pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members:
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,19 +19,19 @@ __all__ = ['AuthBackendLoginArgs', 'AuthBackendLogin']
20
19
  @pulumi.input_type
21
20
  class AuthBackendLoginArgs:
22
21
  def __init__(__self__, *,
23
- role_id: pulumi.Input[builtins.str],
24
- backend: Optional[pulumi.Input[builtins.str]] = None,
25
- namespace: Optional[pulumi.Input[builtins.str]] = None,
26
- secret_id: Optional[pulumi.Input[builtins.str]] = None):
22
+ role_id: pulumi.Input[_builtins.str],
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None):
27
26
  """
28
27
  The set of arguments for constructing a AuthBackendLogin resource.
29
- :param pulumi.Input[builtins.str] role_id: The ID of the role to log in with.
30
- :param pulumi.Input[builtins.str] backend: The unique path of the Vault backend to log in with.
31
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
28
+ :param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
29
+ :param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
30
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
32
31
  The value should not contain leading or trailing forward slashes.
33
32
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
33
  *Available only for Vault Enterprise*.
35
- :param pulumi.Input[builtins.str] secret_id: The secret ID of the role to log in with. Required
34
+ :param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
36
35
  unless `bind_secret_id` is set to false on the role.
37
36
  """
38
37
  pulumi.set(__self__, "role_id", role_id)
@@ -43,33 +42,33 @@ class AuthBackendLoginArgs:
43
42
  if secret_id is not None:
44
43
  pulumi.set(__self__, "secret_id", secret_id)
45
44
 
46
- @property
45
+ @_builtins.property
47
46
  @pulumi.getter(name="roleId")
48
- def role_id(self) -> pulumi.Input[builtins.str]:
47
+ def role_id(self) -> pulumi.Input[_builtins.str]:
49
48
  """
50
49
  The ID of the role to log in with.
51
50
  """
52
51
  return pulumi.get(self, "role_id")
53
52
 
54
53
  @role_id.setter
55
- def role_id(self, value: pulumi.Input[builtins.str]):
54
+ def role_id(self, value: pulumi.Input[_builtins.str]):
56
55
  pulumi.set(self, "role_id", value)
57
56
 
58
- @property
57
+ @_builtins.property
59
58
  @pulumi.getter
60
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
59
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
61
60
  """
62
61
  The unique path of the Vault backend to log in with.
63
62
  """
64
63
  return pulumi.get(self, "backend")
65
64
 
66
65
  @backend.setter
67
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
66
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
68
67
  pulumi.set(self, "backend", value)
69
68
 
70
- @property
69
+ @_builtins.property
71
70
  @pulumi.getter
72
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
71
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
73
72
  """
74
73
  The namespace to provision the resource in.
75
74
  The value should not contain leading or trailing forward slashes.
@@ -79,12 +78,12 @@ class AuthBackendLoginArgs:
79
78
  return pulumi.get(self, "namespace")
80
79
 
81
80
  @namespace.setter
82
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
81
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
83
82
  pulumi.set(self, "namespace", value)
84
83
 
85
- @property
84
+ @_builtins.property
86
85
  @pulumi.getter(name="secretId")
87
- def secret_id(self) -> Optional[pulumi.Input[builtins.str]]:
86
+ def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
88
87
  """
89
88
  The secret ID of the role to log in with. Required
90
89
  unless `bind_secret_id` is set to false on the role.
@@ -92,40 +91,40 @@ class AuthBackendLoginArgs:
92
91
  return pulumi.get(self, "secret_id")
93
92
 
94
93
  @secret_id.setter
95
- def secret_id(self, value: Optional[pulumi.Input[builtins.str]]):
94
+ def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
96
95
  pulumi.set(self, "secret_id", value)
97
96
 
98
97
 
99
98
  @pulumi.input_type
100
99
  class _AuthBackendLoginState:
101
100
  def __init__(__self__, *,
102
- accessor: Optional[pulumi.Input[builtins.str]] = None,
103
- backend: Optional[pulumi.Input[builtins.str]] = None,
104
- client_token: Optional[pulumi.Input[builtins.str]] = None,
105
- lease_duration: Optional[pulumi.Input[builtins.int]] = None,
106
- lease_started: Optional[pulumi.Input[builtins.str]] = None,
107
- metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
108
- namespace: Optional[pulumi.Input[builtins.str]] = None,
109
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
110
- renewable: Optional[pulumi.Input[builtins.bool]] = None,
111
- role_id: Optional[pulumi.Input[builtins.str]] = None,
112
- secret_id: Optional[pulumi.Input[builtins.str]] = None):
101
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
102
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
103
+ client_token: Optional[pulumi.Input[_builtins.str]] = None,
104
+ lease_duration: Optional[pulumi.Input[_builtins.int]] = None,
105
+ lease_started: Optional[pulumi.Input[_builtins.str]] = None,
106
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
107
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
108
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
109
+ renewable: Optional[pulumi.Input[_builtins.bool]] = None,
110
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
111
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None):
113
112
  """
114
113
  Input properties used for looking up and filtering AuthBackendLogin resources.
115
- :param pulumi.Input[builtins.str] accessor: The accessor for the token.
116
- :param pulumi.Input[builtins.str] backend: The unique path of the Vault backend to log in with.
117
- :param pulumi.Input[builtins.str] client_token: The Vault token created.
118
- :param pulumi.Input[builtins.int] lease_duration: How long the token is valid for, in seconds.
119
- :param pulumi.Input[builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
120
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] metadata: The metadata associated with the token.
121
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
114
+ :param pulumi.Input[_builtins.str] accessor: The accessor for the token.
115
+ :param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
116
+ :param pulumi.Input[_builtins.str] client_token: The Vault token created.
117
+ :param pulumi.Input[_builtins.int] lease_duration: How long the token is valid for, in seconds.
118
+ :param pulumi.Input[_builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
119
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: The metadata associated with the token.
120
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
122
121
  The value should not contain leading or trailing forward slashes.
123
122
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
124
123
  *Available only for Vault Enterprise*.
125
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: A list of policies applied to the token.
126
- :param pulumi.Input[builtins.bool] renewable: Whether the token is renewable or not.
127
- :param pulumi.Input[builtins.str] role_id: The ID of the role to log in with.
128
- :param pulumi.Input[builtins.str] secret_id: The secret ID of the role to log in with. Required
124
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies applied to the token.
125
+ :param pulumi.Input[_builtins.bool] renewable: Whether the token is renewable or not.
126
+ :param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
127
+ :param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
129
128
  unless `bind_secret_id` is set to false on the role.
130
129
  """
131
130
  if accessor is not None:
@@ -151,81 +150,81 @@ class _AuthBackendLoginState:
151
150
  if secret_id is not None:
152
151
  pulumi.set(__self__, "secret_id", secret_id)
153
152
 
154
- @property
153
+ @_builtins.property
155
154
  @pulumi.getter
156
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
155
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
157
156
  """
158
157
  The accessor for the token.
159
158
  """
160
159
  return pulumi.get(self, "accessor")
161
160
 
162
161
  @accessor.setter
163
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
162
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
164
163
  pulumi.set(self, "accessor", value)
165
164
 
166
- @property
165
+ @_builtins.property
167
166
  @pulumi.getter
168
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
167
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
169
168
  """
170
169
  The unique path of the Vault backend to log in with.
171
170
  """
172
171
  return pulumi.get(self, "backend")
173
172
 
174
173
  @backend.setter
175
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
174
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
176
175
  pulumi.set(self, "backend", value)
177
176
 
178
- @property
177
+ @_builtins.property
179
178
  @pulumi.getter(name="clientToken")
180
- def client_token(self) -> Optional[pulumi.Input[builtins.str]]:
179
+ def client_token(self) -> Optional[pulumi.Input[_builtins.str]]:
181
180
  """
182
181
  The Vault token created.
183
182
  """
184
183
  return pulumi.get(self, "client_token")
185
184
 
186
185
  @client_token.setter
187
- def client_token(self, value: Optional[pulumi.Input[builtins.str]]):
186
+ def client_token(self, value: Optional[pulumi.Input[_builtins.str]]):
188
187
  pulumi.set(self, "client_token", value)
189
188
 
190
- @property
189
+ @_builtins.property
191
190
  @pulumi.getter(name="leaseDuration")
192
- def lease_duration(self) -> Optional[pulumi.Input[builtins.int]]:
191
+ def lease_duration(self) -> Optional[pulumi.Input[_builtins.int]]:
193
192
  """
194
193
  How long the token is valid for, in seconds.
195
194
  """
196
195
  return pulumi.get(self, "lease_duration")
197
196
 
198
197
  @lease_duration.setter
199
- def lease_duration(self, value: Optional[pulumi.Input[builtins.int]]):
198
+ def lease_duration(self, value: Optional[pulumi.Input[_builtins.int]]):
200
199
  pulumi.set(self, "lease_duration", value)
201
200
 
202
- @property
201
+ @_builtins.property
203
202
  @pulumi.getter(name="leaseStarted")
204
- def lease_started(self) -> Optional[pulumi.Input[builtins.str]]:
203
+ def lease_started(self) -> Optional[pulumi.Input[_builtins.str]]:
205
204
  """
206
205
  The date and time the lease started, in RFC 3339 format.
207
206
  """
208
207
  return pulumi.get(self, "lease_started")
209
208
 
210
209
  @lease_started.setter
211
- def lease_started(self, value: Optional[pulumi.Input[builtins.str]]):
210
+ def lease_started(self, value: Optional[pulumi.Input[_builtins.str]]):
212
211
  pulumi.set(self, "lease_started", value)
213
212
 
214
- @property
213
+ @_builtins.property
215
214
  @pulumi.getter
216
- def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
215
+ def metadata(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
217
216
  """
218
217
  The metadata associated with the token.
219
218
  """
220
219
  return pulumi.get(self, "metadata")
221
220
 
222
221
  @metadata.setter
223
- def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
222
+ def metadata(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
224
223
  pulumi.set(self, "metadata", value)
225
224
 
226
- @property
225
+ @_builtins.property
227
226
  @pulumi.getter
228
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
227
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
229
228
  """
230
229
  The namespace to provision the resource in.
231
230
  The value should not contain leading or trailing forward slashes.
@@ -235,48 +234,48 @@ class _AuthBackendLoginState:
235
234
  return pulumi.get(self, "namespace")
236
235
 
237
236
  @namespace.setter
238
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
237
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
239
238
  pulumi.set(self, "namespace", value)
240
239
 
241
- @property
240
+ @_builtins.property
242
241
  @pulumi.getter
243
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
242
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
244
243
  """
245
244
  A list of policies applied to the token.
246
245
  """
247
246
  return pulumi.get(self, "policies")
248
247
 
249
248
  @policies.setter
250
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
249
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
251
250
  pulumi.set(self, "policies", value)
252
251
 
253
- @property
252
+ @_builtins.property
254
253
  @pulumi.getter
255
- def renewable(self) -> Optional[pulumi.Input[builtins.bool]]:
254
+ def renewable(self) -> Optional[pulumi.Input[_builtins.bool]]:
256
255
  """
257
256
  Whether the token is renewable or not.
258
257
  """
259
258
  return pulumi.get(self, "renewable")
260
259
 
261
260
  @renewable.setter
262
- def renewable(self, value: Optional[pulumi.Input[builtins.bool]]):
261
+ def renewable(self, value: Optional[pulumi.Input[_builtins.bool]]):
263
262
  pulumi.set(self, "renewable", value)
264
263
 
265
- @property
264
+ @_builtins.property
266
265
  @pulumi.getter(name="roleId")
267
- def role_id(self) -> Optional[pulumi.Input[builtins.str]]:
266
+ def role_id(self) -> Optional[pulumi.Input[_builtins.str]]:
268
267
  """
269
268
  The ID of the role to log in with.
270
269
  """
271
270
  return pulumi.get(self, "role_id")
272
271
 
273
272
  @role_id.setter
274
- def role_id(self, value: Optional[pulumi.Input[builtins.str]]):
273
+ def role_id(self, value: Optional[pulumi.Input[_builtins.str]]):
275
274
  pulumi.set(self, "role_id", value)
276
275
 
277
- @property
276
+ @_builtins.property
278
277
  @pulumi.getter(name="secretId")
279
- def secret_id(self) -> Optional[pulumi.Input[builtins.str]]:
278
+ def secret_id(self) -> Optional[pulumi.Input[_builtins.str]]:
280
279
  """
281
280
  The secret ID of the role to log in with. Required
282
281
  unless `bind_secret_id` is set to false on the role.
@@ -284,7 +283,7 @@ class _AuthBackendLoginState:
284
283
  return pulumi.get(self, "secret_id")
285
284
 
286
285
  @secret_id.setter
287
- def secret_id(self, value: Optional[pulumi.Input[builtins.str]]):
286
+ def secret_id(self, value: Optional[pulumi.Input[_builtins.str]]):
288
287
  pulumi.set(self, "secret_id", value)
289
288
 
290
289
 
@@ -294,10 +293,10 @@ class AuthBackendLogin(pulumi.CustomResource):
294
293
  def __init__(__self__,
295
294
  resource_name: str,
296
295
  opts: Optional[pulumi.ResourceOptions] = None,
297
- backend: Optional[pulumi.Input[builtins.str]] = None,
298
- namespace: Optional[pulumi.Input[builtins.str]] = None,
299
- role_id: Optional[pulumi.Input[builtins.str]] = None,
300
- secret_id: Optional[pulumi.Input[builtins.str]] = None,
296
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
297
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
298
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
299
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
301
300
  __props__=None):
302
301
  """
303
302
  Logs into Vault using the AppRole auth backend. See the [Vault
@@ -311,7 +310,7 @@ class AuthBackendLogin(pulumi.CustomResource):
311
310
  import pulumi_vault as vault
312
311
 
313
312
  approle = vault.AuthBackend("approle", type="approle")
314
- example = vault.app_role.AuthBackendRole("example",
313
+ example = vault.approle.AuthBackendRole("example",
315
314
  backend=approle.path,
316
315
  role_name="test-role",
317
316
  token_policies=[
@@ -319,10 +318,10 @@ class AuthBackendLogin(pulumi.CustomResource):
319
318
  "dev",
320
319
  "prod",
321
320
  ])
322
- id = vault.app_role.AuthBackendRoleSecretId("id",
321
+ id = vault.approle.AuthBackendRoleSecretId("id",
323
322
  backend=approle.path,
324
323
  role_name=example.role_name)
325
- login = vault.app_role.AuthBackendLogin("login",
324
+ login = vault.approle.AuthBackendLogin("login",
326
325
  backend=approle.path,
327
326
  role_id=example.role_id,
328
327
  secret_id=id.secret_id)
@@ -330,13 +329,13 @@ class AuthBackendLogin(pulumi.CustomResource):
330
329
 
331
330
  :param str resource_name: The name of the resource.
332
331
  :param pulumi.ResourceOptions opts: Options for the resource.
333
- :param pulumi.Input[builtins.str] backend: The unique path of the Vault backend to log in with.
334
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
332
+ :param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
333
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
335
334
  The value should not contain leading or trailing forward slashes.
336
335
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
337
336
  *Available only for Vault Enterprise*.
338
- :param pulumi.Input[builtins.str] role_id: The ID of the role to log in with.
339
- :param pulumi.Input[builtins.str] secret_id: The secret ID of the role to log in with. Required
337
+ :param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
338
+ :param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
340
339
  unless `bind_secret_id` is set to false on the role.
341
340
  """
342
341
  ...
@@ -357,7 +356,7 @@ class AuthBackendLogin(pulumi.CustomResource):
357
356
  import pulumi_vault as vault
358
357
 
359
358
  approle = vault.AuthBackend("approle", type="approle")
360
- example = vault.app_role.AuthBackendRole("example",
359
+ example = vault.approle.AuthBackendRole("example",
361
360
  backend=approle.path,
362
361
  role_name="test-role",
363
362
  token_policies=[
@@ -365,10 +364,10 @@ class AuthBackendLogin(pulumi.CustomResource):
365
364
  "dev",
366
365
  "prod",
367
366
  ])
368
- id = vault.app_role.AuthBackendRoleSecretId("id",
367
+ id = vault.approle.AuthBackendRoleSecretId("id",
369
368
  backend=approle.path,
370
369
  role_name=example.role_name)
371
- login = vault.app_role.AuthBackendLogin("login",
370
+ login = vault.approle.AuthBackendLogin("login",
372
371
  backend=approle.path,
373
372
  role_id=example.role_id,
374
373
  secret_id=id.secret_id)
@@ -389,10 +388,10 @@ class AuthBackendLogin(pulumi.CustomResource):
389
388
  def _internal_init(__self__,
390
389
  resource_name: str,
391
390
  opts: Optional[pulumi.ResourceOptions] = None,
392
- backend: Optional[pulumi.Input[builtins.str]] = None,
393
- namespace: Optional[pulumi.Input[builtins.str]] = None,
394
- role_id: Optional[pulumi.Input[builtins.str]] = None,
395
- secret_id: Optional[pulumi.Input[builtins.str]] = None,
391
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
392
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
393
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
394
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None,
396
395
  __props__=None):
397
396
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
398
397
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -427,17 +426,17 @@ class AuthBackendLogin(pulumi.CustomResource):
427
426
  def get(resource_name: str,
428
427
  id: pulumi.Input[str],
429
428
  opts: Optional[pulumi.ResourceOptions] = None,
430
- accessor: Optional[pulumi.Input[builtins.str]] = None,
431
- backend: Optional[pulumi.Input[builtins.str]] = None,
432
- client_token: Optional[pulumi.Input[builtins.str]] = None,
433
- lease_duration: Optional[pulumi.Input[builtins.int]] = None,
434
- lease_started: Optional[pulumi.Input[builtins.str]] = None,
435
- metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
436
- namespace: Optional[pulumi.Input[builtins.str]] = None,
437
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
438
- renewable: Optional[pulumi.Input[builtins.bool]] = None,
439
- role_id: Optional[pulumi.Input[builtins.str]] = None,
440
- secret_id: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendLogin':
429
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
430
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
431
+ client_token: Optional[pulumi.Input[_builtins.str]] = None,
432
+ lease_duration: Optional[pulumi.Input[_builtins.int]] = None,
433
+ lease_started: Optional[pulumi.Input[_builtins.str]] = None,
434
+ metadata: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
435
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
436
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
437
+ renewable: Optional[pulumi.Input[_builtins.bool]] = None,
438
+ role_id: Optional[pulumi.Input[_builtins.str]] = None,
439
+ secret_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendLogin':
441
440
  """
442
441
  Get an existing AuthBackendLogin resource's state with the given name, id, and optional extra
443
442
  properties used to qualify the lookup.
@@ -445,20 +444,20 @@ class AuthBackendLogin(pulumi.CustomResource):
445
444
  :param str resource_name: The unique name of the resulting resource.
446
445
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
447
446
  :param pulumi.ResourceOptions opts: Options for the resource.
448
- :param pulumi.Input[builtins.str] accessor: The accessor for the token.
449
- :param pulumi.Input[builtins.str] backend: The unique path of the Vault backend to log in with.
450
- :param pulumi.Input[builtins.str] client_token: The Vault token created.
451
- :param pulumi.Input[builtins.int] lease_duration: How long the token is valid for, in seconds.
452
- :param pulumi.Input[builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
453
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] metadata: The metadata associated with the token.
454
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
447
+ :param pulumi.Input[_builtins.str] accessor: The accessor for the token.
448
+ :param pulumi.Input[_builtins.str] backend: The unique path of the Vault backend to log in with.
449
+ :param pulumi.Input[_builtins.str] client_token: The Vault token created.
450
+ :param pulumi.Input[_builtins.int] lease_duration: How long the token is valid for, in seconds.
451
+ :param pulumi.Input[_builtins.str] lease_started: The date and time the lease started, in RFC 3339 format.
452
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] metadata: The metadata associated with the token.
453
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
455
454
  The value should not contain leading or trailing forward slashes.
456
455
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
457
456
  *Available only for Vault Enterprise*.
458
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: A list of policies applied to the token.
459
- :param pulumi.Input[builtins.bool] renewable: Whether the token is renewable or not.
460
- :param pulumi.Input[builtins.str] role_id: The ID of the role to log in with.
461
- :param pulumi.Input[builtins.str] secret_id: The secret ID of the role to log in with. Required
457
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: A list of policies applied to the token.
458
+ :param pulumi.Input[_builtins.bool] renewable: Whether the token is renewable or not.
459
+ :param pulumi.Input[_builtins.str] role_id: The ID of the role to log in with.
460
+ :param pulumi.Input[_builtins.str] secret_id: The secret ID of the role to log in with. Required
462
461
  unless `bind_secret_id` is set to false on the role.
463
462
  """
464
463
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -478,57 +477,57 @@ class AuthBackendLogin(pulumi.CustomResource):
478
477
  __props__.__dict__["secret_id"] = secret_id
479
478
  return AuthBackendLogin(resource_name, opts=opts, __props__=__props__)
480
479
 
481
- @property
480
+ @_builtins.property
482
481
  @pulumi.getter
483
- def accessor(self) -> pulumi.Output[builtins.str]:
482
+ def accessor(self) -> pulumi.Output[_builtins.str]:
484
483
  """
485
484
  The accessor for the token.
486
485
  """
487
486
  return pulumi.get(self, "accessor")
488
487
 
489
- @property
488
+ @_builtins.property
490
489
  @pulumi.getter
491
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
490
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
492
491
  """
493
492
  The unique path of the Vault backend to log in with.
494
493
  """
495
494
  return pulumi.get(self, "backend")
496
495
 
497
- @property
496
+ @_builtins.property
498
497
  @pulumi.getter(name="clientToken")
499
- def client_token(self) -> pulumi.Output[builtins.str]:
498
+ def client_token(self) -> pulumi.Output[_builtins.str]:
500
499
  """
501
500
  The Vault token created.
502
501
  """
503
502
  return pulumi.get(self, "client_token")
504
503
 
505
- @property
504
+ @_builtins.property
506
505
  @pulumi.getter(name="leaseDuration")
507
- def lease_duration(self) -> pulumi.Output[builtins.int]:
506
+ def lease_duration(self) -> pulumi.Output[_builtins.int]:
508
507
  """
509
508
  How long the token is valid for, in seconds.
510
509
  """
511
510
  return pulumi.get(self, "lease_duration")
512
511
 
513
- @property
512
+ @_builtins.property
514
513
  @pulumi.getter(name="leaseStarted")
515
- def lease_started(self) -> pulumi.Output[builtins.str]:
514
+ def lease_started(self) -> pulumi.Output[_builtins.str]:
516
515
  """
517
516
  The date and time the lease started, in RFC 3339 format.
518
517
  """
519
518
  return pulumi.get(self, "lease_started")
520
519
 
521
- @property
520
+ @_builtins.property
522
521
  @pulumi.getter
523
- def metadata(self) -> pulumi.Output[Mapping[str, builtins.str]]:
522
+ def metadata(self) -> pulumi.Output[Mapping[str, _builtins.str]]:
524
523
  """
525
524
  The metadata associated with the token.
526
525
  """
527
526
  return pulumi.get(self, "metadata")
528
527
 
529
- @property
528
+ @_builtins.property
530
529
  @pulumi.getter
531
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
530
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
532
531
  """
533
532
  The namespace to provision the resource in.
534
533
  The value should not contain leading or trailing forward slashes.
@@ -537,33 +536,33 @@ class AuthBackendLogin(pulumi.CustomResource):
537
536
  """
538
537
  return pulumi.get(self, "namespace")
539
538
 
540
- @property
539
+ @_builtins.property
541
540
  @pulumi.getter
542
- def policies(self) -> pulumi.Output[Sequence[builtins.str]]:
541
+ def policies(self) -> pulumi.Output[Sequence[_builtins.str]]:
543
542
  """
544
543
  A list of policies applied to the token.
545
544
  """
546
545
  return pulumi.get(self, "policies")
547
546
 
548
- @property
547
+ @_builtins.property
549
548
  @pulumi.getter
550
- def renewable(self) -> pulumi.Output[builtins.bool]:
549
+ def renewable(self) -> pulumi.Output[_builtins.bool]:
551
550
  """
552
551
  Whether the token is renewable or not.
553
552
  """
554
553
  return pulumi.get(self, "renewable")
555
554
 
556
- @property
555
+ @_builtins.property
557
556
  @pulumi.getter(name="roleId")
558
- def role_id(self) -> pulumi.Output[builtins.str]:
557
+ def role_id(self) -> pulumi.Output[_builtins.str]:
559
558
  """
560
559
  The ID of the role to log in with.
561
560
  """
562
561
  return pulumi.get(self, "role_id")
563
562
 
564
- @property
563
+ @_builtins.property
565
564
  @pulumi.getter(name="secretId")
566
- def secret_id(self) -> pulumi.Output[Optional[builtins.str]]:
565
+ def secret_id(self) -> pulumi.Output[Optional[_builtins.str]]:
567
566
  """
568
567
  The secret ID of the role to log in with. Required
569
568
  unless `bind_secret_id` is set to false on the role.