pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,50 +19,50 @@ __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
20
19
  @pulumi.input_type
21
20
  class AuthBackendConfigArgs:
22
21
  def __init__(__self__, *,
23
- resource: pulumi.Input[builtins.str],
24
- tenant_id: pulumi.Input[builtins.str],
25
- backend: Optional[pulumi.Input[builtins.str]] = None,
26
- client_id: Optional[pulumi.Input[builtins.str]] = None,
27
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
28
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
29
- environment: Optional[pulumi.Input[builtins.str]] = None,
30
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
31
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
32
- namespace: Optional[pulumi.Input[builtins.str]] = None,
33
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
34
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
35
- rotation_window: Optional[pulumi.Input[builtins.int]] = None):
22
+ resource: pulumi.Input[_builtins.str],
23
+ tenant_id: pulumi.Input[_builtins.str],
24
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
25
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
26
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
27
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
29
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
30
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
32
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
33
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
34
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None):
36
35
  """
37
36
  The set of arguments for constructing a AuthBackendConfig resource.
38
- :param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
37
+ :param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
39
38
  Azure Active Directory.
40
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
39
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
41
40
  organization.
42
- :param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
41
+ :param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
43
42
  mounted at. Defaults to `azure`.
44
- :param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
43
+ :param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
45
44
  Currently read permissions to query compute resources are required.
46
- :param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
45
+ :param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
47
46
  Azure APIs.
48
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
47
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
49
48
  *Available only for Vault Enterprise*
50
- :param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
49
+ :param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
51
50
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
52
51
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
53
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
52
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
54
53
  *Available only for Vault Enterprise*
55
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
56
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
54
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
55
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
57
56
  The value should not contain leading or trailing forward slashes.
58
57
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
59
58
  *Available only for Vault Enterprise*.
60
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
59
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
61
60
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
62
61
  *Available only for Vault Enterprise*
63
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
62
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
64
63
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
65
64
  *Available only for Vault Enterprise*
66
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
65
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
67
66
  a rotation when a scheduled token rotation occurs. The default rotation window is
68
67
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
69
68
  *Available only for Vault Enterprise*
@@ -93,9 +92,9 @@ class AuthBackendConfigArgs:
93
92
  if rotation_window is not None:
94
93
  pulumi.set(__self__, "rotation_window", rotation_window)
95
94
 
96
- @property
95
+ @_builtins.property
97
96
  @pulumi.getter
98
- def resource(self) -> pulumi.Input[builtins.str]:
97
+ def resource(self) -> pulumi.Input[_builtins.str]:
99
98
  """
100
99
  The configured URL for the application registered in
101
100
  Azure Active Directory.
@@ -103,12 +102,12 @@ class AuthBackendConfigArgs:
103
102
  return pulumi.get(self, "resource")
104
103
 
105
104
  @resource.setter
106
- def resource(self, value: pulumi.Input[builtins.str]):
105
+ def resource(self, value: pulumi.Input[_builtins.str]):
107
106
  pulumi.set(self, "resource", value)
108
107
 
109
- @property
108
+ @_builtins.property
110
109
  @pulumi.getter(name="tenantId")
111
- def tenant_id(self) -> pulumi.Input[builtins.str]:
110
+ def tenant_id(self) -> pulumi.Input[_builtins.str]:
112
111
  """
113
112
  The tenant id for the Azure Active Directory
114
113
  organization.
@@ -116,12 +115,12 @@ class AuthBackendConfigArgs:
116
115
  return pulumi.get(self, "tenant_id")
117
116
 
118
117
  @tenant_id.setter
119
- def tenant_id(self, value: pulumi.Input[builtins.str]):
118
+ def tenant_id(self, value: pulumi.Input[_builtins.str]):
120
119
  pulumi.set(self, "tenant_id", value)
121
120
 
122
- @property
121
+ @_builtins.property
123
122
  @pulumi.getter
124
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
123
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
125
124
  """
126
125
  The path the Azure auth backend being configured was
127
126
  mounted at. Defaults to `azure`.
@@ -129,12 +128,12 @@ class AuthBackendConfigArgs:
129
128
  return pulumi.get(self, "backend")
130
129
 
131
130
  @backend.setter
132
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
131
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
133
132
  pulumi.set(self, "backend", value)
134
133
 
135
- @property
134
+ @_builtins.property
136
135
  @pulumi.getter(name="clientId")
137
- def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
136
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
138
137
  """
139
138
  The client id for credentials to query the Azure APIs.
140
139
  Currently read permissions to query compute resources are required.
@@ -142,12 +141,12 @@ class AuthBackendConfigArgs:
142
141
  return pulumi.get(self, "client_id")
143
142
 
144
143
  @client_id.setter
145
- def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
144
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
146
145
  pulumi.set(self, "client_id", value)
147
146
 
148
- @property
147
+ @_builtins.property
149
148
  @pulumi.getter(name="clientSecret")
150
- def client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
149
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
151
150
  """
152
151
  The client secret for credentials to query the
153
152
  Azure APIs.
@@ -155,12 +154,12 @@ class AuthBackendConfigArgs:
155
154
  return pulumi.get(self, "client_secret")
156
155
 
157
156
  @client_secret.setter
158
- def client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
157
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
159
158
  pulumi.set(self, "client_secret", value)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter(name="disableAutomatedRotation")
163
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
162
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
164
163
  """
165
164
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
166
165
  *Available only for Vault Enterprise*
@@ -168,12 +167,12 @@ class AuthBackendConfigArgs:
168
167
  return pulumi.get(self, "disable_automated_rotation")
169
168
 
170
169
  @disable_automated_rotation.setter
171
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
170
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
172
171
  pulumi.set(self, "disable_automated_rotation", value)
173
172
 
174
- @property
173
+ @_builtins.property
175
174
  @pulumi.getter
176
- def environment(self) -> Optional[pulumi.Input[builtins.str]]:
175
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
177
176
  """
178
177
  The Azure cloud environment. Valid values:
179
178
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
@@ -182,12 +181,12 @@ class AuthBackendConfigArgs:
182
181
  return pulumi.get(self, "environment")
183
182
 
184
183
  @environment.setter
185
- def environment(self, value: Optional[pulumi.Input[builtins.str]]):
184
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
186
185
  pulumi.set(self, "environment", value)
187
186
 
188
- @property
187
+ @_builtins.property
189
188
  @pulumi.getter(name="identityTokenAudience")
190
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
189
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
191
190
  """
192
191
  The audience claim value for plugin identity tokens. Requires Vault 1.17+.
193
192
  *Available only for Vault Enterprise*
@@ -195,24 +194,24 @@ class AuthBackendConfigArgs:
195
194
  return pulumi.get(self, "identity_token_audience")
196
195
 
197
196
  @identity_token_audience.setter
198
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
197
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
199
198
  pulumi.set(self, "identity_token_audience", value)
200
199
 
201
- @property
200
+ @_builtins.property
202
201
  @pulumi.getter(name="identityTokenTtl")
203
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
202
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
204
203
  """
205
204
  The TTL of generated identity tokens in seconds.
206
205
  """
207
206
  return pulumi.get(self, "identity_token_ttl")
208
207
 
209
208
  @identity_token_ttl.setter
210
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
209
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
211
210
  pulumi.set(self, "identity_token_ttl", value)
212
211
 
213
- @property
212
+ @_builtins.property
214
213
  @pulumi.getter
215
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
214
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
216
215
  """
217
216
  The namespace to provision the resource in.
218
217
  The value should not contain leading or trailing forward slashes.
@@ -222,12 +221,12 @@ class AuthBackendConfigArgs:
222
221
  return pulumi.get(self, "namespace")
223
222
 
224
223
  @namespace.setter
225
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
224
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
226
225
  pulumi.set(self, "namespace", value)
227
226
 
228
- @property
227
+ @_builtins.property
229
228
  @pulumi.getter(name="rotationPeriod")
230
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
229
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
231
230
  """
232
231
  The amount of time in seconds Vault should wait before rotating the root credential.
233
232
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -236,12 +235,12 @@ class AuthBackendConfigArgs:
236
235
  return pulumi.get(self, "rotation_period")
237
236
 
238
237
  @rotation_period.setter
239
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
238
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
240
239
  pulumi.set(self, "rotation_period", value)
241
240
 
242
- @property
241
+ @_builtins.property
243
242
  @pulumi.getter(name="rotationSchedule")
244
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
243
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
245
244
  """
246
245
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
247
246
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -250,12 +249,12 @@ class AuthBackendConfigArgs:
250
249
  return pulumi.get(self, "rotation_schedule")
251
250
 
252
251
  @rotation_schedule.setter
253
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
252
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
254
253
  pulumi.set(self, "rotation_schedule", value)
255
254
 
256
- @property
255
+ @_builtins.property
257
256
  @pulumi.getter(name="rotationWindow")
258
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
257
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
259
258
  """
260
259
  The maximum amount of time in seconds allowed to complete
261
260
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -265,59 +264,59 @@ class AuthBackendConfigArgs:
265
264
  return pulumi.get(self, "rotation_window")
266
265
 
267
266
  @rotation_window.setter
268
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
267
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
269
268
  pulumi.set(self, "rotation_window", value)
270
269
 
271
270
 
272
271
  @pulumi.input_type
273
272
  class _AuthBackendConfigState:
274
273
  def __init__(__self__, *,
275
- backend: Optional[pulumi.Input[builtins.str]] = None,
276
- client_id: Optional[pulumi.Input[builtins.str]] = None,
277
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
278
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
279
- environment: Optional[pulumi.Input[builtins.str]] = None,
280
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
281
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
282
- namespace: Optional[pulumi.Input[builtins.str]] = None,
283
- resource: Optional[pulumi.Input[builtins.str]] = None,
284
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
285
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
286
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
287
- tenant_id: Optional[pulumi.Input[builtins.str]] = None):
274
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
275
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
276
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
277
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
278
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
279
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
280
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
281
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
282
+ resource: Optional[pulumi.Input[_builtins.str]] = None,
283
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
284
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
285
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
286
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None):
288
287
  """
289
288
  Input properties used for looking up and filtering AuthBackendConfig resources.
290
- :param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
289
+ :param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
291
290
  mounted at. Defaults to `azure`.
292
- :param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
291
+ :param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
293
292
  Currently read permissions to query compute resources are required.
294
- :param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
293
+ :param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
295
294
  Azure APIs.
296
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
295
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
297
296
  *Available only for Vault Enterprise*
298
- :param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
297
+ :param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
299
298
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
300
299
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
301
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
300
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
302
301
  *Available only for Vault Enterprise*
303
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
304
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
302
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
303
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
305
304
  The value should not contain leading or trailing forward slashes.
306
305
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
307
306
  *Available only for Vault Enterprise*.
308
- :param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
307
+ :param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
309
308
  Azure Active Directory.
310
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
309
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
311
310
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
312
311
  *Available only for Vault Enterprise*
313
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
312
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
314
313
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
315
314
  *Available only for Vault Enterprise*
316
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
315
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
317
316
  a rotation when a scheduled token rotation occurs. The default rotation window is
318
317
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
319
318
  *Available only for Vault Enterprise*
320
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
319
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
321
320
  organization.
322
321
  """
323
322
  if backend is not None:
@@ -347,9 +346,9 @@ class _AuthBackendConfigState:
347
346
  if tenant_id is not None:
348
347
  pulumi.set(__self__, "tenant_id", tenant_id)
349
348
 
350
- @property
349
+ @_builtins.property
351
350
  @pulumi.getter
352
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
351
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
353
352
  """
354
353
  The path the Azure auth backend being configured was
355
354
  mounted at. Defaults to `azure`.
@@ -357,12 +356,12 @@ class _AuthBackendConfigState:
357
356
  return pulumi.get(self, "backend")
358
357
 
359
358
  @backend.setter
360
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
359
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
361
360
  pulumi.set(self, "backend", value)
362
361
 
363
- @property
362
+ @_builtins.property
364
363
  @pulumi.getter(name="clientId")
365
- def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
364
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
366
365
  """
367
366
  The client id for credentials to query the Azure APIs.
368
367
  Currently read permissions to query compute resources are required.
@@ -370,12 +369,12 @@ class _AuthBackendConfigState:
370
369
  return pulumi.get(self, "client_id")
371
370
 
372
371
  @client_id.setter
373
- def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
372
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
374
373
  pulumi.set(self, "client_id", value)
375
374
 
376
- @property
375
+ @_builtins.property
377
376
  @pulumi.getter(name="clientSecret")
378
- def client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
377
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
379
378
  """
380
379
  The client secret for credentials to query the
381
380
  Azure APIs.
@@ -383,12 +382,12 @@ class _AuthBackendConfigState:
383
382
  return pulumi.get(self, "client_secret")
384
383
 
385
384
  @client_secret.setter
386
- def client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
385
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
387
386
  pulumi.set(self, "client_secret", value)
388
387
 
389
- @property
388
+ @_builtins.property
390
389
  @pulumi.getter(name="disableAutomatedRotation")
391
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
390
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
392
391
  """
393
392
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
394
393
  *Available only for Vault Enterprise*
@@ -396,12 +395,12 @@ class _AuthBackendConfigState:
396
395
  return pulumi.get(self, "disable_automated_rotation")
397
396
 
398
397
  @disable_automated_rotation.setter
399
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
398
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
400
399
  pulumi.set(self, "disable_automated_rotation", value)
401
400
 
402
- @property
401
+ @_builtins.property
403
402
  @pulumi.getter
404
- def environment(self) -> Optional[pulumi.Input[builtins.str]]:
403
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
405
404
  """
406
405
  The Azure cloud environment. Valid values:
407
406
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
@@ -410,12 +409,12 @@ class _AuthBackendConfigState:
410
409
  return pulumi.get(self, "environment")
411
410
 
412
411
  @environment.setter
413
- def environment(self, value: Optional[pulumi.Input[builtins.str]]):
412
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
414
413
  pulumi.set(self, "environment", value)
415
414
 
416
- @property
415
+ @_builtins.property
417
416
  @pulumi.getter(name="identityTokenAudience")
418
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
417
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
419
418
  """
420
419
  The audience claim value for plugin identity tokens. Requires Vault 1.17+.
421
420
  *Available only for Vault Enterprise*
@@ -423,24 +422,24 @@ class _AuthBackendConfigState:
423
422
  return pulumi.get(self, "identity_token_audience")
424
423
 
425
424
  @identity_token_audience.setter
426
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
425
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
427
426
  pulumi.set(self, "identity_token_audience", value)
428
427
 
429
- @property
428
+ @_builtins.property
430
429
  @pulumi.getter(name="identityTokenTtl")
431
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
430
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
432
431
  """
433
432
  The TTL of generated identity tokens in seconds.
434
433
  """
435
434
  return pulumi.get(self, "identity_token_ttl")
436
435
 
437
436
  @identity_token_ttl.setter
438
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
437
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
439
438
  pulumi.set(self, "identity_token_ttl", value)
440
439
 
441
- @property
440
+ @_builtins.property
442
441
  @pulumi.getter
443
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
442
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
444
443
  """
445
444
  The namespace to provision the resource in.
446
445
  The value should not contain leading or trailing forward slashes.
@@ -450,12 +449,12 @@ class _AuthBackendConfigState:
450
449
  return pulumi.get(self, "namespace")
451
450
 
452
451
  @namespace.setter
453
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
452
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
454
453
  pulumi.set(self, "namespace", value)
455
454
 
456
- @property
455
+ @_builtins.property
457
456
  @pulumi.getter
458
- def resource(self) -> Optional[pulumi.Input[builtins.str]]:
457
+ def resource(self) -> Optional[pulumi.Input[_builtins.str]]:
459
458
  """
460
459
  The configured URL for the application registered in
461
460
  Azure Active Directory.
@@ -463,12 +462,12 @@ class _AuthBackendConfigState:
463
462
  return pulumi.get(self, "resource")
464
463
 
465
464
  @resource.setter
466
- def resource(self, value: Optional[pulumi.Input[builtins.str]]):
465
+ def resource(self, value: Optional[pulumi.Input[_builtins.str]]):
467
466
  pulumi.set(self, "resource", value)
468
467
 
469
- @property
468
+ @_builtins.property
470
469
  @pulumi.getter(name="rotationPeriod")
471
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
470
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
472
471
  """
473
472
  The amount of time in seconds Vault should wait before rotating the root credential.
474
473
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -477,12 +476,12 @@ class _AuthBackendConfigState:
477
476
  return pulumi.get(self, "rotation_period")
478
477
 
479
478
  @rotation_period.setter
480
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
479
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
481
480
  pulumi.set(self, "rotation_period", value)
482
481
 
483
- @property
482
+ @_builtins.property
484
483
  @pulumi.getter(name="rotationSchedule")
485
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
484
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
486
485
  """
487
486
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
488
487
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -491,12 +490,12 @@ class _AuthBackendConfigState:
491
490
  return pulumi.get(self, "rotation_schedule")
492
491
 
493
492
  @rotation_schedule.setter
494
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
493
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
495
494
  pulumi.set(self, "rotation_schedule", value)
496
495
 
497
- @property
496
+ @_builtins.property
498
497
  @pulumi.getter(name="rotationWindow")
499
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
498
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
500
499
  """
501
500
  The maximum amount of time in seconds allowed to complete
502
501
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -506,12 +505,12 @@ class _AuthBackendConfigState:
506
505
  return pulumi.get(self, "rotation_window")
507
506
 
508
507
  @rotation_window.setter
509
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
508
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
510
509
  pulumi.set(self, "rotation_window", value)
511
510
 
512
- @property
511
+ @_builtins.property
513
512
  @pulumi.getter(name="tenantId")
514
- def tenant_id(self) -> Optional[pulumi.Input[builtins.str]]:
513
+ def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
515
514
  """
516
515
  The tenant id for the Azure Active Directory
517
516
  organization.
@@ -519,7 +518,7 @@ class _AuthBackendConfigState:
519
518
  return pulumi.get(self, "tenant_id")
520
519
 
521
520
  @tenant_id.setter
522
- def tenant_id(self, value: Optional[pulumi.Input[builtins.str]]):
521
+ def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
523
522
  pulumi.set(self, "tenant_id", value)
524
523
 
525
524
 
@@ -529,19 +528,19 @@ class AuthBackendConfig(pulumi.CustomResource):
529
528
  def __init__(__self__,
530
529
  resource_name: str,
531
530
  opts: Optional[pulumi.ResourceOptions] = None,
532
- backend: Optional[pulumi.Input[builtins.str]] = None,
533
- client_id: Optional[pulumi.Input[builtins.str]] = None,
534
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
535
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
536
- environment: Optional[pulumi.Input[builtins.str]] = None,
537
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
538
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
539
- namespace: Optional[pulumi.Input[builtins.str]] = None,
540
- resource: Optional[pulumi.Input[builtins.str]] = None,
541
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
542
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
543
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
544
- tenant_id: Optional[pulumi.Input[builtins.str]] = None,
531
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
532
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
533
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
534
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
535
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
536
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
537
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
538
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
539
+ resource: Optional[pulumi.Input[_builtins.str]] = None,
540
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
541
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
542
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
543
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
545
544
  __props__=None):
546
545
  """
547
546
  ## Example Usage
@@ -589,37 +588,37 @@ class AuthBackendConfig(pulumi.CustomResource):
589
588
 
590
589
  :param str resource_name: The name of the resource.
591
590
  :param pulumi.ResourceOptions opts: Options for the resource.
592
- :param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
591
+ :param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
593
592
  mounted at. Defaults to `azure`.
594
- :param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
593
+ :param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
595
594
  Currently read permissions to query compute resources are required.
596
- :param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
595
+ :param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
597
596
  Azure APIs.
598
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
597
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
599
598
  *Available only for Vault Enterprise*
600
- :param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
599
+ :param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
601
600
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
602
601
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
603
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
602
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
604
603
  *Available only for Vault Enterprise*
605
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
606
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
604
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
605
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
607
606
  The value should not contain leading or trailing forward slashes.
608
607
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
609
608
  *Available only for Vault Enterprise*.
610
- :param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
609
+ :param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
611
610
  Azure Active Directory.
612
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
611
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
613
612
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
614
613
  *Available only for Vault Enterprise*
615
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
614
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
616
615
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
617
616
  *Available only for Vault Enterprise*
618
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
617
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
619
618
  a rotation when a scheduled token rotation occurs. The default rotation window is
620
619
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
621
620
  *Available only for Vault Enterprise*
622
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
621
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
623
622
  organization.
624
623
  """
625
624
  ...
@@ -687,19 +686,19 @@ class AuthBackendConfig(pulumi.CustomResource):
687
686
  def _internal_init(__self__,
688
687
  resource_name: str,
689
688
  opts: Optional[pulumi.ResourceOptions] = None,
690
- backend: Optional[pulumi.Input[builtins.str]] = None,
691
- client_id: Optional[pulumi.Input[builtins.str]] = None,
692
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
693
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
694
- environment: Optional[pulumi.Input[builtins.str]] = None,
695
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
696
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
697
- namespace: Optional[pulumi.Input[builtins.str]] = None,
698
- resource: Optional[pulumi.Input[builtins.str]] = None,
699
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
700
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
701
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
702
- tenant_id: Optional[pulumi.Input[builtins.str]] = None,
689
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
690
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
691
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
692
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
693
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
694
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
695
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
696
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
697
+ resource: Optional[pulumi.Input[_builtins.str]] = None,
698
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
699
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
700
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
701
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
703
702
  __props__=None):
704
703
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
705
704
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -738,19 +737,19 @@ class AuthBackendConfig(pulumi.CustomResource):
738
737
  def get(resource_name: str,
739
738
  id: pulumi.Input[str],
740
739
  opts: Optional[pulumi.ResourceOptions] = None,
741
- backend: Optional[pulumi.Input[builtins.str]] = None,
742
- client_id: Optional[pulumi.Input[builtins.str]] = None,
743
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
744
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
745
- environment: Optional[pulumi.Input[builtins.str]] = None,
746
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
747
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
748
- namespace: Optional[pulumi.Input[builtins.str]] = None,
749
- resource: Optional[pulumi.Input[builtins.str]] = None,
750
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
751
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
752
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
753
- tenant_id: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendConfig':
740
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
741
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
742
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
743
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
744
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
745
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
746
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
747
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
748
+ resource: Optional[pulumi.Input[_builtins.str]] = None,
749
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
750
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
751
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
752
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendConfig':
754
753
  """
755
754
  Get an existing AuthBackendConfig resource's state with the given name, id, and optional extra
756
755
  properties used to qualify the lookup.
@@ -758,37 +757,37 @@ class AuthBackendConfig(pulumi.CustomResource):
758
757
  :param str resource_name: The unique name of the resulting resource.
759
758
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
760
759
  :param pulumi.ResourceOptions opts: Options for the resource.
761
- :param pulumi.Input[builtins.str] backend: The path the Azure auth backend being configured was
760
+ :param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
762
761
  mounted at. Defaults to `azure`.
763
- :param pulumi.Input[builtins.str] client_id: The client id for credentials to query the Azure APIs.
762
+ :param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
764
763
  Currently read permissions to query compute resources are required.
765
- :param pulumi.Input[builtins.str] client_secret: The client secret for credentials to query the
764
+ :param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
766
765
  Azure APIs.
767
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
766
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
768
767
  *Available only for Vault Enterprise*
769
- :param pulumi.Input[builtins.str] environment: The Azure cloud environment. Valid values:
768
+ :param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
770
769
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
771
770
  AzureGermanCloud. Defaults to `AzurePublicCloud`.
772
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
771
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
773
772
  *Available only for Vault Enterprise*
774
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
775
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
773
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
774
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
776
775
  The value should not contain leading or trailing forward slashes.
777
776
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
778
777
  *Available only for Vault Enterprise*.
779
- :param pulumi.Input[builtins.str] resource: The configured URL for the application registered in
778
+ :param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
780
779
  Azure Active Directory.
781
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
780
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
782
781
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
783
782
  *Available only for Vault Enterprise*
784
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
783
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
785
784
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
786
785
  *Available only for Vault Enterprise*
787
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
786
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
788
787
  a rotation when a scheduled token rotation occurs. The default rotation window is
789
788
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
790
789
  *Available only for Vault Enterprise*
791
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory
790
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
792
791
  organization.
793
792
  """
794
793
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -810,45 +809,45 @@ class AuthBackendConfig(pulumi.CustomResource):
810
809
  __props__.__dict__["tenant_id"] = tenant_id
811
810
  return AuthBackendConfig(resource_name, opts=opts, __props__=__props__)
812
811
 
813
- @property
812
+ @_builtins.property
814
813
  @pulumi.getter
815
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
814
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
816
815
  """
817
816
  The path the Azure auth backend being configured was
818
817
  mounted at. Defaults to `azure`.
819
818
  """
820
819
  return pulumi.get(self, "backend")
821
820
 
822
- @property
821
+ @_builtins.property
823
822
  @pulumi.getter(name="clientId")
824
- def client_id(self) -> pulumi.Output[Optional[builtins.str]]:
823
+ def client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
825
824
  """
826
825
  The client id for credentials to query the Azure APIs.
827
826
  Currently read permissions to query compute resources are required.
828
827
  """
829
828
  return pulumi.get(self, "client_id")
830
829
 
831
- @property
830
+ @_builtins.property
832
831
  @pulumi.getter(name="clientSecret")
833
- def client_secret(self) -> pulumi.Output[Optional[builtins.str]]:
832
+ def client_secret(self) -> pulumi.Output[Optional[_builtins.str]]:
834
833
  """
835
834
  The client secret for credentials to query the
836
835
  Azure APIs.
837
836
  """
838
837
  return pulumi.get(self, "client_secret")
839
838
 
840
- @property
839
+ @_builtins.property
841
840
  @pulumi.getter(name="disableAutomatedRotation")
842
- def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
841
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
843
842
  """
844
843
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
845
844
  *Available only for Vault Enterprise*
846
845
  """
847
846
  return pulumi.get(self, "disable_automated_rotation")
848
847
 
849
- @property
848
+ @_builtins.property
850
849
  @pulumi.getter
851
- def environment(self) -> pulumi.Output[Optional[builtins.str]]:
850
+ def environment(self) -> pulumi.Output[Optional[_builtins.str]]:
852
851
  """
853
852
  The Azure cloud environment. Valid values:
854
853
  AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
@@ -856,26 +855,26 @@ class AuthBackendConfig(pulumi.CustomResource):
856
855
  """
857
856
  return pulumi.get(self, "environment")
858
857
 
859
- @property
858
+ @_builtins.property
860
859
  @pulumi.getter(name="identityTokenAudience")
861
- def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
860
+ def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
862
861
  """
863
862
  The audience claim value for plugin identity tokens. Requires Vault 1.17+.
864
863
  *Available only for Vault Enterprise*
865
864
  """
866
865
  return pulumi.get(self, "identity_token_audience")
867
866
 
868
- @property
867
+ @_builtins.property
869
868
  @pulumi.getter(name="identityTokenTtl")
870
- def identity_token_ttl(self) -> pulumi.Output[builtins.int]:
869
+ def identity_token_ttl(self) -> pulumi.Output[_builtins.int]:
871
870
  """
872
871
  The TTL of generated identity tokens in seconds.
873
872
  """
874
873
  return pulumi.get(self, "identity_token_ttl")
875
874
 
876
- @property
875
+ @_builtins.property
877
876
  @pulumi.getter
878
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
877
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
879
878
  """
880
879
  The namespace to provision the resource in.
881
880
  The value should not contain leading or trailing forward slashes.
@@ -884,18 +883,18 @@ class AuthBackendConfig(pulumi.CustomResource):
884
883
  """
885
884
  return pulumi.get(self, "namespace")
886
885
 
887
- @property
886
+ @_builtins.property
888
887
  @pulumi.getter
889
- def resource(self) -> pulumi.Output[builtins.str]:
888
+ def resource(self) -> pulumi.Output[_builtins.str]:
890
889
  """
891
890
  The configured URL for the application registered in
892
891
  Azure Active Directory.
893
892
  """
894
893
  return pulumi.get(self, "resource")
895
894
 
896
- @property
895
+ @_builtins.property
897
896
  @pulumi.getter(name="rotationPeriod")
898
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
897
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
899
898
  """
900
899
  The amount of time in seconds Vault should wait before rotating the root credential.
901
900
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -903,9 +902,9 @@ class AuthBackendConfig(pulumi.CustomResource):
903
902
  """
904
903
  return pulumi.get(self, "rotation_period")
905
904
 
906
- @property
905
+ @_builtins.property
907
906
  @pulumi.getter(name="rotationSchedule")
908
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
907
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
909
908
  """
910
909
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
911
910
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -913,9 +912,9 @@ class AuthBackendConfig(pulumi.CustomResource):
913
912
  """
914
913
  return pulumi.get(self, "rotation_schedule")
915
914
 
916
- @property
915
+ @_builtins.property
917
916
  @pulumi.getter(name="rotationWindow")
918
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
917
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
919
918
  """
920
919
  The maximum amount of time in seconds allowed to complete
921
920
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -924,9 +923,9 @@ class AuthBackendConfig(pulumi.CustomResource):
924
923
  """
925
924
  return pulumi.get(self, "rotation_window")
926
925
 
927
- @property
926
+ @_builtins.property
928
927
  @pulumi.getter(name="tenantId")
929
- def tenant_id(self) -> pulumi.Output[builtins.str]:
928
+ def tenant_id(self) -> pulumi.Output[_builtins.str]:
930
929
  """
931
930
  The tenant id for the Azure Active Directory
932
931
  organization.