:
275
274
  return pulumi.get(self, "external_id")
276
275
 
277
276
  @external_id.setter
278
- def external_id(self, value: Optional[pulumi.Input[builtins.str]]):
277
+ def external_id(self, value: Optional[pulumi.Input[_builtins.str]]):
279
278
  pulumi.set(self, "external_id", value)
280
279
 
281
- @property
280
+ @_builtins.property
282
281
  @pulumi.getter
283
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
282
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
284
283
  """
285
284
  The name to identify this role within the backend.
286
285
  Must be unique within the backend.
@@ -288,12 +287,12 @@ class _SecretBackendStaticRoleState:
288
287
  return pulumi.get(self, "name")
289
288
 
290
289
  @name.setter
291
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
290
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
292
291
  pulumi.set(self, "name", value)
293
292
 
294
- @property
293
+ @_builtins.property
295
294
  @pulumi.getter
296
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
295
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
297
296
  """
298
297
  The namespace to provision the resource in.
299
298
  The value should not contain leading or trailing forward slashes.
@@ -303,31 +302,31 @@ class _SecretBackendStaticRoleState:
303
302
  return pulumi.get(self, "namespace")
304
303
 
305
304
  @namespace.setter
306
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
305
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
307
306
  pulumi.set(self, "namespace", value)
308
307
 
309
- @property
308
+ @_builtins.property
310
309
  @pulumi.getter(name="rotationPeriod")
311
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
310
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
312
311
  """
313
312
  How often Vault should rotate the password of the user entry.
314
313
  """
315
314
  return pulumi.get(self, "rotation_period")
316
315
 
317
316
  @rotation_period.setter
318
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
317
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
319
318
  pulumi.set(self, "rotation_period", value)
320
319
 
321
- @property
320
+ @_builtins.property
322
321
  @pulumi.getter
323
- def username(self) -> Optional[pulumi.Input[builtins.str]]:
322
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
324
323
  """
325
324
  The username of the existing AWS IAM to manage password rotation for.
326
325
  """
327
326
  return pulumi.get(self, "username")
328
327
 
329
328
  @username.setter
330
- def username(self, value: Optional[pulumi.Input[builtins.str]]):
329
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
331
330
  pulumi.set(self, "username", value)
332
331
 
333
332
 
@@ -337,14 +336,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
337
336
  def __init__(__self__,
338
337
  resource_name: str,
339
338
  opts: Optional[pulumi.ResourceOptions] = None,
340
- assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
341
- assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
342
- backend: Optional[pulumi.Input[builtins.str]] = None,
343
- external_id: Optional[pulumi.Input[builtins.str]] = None,
344
- name: Optional[pulumi.Input[builtins.str]] = None,
345
- namespace: Optional[pulumi.Input[builtins.str]] = None,
346
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
347
- username: Optional[pulumi.Input[builtins.str]] = None,
339
+ assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
340
+ assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
341
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
342
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
343
+ name: Optional[pulumi.Input[_builtins.str]] = None,
344
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
345
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
346
+ username: Optional[pulumi.Input[_builtins.str]] = None,
348
347
  __props__=None):
349
348
  """
350
349
  ## Example Usage
@@ -391,25 +390,25 @@ class SecretBackendStaticRole(pulumi.CustomResource):
391
390
 
392
391
  :param str resource_name: The name of the resource.
393
392
  :param pulumi.ResourceOptions opts: Options for the resource.
394
- :param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
393
+ :param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
395
394
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
396
395
  If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
397
396
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
398
- :param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
397
+ :param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
399
398
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
400
399
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
401
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
400
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
402
401
  not begin or end with a `/`. Defaults to `aws`
403
- :param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
402
+ :param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
404
403
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
405
- :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
404
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
406
405
  Must be unique within the backend.
407
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
406
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
408
407
  The value should not contain leading or trailing forward slashes.
409
408
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
410
409
  *Available only for Vault Enterprise*.
411
- :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
412
- :param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
410
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
411
+ :param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
413
412
  """
414
413
  ...
415
414
  @overload
@@ -475,14 +474,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
475
474
  def _internal_init(__self__,
476
475
  resource_name: str,
477
476
  opts: Optional[pulumi.ResourceOptions] = None,
478
- assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
479
- assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
480
- backend: Optional[pulumi.Input[builtins.str]] = None,
481
- external_id: Optional[pulumi.Input[builtins.str]] = None,
482
- name: Optional[pulumi.Input[builtins.str]] = None,
483
- namespace: Optional[pulumi.Input[builtins.str]] = None,
484
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
485
- username: Optional[pulumi.Input[builtins.str]] = None,
477
+ assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
478
+ assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
479
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
480
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
481
+ name: Optional[pulumi.Input[_builtins.str]] = None,
482
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
483
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
484
+ username: Optional[pulumi.Input[_builtins.str]] = None,
486
485
  __props__=None):
487
486
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
488
487
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -514,14 +513,14 @@ class SecretBackendStaticRole(pulumi.CustomResource):
514
513
  def get(resource_name: str,
515
514
  id: pulumi.Input[str],
516
515
  opts: Optional[pulumi.ResourceOptions] = None,
517
- assume_role_arn: Optional[pulumi.Input[builtins.str]] = None,
518
- assume_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
519
- backend: Optional[pulumi.Input[builtins.str]] = None,
520
- external_id: Optional[pulumi.Input[builtins.str]] = None,
521
- name: Optional[pulumi.Input[builtins.str]] = None,
522
- namespace: Optional[pulumi.Input[builtins.str]] = None,
523
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
524
- username: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackendStaticRole':
516
+ assume_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
517
+ assume_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
518
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
519
+ external_id: Optional[pulumi.Input[_builtins.str]] = None,
520
+ name: Optional[pulumi.Input[_builtins.str]] = None,
521
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
522
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
523
+ username: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackendStaticRole':
525
524
  """
526
525
  Get an existing SecretBackendStaticRole resource's state with the given name, id, and optional extra
527
526
  properties used to qualify the lookup.
@@ -529,25 +528,25 @@ class SecretBackendStaticRole(pulumi.CustomResource):
529
528
  :param str resource_name: The unique name of the resulting resource.
530
529
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
531
530
  :param pulumi.ResourceOptions opts: Options for the resource.
532
- :param pulumi.Input[builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
531
+ :param pulumi.Input[_builtins.str] assume_role_arn: Specifies the ARN of the role that Vault should assume.
533
532
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
534
533
  If `assume_role_arn` is provided, `assume_role_session_name` must also be provided.
535
534
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
536
- :param pulumi.Input[builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
535
+ :param pulumi.Input[_builtins.str] assume_role_session_name: Specifies the session name to use when assuming the role.
537
536
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
538
537
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
539
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
538
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
540
539
  not begin or end with a `/`. Defaults to `aws`
541
- :param pulumi.Input[builtins.str] external_id: Specifies the external ID to use when assuming the role.
540
+ :param pulumi.Input[_builtins.str] external_id: Specifies the external ID to use when assuming the role.
542
541
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
543
- :param pulumi.Input[builtins.str] name: The name to identify this role within the backend.
542
+ :param pulumi.Input[_builtins.str] name: The name to identify this role within the backend.
544
543
  Must be unique within the backend.
545
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
544
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
546
545
  The value should not contain leading or trailing forward slashes.
547
546
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
548
547
  *Available only for Vault Enterprise*.
549
- :param pulumi.Input[builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
550
- :param pulumi.Input[builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
548
+ :param pulumi.Input[_builtins.int] rotation_period: How often Vault should rotate the password of the user entry.
549
+ :param pulumi.Input[_builtins.str] username: The username of the existing AWS IAM to manage password rotation for.
551
550
  """
552
551
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
553
552
 
@@ -563,9 +562,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
563
562
  __props__.__dict__["username"] = username
564
563
  return SecretBackendStaticRole(resource_name, opts=opts, __props__=__props__)
565
564
 
566
- @property
565
+ @_builtins.property
567
566
  @pulumi.getter(name="assumeRoleArn")
568
- def assume_role_arn(self) -> pulumi.Output[Optional[builtins.str]]:
567
+ def assume_role_arn(self) -> pulumi.Output[Optional[_builtins.str]]:
569
568
  """
570
569
  Specifies the ARN of the role that Vault should assume.
571
570
  When provided, Vault will use AWS STS to assume this role and generate temporary credentials.
@@ -574,9 +573,9 @@ class SecretBackendStaticRole(pulumi.CustomResource):
574
573
  """
575
574
  return pulumi.get(self, "assume_role_arn")
576
575
 
577
- @property
576
+ @_builtins.property
578
577
  @pulumi.getter(name="assumeRoleSessionName")
579
- def assume_role_session_name(self) -> pulumi.Output[Optional[builtins.str]]:
578
+ def assume_role_session_name(self) -> pulumi.Output[Optional[_builtins.str]]:
580
579
  """
581
580
  Specifies the session name to use when assuming the role.
582
581
  If `assume_role_session_name` is provided, `assume_role_arn` must also be provided.
@@ -584,36 +583,36 @@ class SecretBackendStaticRole(pulumi.CustomResource):
584
583
  """
585
584
  return pulumi.get(self, "assume_role_session_name")
586
585
 
587
- @property
586
+ @_builtins.property
588
587
  @pulumi.getter
589
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
588
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
590
589
  """
591
590
  The unique path this backend should be mounted at. Must
592
591
  not begin or end with a `/`. Defaults to `aws`
593
592
  """
594
593
  return pulumi.get(self, "backend")
595
594
 
596
- @property
595
+ @_builtins.property
597
596
  @pulumi.getter(name="externalId")
598
- def external_id(self) -> pulumi.Output[Optional[builtins.str]]:
597
+ def external_id(self) -> pulumi.Output[Optional[_builtins.str]]:
599
598
  """
600
599
  Specifies the external ID to use when assuming the role.
601
600
  Requires Vault 1.19+. *Available only for Vault Enterprise*.
602
601
  """
603
602
  return pulumi.get(self, "external_id")
604
603
 
605
- @property
604
+ @_builtins.property
606
605
  @pulumi.getter
607
- def name(self) -> pulumi.Output[builtins.str]:
606
+ def name(self) -> pulumi.Output[_builtins.str]:
608
607
  """
609
608
  The name to identify this role within the backend.
610
609
  Must be unique within the backend.
611
610
  """
612
611
  return pulumi.get(self, "name")
613
612
 
614
- @property
613
+ @_builtins.property
615
614
  @pulumi.getter
616
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
615
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
617
616
  """
618
617
  The namespace to provision the resource in.
619
618
  The value should not contain leading or trailing forward slashes.
@@ -622,17 +621,17 @@ class SecretBackendStaticRole(pulumi.CustomResource):
622
621
  """
623
622
  return pulumi.get(self, "namespace")
624
623
 
625
- @property
624
+ @_builtins.property
626
625
  @pulumi.getter(name="rotationPeriod")
627
- def rotation_period(self) -> pulumi.Output[builtins.int]:
626
+ def rotation_period(self) -> pulumi.Output[_builtins.int]:
628
627
  """
629
628
  How often Vault should rotate the password of the user entry.
630
629
  """
631
630
  return pulumi.get(self, "rotation_period")
632
631
 
633
- @property
632
+ @_builtins.property
634
633
  @pulumi.getter
635
- def username(self) -> pulumi.Output[builtins.str]:
634
+ def username(self) -> pulumi.Output[_builtins.str]:
636
635
  """
637
636
  The username of the existing AWS IAM to manage password rotation for.
638
637
  """
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members: