pulumi-vault 7.1.0a1752118888__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0a1752118888.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0a1752118888.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py CHANGED
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -18,6 +17,8 @@ from . import _utilities
18
17
  __all__ = [
19
18
  'AuthBackendTuneArgs',
20
19
  'AuthBackendTuneArgsDict',
20
+ 'OciAuthBackendTuneArgs',
21
+ 'OciAuthBackendTuneArgsDict',
21
22
  'ProviderAuthLoginArgs',
22
23
  'ProviderAuthLoginArgsDict',
23
24
  'ProviderAuthLoginAwsArgs',
@@ -58,44 +59,44 @@ MYPY = False
58
59
 
59
60
  if not MYPY:
60
61
  class AuthBackendTuneArgsDict(TypedDict):
61
- allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
62
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
62
63
  """
63
64
  List of headers to whitelist and allowing
64
65
  a plugin to include them in the response.
65
66
  """
66
- audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
67
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
67
68
  """
68
69
  Specifies the list of keys that will
69
70
  not be HMAC'd by audit devices in the request data object.
70
71
  """
71
- audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
72
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
72
73
  """
73
74
  Specifies the list of keys that will
74
75
  not be HMAC'd by audit devices in the response data object.
75
76
  """
76
- default_lease_ttl: NotRequired[pulumi.Input[builtins.str]]
77
+ default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
77
78
  """
78
79
  Specifies the default time-to-live.
79
80
  If set, this overrides the global default.
80
81
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
81
82
  """
82
- listing_visibility: NotRequired[pulumi.Input[builtins.str]]
83
+ listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
83
84
  """
84
85
  Specifies whether to show this mount in
85
86
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
86
87
  """
87
- max_lease_ttl: NotRequired[pulumi.Input[builtins.str]]
88
+ max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
88
89
  """
89
90
  Specifies the maximum time-to-live.
90
91
  If set, this overrides the global default.
91
92
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
92
93
  """
93
- passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
94
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
94
95
  """
95
96
  List of headers to whitelist and
96
97
  pass from the request to the backend.
97
98
  """
98
- token_type: NotRequired[pulumi.Input[builtins.str]]
99
+ token_type: NotRequired[pulumi.Input[_builtins.str]]
99
100
  """
100
101
  Specifies the type of tokens that should be returned by
101
102
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -106,32 +107,32 @@ elif False:
106
107
  @pulumi.input_type
107
108
  class AuthBackendTuneArgs:
108
109
  def __init__(__self__, *,
109
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
110
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
111
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
112
- default_lease_ttl: Optional[pulumi.Input[builtins.str]] = None,
113
- listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
114
- max_lease_ttl: Optional[pulumi.Input[builtins.str]] = None,
115
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
116
- token_type: Optional[pulumi.Input[builtins.str]] = None):
117
- """
118
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
110
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
111
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
112
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
113
+ default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
114
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
115
+ max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
116
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
117
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
118
+ """
119
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
119
120
  a plugin to include them in the response.
120
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
121
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
121
122
  not be HMAC'd by audit devices in the request data object.
122
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
123
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
123
124
  not be HMAC'd by audit devices in the response data object.
124
- :param pulumi.Input[builtins.str] default_lease_ttl: Specifies the default time-to-live.
125
+ :param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
125
126
  If set, this overrides the global default.
126
127
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
127
- :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in
128
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
128
129
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
129
- :param pulumi.Input[builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
130
+ :param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
130
131
  If set, this overrides the global default.
131
132
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
132
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to whitelist and
133
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
133
134
  pass from the request to the backend.
134
- :param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
135
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by
135
136
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
136
137
  """
137
138
  if allowed_response_headers is not None:
@@ -151,9 +152,9 @@ class AuthBackendTuneArgs:
151
152
  if token_type is not None:
152
153
  pulumi.set(__self__, "token_type", token_type)
153
154
 
154
- @property
155
+ @_builtins.property
155
156
  @pulumi.getter(name="allowedResponseHeaders")
156
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
157
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
157
158
  """
158
159
  List of headers to whitelist and allowing
159
160
  a plugin to include them in the response.
@@ -161,12 +162,12 @@ class AuthBackendTuneArgs:
161
162
  return pulumi.get(self, "allowed_response_headers")
162
163
 
163
164
  @allowed_response_headers.setter
164
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
165
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
165
166
  pulumi.set(self, "allowed_response_headers", value)
166
167
 
167
- @property
168
+ @_builtins.property
168
169
  @pulumi.getter(name="auditNonHmacRequestKeys")
169
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
170
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
170
171
  """
171
172
  Specifies the list of keys that will
172
173
  not be HMAC'd by audit devices in the request data object.
@@ -174,12 +175,12 @@ class AuthBackendTuneArgs:
174
175
  return pulumi.get(self, "audit_non_hmac_request_keys")
175
176
 
176
177
  @audit_non_hmac_request_keys.setter
177
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
178
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
178
179
  pulumi.set(self, "audit_non_hmac_request_keys", value)
179
180
 
180
- @property
181
+ @_builtins.property
181
182
  @pulumi.getter(name="auditNonHmacResponseKeys")
182
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
183
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
183
184
  """
184
185
  Specifies the list of keys that will
185
186
  not be HMAC'd by audit devices in the response data object.
@@ -187,12 +188,12 @@ class AuthBackendTuneArgs:
187
188
  return pulumi.get(self, "audit_non_hmac_response_keys")
188
189
 
189
190
  @audit_non_hmac_response_keys.setter
190
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
191
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
191
192
  pulumi.set(self, "audit_non_hmac_response_keys", value)
192
193
 
193
- @property
194
+ @_builtins.property
194
195
  @pulumi.getter(name="defaultLeaseTtl")
195
- def default_lease_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
196
+ def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
196
197
  """
197
198
  Specifies the default time-to-live.
198
199
  If set, this overrides the global default.
@@ -201,12 +202,12 @@ class AuthBackendTuneArgs:
201
202
  return pulumi.get(self, "default_lease_ttl")
202
203
 
203
204
  @default_lease_ttl.setter
204
- def default_lease_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
205
+ def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
205
206
  pulumi.set(self, "default_lease_ttl", value)
206
207
 
207
- @property
208
+ @_builtins.property
208
209
  @pulumi.getter(name="listingVisibility")
209
- def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
210
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
210
211
  """
211
212
  Specifies whether to show this mount in
212
213
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
@@ -214,12 +215,12 @@ class AuthBackendTuneArgs:
214
215
  return pulumi.get(self, "listing_visibility")
215
216
 
216
217
  @listing_visibility.setter
217
- def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
218
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
218
219
  pulumi.set(self, "listing_visibility", value)
219
220
 
220
- @property
221
+ @_builtins.property
221
222
  @pulumi.getter(name="maxLeaseTtl")
222
- def max_lease_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
223
+ def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
223
224
  """
224
225
  Specifies the maximum time-to-live.
225
226
  If set, this overrides the global default.
@@ -228,12 +229,12 @@ class AuthBackendTuneArgs:
228
229
  return pulumi.get(self, "max_lease_ttl")
229
230
 
230
231
  @max_lease_ttl.setter
231
- def max_lease_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
232
+ def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
232
233
  pulumi.set(self, "max_lease_ttl", value)
233
234
 
234
- @property
235
+ @_builtins.property
235
236
  @pulumi.getter(name="passthroughRequestHeaders")
236
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
237
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
237
238
  """
238
239
  List of headers to whitelist and
239
240
  pass from the request to the backend.
@@ -241,12 +242,12 @@ class AuthBackendTuneArgs:
241
242
  return pulumi.get(self, "passthrough_request_headers")
242
243
 
243
244
  @passthrough_request_headers.setter
244
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
245
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
245
246
  pulumi.set(self, "passthrough_request_headers", value)
246
247
 
247
- @property
248
+ @_builtins.property
248
249
  @pulumi.getter(name="tokenType")
249
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
250
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
250
251
  """
251
252
  Specifies the type of tokens that should be returned by
252
253
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -254,20 +255,219 @@ class AuthBackendTuneArgs:
254
255
  return pulumi.get(self, "token_type")
255
256
 
256
257
  @token_type.setter
257
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
258
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
259
+ pulumi.set(self, "token_type", value)
260
+
261
+
262
+ if not MYPY:
263
+ class OciAuthBackendTuneArgsDict(TypedDict):
264
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
265
+ """
266
+ List of headers to whitelist and allowing
267
+ a plugin to include them in the response.
268
+ """
269
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
270
+ """
271
+ Specifies the list of keys that will
272
+ not be HMAC'd by audit devices in the request data object.
273
+ """
274
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
275
+ """
276
+ Specifies the list of keys that will
277
+ not be HMAC'd by audit devices in the response data object.
278
+ """
279
+ default_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
280
+ """
281
+ Specifies the default time-to-live.
282
+ If set, this overrides the global default.
283
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
284
+ """
285
+ listing_visibility: NotRequired[pulumi.Input[_builtins.str]]
286
+ """
287
+ Specifies whether to show this mount in
288
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
289
+ """
290
+ max_lease_ttl: NotRequired[pulumi.Input[_builtins.str]]
291
+ """
292
+ Specifies the maximum time-to-live.
293
+ If set, this overrides the global default.
294
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
295
+ """
296
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]
297
+ """
298
+ List of headers to whitelist and
299
+ pass from the request to the backend.
300
+ """
301
+ token_type: NotRequired[pulumi.Input[_builtins.str]]
302
+ """
303
+ Specifies the type of tokens that should be returned by the mount.
304
+ """
305
+ elif False:
306
+ OciAuthBackendTuneArgsDict: TypeAlias = Mapping[str, Any]
307
+
308
+ @pulumi.input_type
309
+ class OciAuthBackendTuneArgs:
310
+ def __init__(__self__, *,
311
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
312
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
313
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
314
+ default_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
315
+ listing_visibility: Optional[pulumi.Input[_builtins.str]] = None,
316
+ max_lease_ttl: Optional[pulumi.Input[_builtins.str]] = None,
317
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
318
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
319
+ """
320
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
321
+ a plugin to include them in the response.
322
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
323
+ not be HMAC'd by audit devices in the request data object.
324
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
325
+ not be HMAC'd by audit devices in the response data object.
326
+ :param pulumi.Input[_builtins.str] default_lease_ttl: Specifies the default time-to-live.
327
+ If set, this overrides the global default.
328
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
329
+ :param pulumi.Input[_builtins.str] listing_visibility: Specifies whether to show this mount in
330
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
331
+ :param pulumi.Input[_builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
332
+ If set, this overrides the global default.
333
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
334
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] passthrough_request_headers: List of headers to whitelist and
335
+ pass from the request to the backend.
336
+ :param pulumi.Input[_builtins.str] token_type: Specifies the type of tokens that should be returned by the mount.
337
+ """
338
+ if allowed_response_headers is not None:
339
+ pulumi.set(__self__, "allowed_response_headers", allowed_response_headers)
340
+ if audit_non_hmac_request_keys is not None:
341
+ pulumi.set(__self__, "audit_non_hmac_request_keys", audit_non_hmac_request_keys)
342
+ if audit_non_hmac_response_keys is not None:
343
+ pulumi.set(__self__, "audit_non_hmac_response_keys", audit_non_hmac_response_keys)
344
+ if default_lease_ttl is not None:
345
+ pulumi.set(__self__, "default_lease_ttl", default_lease_ttl)
346
+ if listing_visibility is not None:
347
+ pulumi.set(__self__, "listing_visibility", listing_visibility)
348
+ if max_lease_ttl is not None:
349
+ pulumi.set(__self__, "max_lease_ttl", max_lease_ttl)
350
+ if passthrough_request_headers is not None:
351
+ pulumi.set(__self__, "passthrough_request_headers", passthrough_request_headers)
352
+ if token_type is not None:
353
+ pulumi.set(__self__, "token_type", token_type)
354
+
355
+ @_builtins.property
356
+ @pulumi.getter(name="allowedResponseHeaders")
357
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
358
+ """
359
+ List of headers to whitelist and allowing
360
+ a plugin to include them in the response.
361
+ """
362
+ return pulumi.get(self, "allowed_response_headers")
363
+
364
+ @allowed_response_headers.setter
365
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
366
+ pulumi.set(self, "allowed_response_headers", value)
367
+
368
+ @_builtins.property
369
+ @pulumi.getter(name="auditNonHmacRequestKeys")
370
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
371
+ """
372
+ Specifies the list of keys that will
373
+ not be HMAC'd by audit devices in the request data object.
374
+ """
375
+ return pulumi.get(self, "audit_non_hmac_request_keys")
376
+
377
+ @audit_non_hmac_request_keys.setter
378
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
379
+ pulumi.set(self, "audit_non_hmac_request_keys", value)
380
+
381
+ @_builtins.property
382
+ @pulumi.getter(name="auditNonHmacResponseKeys")
383
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
384
+ """
385
+ Specifies the list of keys that will
386
+ not be HMAC'd by audit devices in the response data object.
387
+ """
388
+ return pulumi.get(self, "audit_non_hmac_response_keys")
389
+
390
+ @audit_non_hmac_response_keys.setter
391
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
392
+ pulumi.set(self, "audit_non_hmac_response_keys", value)
393
+
394
+ @_builtins.property
395
+ @pulumi.getter(name="defaultLeaseTtl")
396
+ def default_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
397
+ """
398
+ Specifies the default time-to-live.
399
+ If set, this overrides the global default.
400
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
401
+ """
402
+ return pulumi.get(self, "default_lease_ttl")
403
+
404
+ @default_lease_ttl.setter
405
+ def default_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
406
+ pulumi.set(self, "default_lease_ttl", value)
407
+
408
+ @_builtins.property
409
+ @pulumi.getter(name="listingVisibility")
410
+ def listing_visibility(self) -> Optional[pulumi.Input[_builtins.str]]:
411
+ """
412
+ Specifies whether to show this mount in
413
+ the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
414
+ """
415
+ return pulumi.get(self, "listing_visibility")
416
+
417
+ @listing_visibility.setter
418
+ def listing_visibility(self, value: Optional[pulumi.Input[_builtins.str]]):
419
+ pulumi.set(self, "listing_visibility", value)
420
+
421
+ @_builtins.property
422
+ @pulumi.getter(name="maxLeaseTtl")
423
+ def max_lease_ttl(self) -> Optional[pulumi.Input[_builtins.str]]:
424
+ """
425
+ Specifies the maximum time-to-live.
426
+ If set, this overrides the global default.
427
+ Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
428
+ """
429
+ return pulumi.get(self, "max_lease_ttl")
430
+
431
+ @max_lease_ttl.setter
432
+ def max_lease_ttl(self, value: Optional[pulumi.Input[_builtins.str]]):
433
+ pulumi.set(self, "max_lease_ttl", value)
434
+
435
+ @_builtins.property
436
+ @pulumi.getter(name="passthroughRequestHeaders")
437
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
438
+ """
439
+ List of headers to whitelist and
440
+ pass from the request to the backend.
441
+ """
442
+ return pulumi.get(self, "passthrough_request_headers")
443
+
444
+ @passthrough_request_headers.setter
445
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
446
+ pulumi.set(self, "passthrough_request_headers", value)
447
+
448
+ @_builtins.property
449
+ @pulumi.getter(name="tokenType")
450
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
451
+ """
452
+ Specifies the type of tokens that should be returned by the mount.
453
+ """
454
+ return pulumi.get(self, "token_type")
455
+
456
+ @token_type.setter
457
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
258
458
  pulumi.set(self, "token_type", value)
259
459
 
260
460
 
261
461
  if not MYPY:
262
462
  class ProviderAuthLoginArgsDict(TypedDict):
263
- path: pulumi.Input[builtins.str]
264
- method: NotRequired[pulumi.Input[builtins.str]]
265
- namespace: NotRequired[pulumi.Input[builtins.str]]
463
+ path: pulumi.Input[_builtins.str]
464
+ method: NotRequired[pulumi.Input[_builtins.str]]
465
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
266
466
  """
267
467
  The authentication engine's namespace. Conflicts with use_root_namespace
268
468
  """
269
- parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
270
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
469
+ parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
470
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
271
471
  """
272
472
  Authenticate to the root Vault namespace. Conflicts with namespace
273
473
  """
@@ -277,14 +477,14 @@ elif False:
277
477
  @pulumi.input_type
278
478
  class ProviderAuthLoginArgs:
279
479
  def __init__(__self__, *,
280
- path: pulumi.Input[builtins.str],
281
- method: Optional[pulumi.Input[builtins.str]] = None,
282
- namespace: Optional[pulumi.Input[builtins.str]] = None,
283
- parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
284
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
480
+ path: pulumi.Input[_builtins.str],
481
+ method: Optional[pulumi.Input[_builtins.str]] = None,
482
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
483
+ parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
484
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
285
485
  """
286
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
287
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
486
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
487
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
288
488
  """
289
489
  pulumi.set(__self__, "path", path)
290
490
  if method is not None:
@@ -296,121 +496,121 @@ class ProviderAuthLoginArgs:
296
496
  if use_root_namespace is not None:
297
497
  pulumi.set(__self__, "use_root_namespace", use_root_namespace)
298
498
 
299
- @property
499
+ @_builtins.property
300
500
  @pulumi.getter
301
- def path(self) -> pulumi.Input[builtins.str]:
501
+ def path(self) -> pulumi.Input[_builtins.str]:
302
502
  return pulumi.get(self, "path")
303
503
 
304
504
  @path.setter
305
- def path(self, value: pulumi.Input[builtins.str]):
505
+ def path(self, value: pulumi.Input[_builtins.str]):
306
506
  pulumi.set(self, "path", value)
307
507
 
308
- @property
508
+ @_builtins.property
309
509
  @pulumi.getter
310
- def method(self) -> Optional[pulumi.Input[builtins.str]]:
510
+ def method(self) -> Optional[pulumi.Input[_builtins.str]]:
311
511
  return pulumi.get(self, "method")
312
512
 
313
513
  @method.setter
314
- def method(self, value: Optional[pulumi.Input[builtins.str]]):
514
+ def method(self, value: Optional[pulumi.Input[_builtins.str]]):
315
515
  pulumi.set(self, "method", value)
316
516
 
317
- @property
517
+ @_builtins.property
318
518
  @pulumi.getter
319
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
519
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
320
520
  """
321
521
  The authentication engine's namespace. Conflicts with use_root_namespace
322
522
  """
323
523
  return pulumi.get(self, "namespace")
324
524
 
325
525
  @namespace.setter
326
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
526
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
327
527
  pulumi.set(self, "namespace", value)
328
528
 
329
- @property
529
+ @_builtins.property
330
530
  @pulumi.getter
331
- def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
531
+ def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
332
532
  return pulumi.get(self, "parameters")
333
533
 
334
534
  @parameters.setter
335
- def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
535
+ def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
336
536
  pulumi.set(self, "parameters", value)
337
537
 
338
- @property
538
+ @_builtins.property
339
539
  @pulumi.getter(name="useRootNamespace")
340
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
540
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
341
541
  """
342
542
  Authenticate to the root Vault namespace. Conflicts with namespace
343
543
  """
344
544
  return pulumi.get(self, "use_root_namespace")
345
545
 
346
546
  @use_root_namespace.setter
347
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
547
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
348
548
  pulumi.set(self, "use_root_namespace", value)
349
549
 
350
550
 
351
551
  if not MYPY:
352
552
  class ProviderAuthLoginAwsArgsDict(TypedDict):
353
- role: pulumi.Input[builtins.str]
553
+ role: pulumi.Input[_builtins.str]
354
554
  """
355
555
  The Vault role to use when logging into Vault.
356
556
  """
357
- aws_access_key_id: NotRequired[pulumi.Input[builtins.str]]
557
+ aws_access_key_id: NotRequired[pulumi.Input[_builtins.str]]
358
558
  """
359
559
  The AWS access key ID.
360
560
  """
361
- aws_iam_endpoint: NotRequired[pulumi.Input[builtins.str]]
561
+ aws_iam_endpoint: NotRequired[pulumi.Input[_builtins.str]]
362
562
  """
363
563
  The IAM endpoint URL.
364
564
  """
365
- aws_profile: NotRequired[pulumi.Input[builtins.str]]
565
+ aws_profile: NotRequired[pulumi.Input[_builtins.str]]
366
566
  """
367
567
  The name of the AWS profile.
368
568
  """
369
- aws_region: NotRequired[pulumi.Input[builtins.str]]
569
+ aws_region: NotRequired[pulumi.Input[_builtins.str]]
370
570
  """
371
571
  The AWS region.
372
572
  """
373
- aws_role_arn: NotRequired[pulumi.Input[builtins.str]]
573
+ aws_role_arn: NotRequired[pulumi.Input[_builtins.str]]
374
574
  """
375
575
  The ARN of the AWS Role to assume.Used during STS AssumeRole
376
576
  """
377
- aws_role_session_name: NotRequired[pulumi.Input[builtins.str]]
577
+ aws_role_session_name: NotRequired[pulumi.Input[_builtins.str]]
378
578
  """
379
579
  Specifies the name to attach to the AWS role session. Used during STS AssumeRole
380
580
  """
381
- aws_secret_access_key: NotRequired[pulumi.Input[builtins.str]]
581
+ aws_secret_access_key: NotRequired[pulumi.Input[_builtins.str]]
382
582
  """
383
583
  The AWS secret access key.
384
584
  """
385
- aws_session_token: NotRequired[pulumi.Input[builtins.str]]
585
+ aws_session_token: NotRequired[pulumi.Input[_builtins.str]]
386
586
  """
387
587
  The AWS session token.
388
588
  """
389
- aws_shared_credentials_file: NotRequired[pulumi.Input[builtins.str]]
589
+ aws_shared_credentials_file: NotRequired[pulumi.Input[_builtins.str]]
390
590
  """
391
591
  Path to the AWS shared credentials file.
392
592
  """
393
- aws_sts_endpoint: NotRequired[pulumi.Input[builtins.str]]
593
+ aws_sts_endpoint: NotRequired[pulumi.Input[_builtins.str]]
394
594
  """
395
595
  The STS endpoint URL.
396
596
  """
397
- aws_web_identity_token_file: NotRequired[pulumi.Input[builtins.str]]
597
+ aws_web_identity_token_file: NotRequired[pulumi.Input[_builtins.str]]
398
598
  """
399
599
  Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
400
600
  """
401
- header_value: NotRequired[pulumi.Input[builtins.str]]
601
+ header_value: NotRequired[pulumi.Input[_builtins.str]]
402
602
  """
403
603
  The Vault header value to include in the STS signing request.
404
604
  """
405
- mount: NotRequired[pulumi.Input[builtins.str]]
605
+ mount: NotRequired[pulumi.Input[_builtins.str]]
406
606
  """
407
607
  The path where the authentication engine is mounted.
408
608
  """
409
- namespace: NotRequired[pulumi.Input[builtins.str]]
609
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
410
610
  """
411
611
  The authentication engine's namespace. Conflicts with use_root_namespace
412
612
  """
413
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
613
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
414
614
  """
415
615
  Authenticate to the root Vault namespace. Conflicts with namespace
416
616
  """
@@ -420,39 +620,39 @@ elif False:
420
620
  @pulumi.input_type
421
621
  class ProviderAuthLoginAwsArgs:
422
622
  def __init__(__self__, *,
423
- role: pulumi.Input[builtins.str],
424
- aws_access_key_id: Optional[pulumi.Input[builtins.str]] = None,
425
- aws_iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
426
- aws_profile: Optional[pulumi.Input[builtins.str]] = None,
427
- aws_region: Optional[pulumi.Input[builtins.str]] = None,
428
- aws_role_arn: Optional[pulumi.Input[builtins.str]] = None,
429
- aws_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
430
- aws_secret_access_key: Optional[pulumi.Input[builtins.str]] = None,
431
- aws_session_token: Optional[pulumi.Input[builtins.str]] = None,
432
- aws_shared_credentials_file: Optional[pulumi.Input[builtins.str]] = None,
433
- aws_sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
434
- aws_web_identity_token_file: Optional[pulumi.Input[builtins.str]] = None,
435
- header_value: Optional[pulumi.Input[builtins.str]] = None,
436
- mount: Optional[pulumi.Input[builtins.str]] = None,
437
- namespace: Optional[pulumi.Input[builtins.str]] = None,
438
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
439
- """
440
- :param pulumi.Input[builtins.str] role: The Vault role to use when logging into Vault.
441
- :param pulumi.Input[builtins.str] aws_access_key_id: The AWS access key ID.
442
- :param pulumi.Input[builtins.str] aws_iam_endpoint: The IAM endpoint URL.
443
- :param pulumi.Input[builtins.str] aws_profile: The name of the AWS profile.
444
- :param pulumi.Input[builtins.str] aws_region: The AWS region.
445
- :param pulumi.Input[builtins.str] aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
446
- :param pulumi.Input[builtins.str] aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
447
- :param pulumi.Input[builtins.str] aws_secret_access_key: The AWS secret access key.
448
- :param pulumi.Input[builtins.str] aws_session_token: The AWS session token.
449
- :param pulumi.Input[builtins.str] aws_shared_credentials_file: Path to the AWS shared credentials file.
450
- :param pulumi.Input[builtins.str] aws_sts_endpoint: The STS endpoint URL.
451
- :param pulumi.Input[builtins.str] aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
452
- :param pulumi.Input[builtins.str] header_value: The Vault header value to include in the STS signing request.
453
- :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
454
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
455
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
623
+ role: pulumi.Input[_builtins.str],
624
+ aws_access_key_id: Optional[pulumi.Input[_builtins.str]] = None,
625
+ aws_iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
626
+ aws_profile: Optional[pulumi.Input[_builtins.str]] = None,
627
+ aws_region: Optional[pulumi.Input[_builtins.str]] = None,
628
+ aws_role_arn: Optional[pulumi.Input[_builtins.str]] = None,
629
+ aws_role_session_name: Optional[pulumi.Input[_builtins.str]] = None,
630
+ aws_secret_access_key: Optional[pulumi.Input[_builtins.str]] = None,
631
+ aws_session_token: Optional[pulumi.Input[_builtins.str]] = None,
632
+ aws_shared_credentials_file: Optional[pulumi.Input[_builtins.str]] = None,
633
+ aws_sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
634
+ aws_web_identity_token_file: Optional[pulumi.Input[_builtins.str]] = None,
635
+ header_value: Optional[pulumi.Input[_builtins.str]] = None,
636
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
637
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
638
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
639
+ """
640
+ :param pulumi.Input[_builtins.str] role: The Vault role to use when logging into Vault.
641
+ :param pulumi.Input[_builtins.str] aws_access_key_id: The AWS access key ID.
642
+ :param pulumi.Input[_builtins.str] aws_iam_endpoint: The IAM endpoint URL.
643
+ :param pulumi.Input[_builtins.str] aws_profile: The name of the AWS profile.
644
+ :param pulumi.Input[_builtins.str] aws_region: The AWS region.
645
+ :param pulumi.Input[_builtins.str] aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
646
+ :param pulumi.Input[_builtins.str] aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
647
+ :param pulumi.Input[_builtins.str] aws_secret_access_key: The AWS secret access key.
648
+ :param pulumi.Input[_builtins.str] aws_session_token: The AWS session token.
649
+ :param pulumi.Input[_builtins.str] aws_shared_credentials_file: Path to the AWS shared credentials file.
650
+ :param pulumi.Input[_builtins.str] aws_sts_endpoint: The STS endpoint URL.
651
+ :param pulumi.Input[_builtins.str] aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
652
+ :param pulumi.Input[_builtins.str] header_value: The Vault header value to include in the STS signing request.
653
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
654
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
655
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
456
656
  """
457
657
  pulumi.set(__self__, "role", role)
458
658
  if aws_access_key_id is not None:
@@ -486,246 +686,246 @@ class ProviderAuthLoginAwsArgs:
486
686
  if use_root_namespace is not None:
487
687
  pulumi.set(__self__, "use_root_namespace", use_root_namespace)
488
688
 
489
- @property
689
+ @_builtins.property
490
690
  @pulumi.getter
491
- def role(self) -> pulumi.Input[builtins.str]:
691
+ def role(self) -> pulumi.Input[_builtins.str]:
492
692
  """
493
693
  The Vault role to use when logging into Vault.
494
694
  """
495
695
  return pulumi.get(self, "role")
496
696
 
497
697
  @role.setter
498
- def role(self, value: pulumi.Input[builtins.str]):
698
+ def role(self, value: pulumi.Input[_builtins.str]):
499
699
  pulumi.set(self, "role", value)
500
700
 
501
- @property
701
+ @_builtins.property
502
702
  @pulumi.getter(name="awsAccessKeyId")
503
- def aws_access_key_id(self) -> Optional[pulumi.Input[builtins.str]]:
703
+ def aws_access_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
504
704
  """
505
705
  The AWS access key ID.
506
706
  """
507
707
  return pulumi.get(self, "aws_access_key_id")
508
708
 
509
709
  @aws_access_key_id.setter
510
- def aws_access_key_id(self, value: Optional[pulumi.Input[builtins.str]]):
710
+ def aws_access_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
511
711
  pulumi.set(self, "aws_access_key_id", value)
512
712
 
513
- @property
713
+ @_builtins.property
514
714
  @pulumi.getter(name="awsIamEndpoint")
515
- def aws_iam_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
715
+ def aws_iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
516
716
  """
517
717
  The IAM endpoint URL.
518
718
  """
519
719
  return pulumi.get(self, "aws_iam_endpoint")
520
720
 
521
721
  @aws_iam_endpoint.setter
522
- def aws_iam_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
722
+ def aws_iam_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
523
723
  pulumi.set(self, "aws_iam_endpoint", value)
524
724
 
525
- @property
725
+ @_builtins.property
526
726
  @pulumi.getter(name="awsProfile")
527
- def aws_profile(self) -> Optional[pulumi.Input[builtins.str]]:
727
+ def aws_profile(self) -> Optional[pulumi.Input[_builtins.str]]:
528
728
  """
529
729
  The name of the AWS profile.
530
730
  """
531
731
  return pulumi.get(self, "aws_profile")
532
732
 
533
733
  @aws_profile.setter
534
- def aws_profile(self, value: Optional[pulumi.Input[builtins.str]]):
734
+ def aws_profile(self, value: Optional[pulumi.Input[_builtins.str]]):
535
735
  pulumi.set(self, "aws_profile", value)
536
736
 
537
- @property
737
+ @_builtins.property
538
738
  @pulumi.getter(name="awsRegion")
539
- def aws_region(self) -> Optional[pulumi.Input[builtins.str]]:
739
+ def aws_region(self) -> Optional[pulumi.Input[_builtins.str]]:
540
740
  """
541
741
  The AWS region.
542
742
  """
543
743
  return pulumi.get(self, "aws_region")
544
744
 
545
745
  @aws_region.setter
546
- def aws_region(self, value: Optional[pulumi.Input[builtins.str]]):
746
+ def aws_region(self, value: Optional[pulumi.Input[_builtins.str]]):
547
747
  pulumi.set(self, "aws_region", value)
548
748
 
549
- @property
749
+ @_builtins.property
550
750
  @pulumi.getter(name="awsRoleArn")
551
- def aws_role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
751
+ def aws_role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
552
752
  """
553
753
  The ARN of the AWS Role to assume.Used during STS AssumeRole
554
754
  """
555
755
  return pulumi.get(self, "aws_role_arn")
556
756
 
557
757
  @aws_role_arn.setter
558
- def aws_role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
758
+ def aws_role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
559
759
  pulumi.set(self, "aws_role_arn", value)
560
760
 
561
- @property
761
+ @_builtins.property
562
762
  @pulumi.getter(name="awsRoleSessionName")
563
- def aws_role_session_name(self) -> Optional[pulumi.Input[builtins.str]]:
763
+ def aws_role_session_name(self) -> Optional[pulumi.Input[_builtins.str]]:
564
764
  """
565
765
  Specifies the name to attach to the AWS role session. Used during STS AssumeRole
566
766
  """
567
767
  return pulumi.get(self, "aws_role_session_name")
568
768
 
569
769
  @aws_role_session_name.setter
570
- def aws_role_session_name(self, value: Optional[pulumi.Input[builtins.str]]):
770
+ def aws_role_session_name(self, value: Optional[pulumi.Input[_builtins.str]]):
571
771
  pulumi.set(self, "aws_role_session_name", value)
572
772
 
573
- @property
773
+ @_builtins.property
574
774
  @pulumi.getter(name="awsSecretAccessKey")
575
- def aws_secret_access_key(self) -> Optional[pulumi.Input[builtins.str]]:
775
+ def aws_secret_access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
576
776
  """
577
777
  The AWS secret access key.
578
778
  """
579
779
  return pulumi.get(self, "aws_secret_access_key")
580
780
 
581
781
  @aws_secret_access_key.setter
582
- def aws_secret_access_key(self, value: Optional[pulumi.Input[builtins.str]]):
782
+ def aws_secret_access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
583
783
  pulumi.set(self, "aws_secret_access_key", value)
584
784
 
585
- @property
785
+ @_builtins.property
586
786
  @pulumi.getter(name="awsSessionToken")
587
- def aws_session_token(self) -> Optional[pulumi.Input[builtins.str]]:
787
+ def aws_session_token(self) -> Optional[pulumi.Input[_builtins.str]]:
588
788
  """
589
789
  The AWS session token.
590
790
  """
591
791
  return pulumi.get(self, "aws_session_token")
592
792
 
593
793
  @aws_session_token.setter
594
- def aws_session_token(self, value: Optional[pulumi.Input[builtins.str]]):
794
+ def aws_session_token(self, value: Optional[pulumi.Input[_builtins.str]]):
595
795
  pulumi.set(self, "aws_session_token", value)
596
796
 
597
- @property
797
+ @_builtins.property
598
798
  @pulumi.getter(name="awsSharedCredentialsFile")
599
- def aws_shared_credentials_file(self) -> Optional[pulumi.Input[builtins.str]]:
799
+ def aws_shared_credentials_file(self) -> Optional[pulumi.Input[_builtins.str]]:
600
800
  """
601
801
  Path to the AWS shared credentials file.
602
802
  """
603
803
  return pulumi.get(self, "aws_shared_credentials_file")
604
804
 
605
805
  @aws_shared_credentials_file.setter
606
- def aws_shared_credentials_file(self, value: Optional[pulumi.Input[builtins.str]]):
806
+ def aws_shared_credentials_file(self, value: Optional[pulumi.Input[_builtins.str]]):
607
807
  pulumi.set(self, "aws_shared_credentials_file", value)
608
808
 
609
- @property
809
+ @_builtins.property
610
810
  @pulumi.getter(name="awsStsEndpoint")
611
- def aws_sts_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
811
+ def aws_sts_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
612
812
  """
613
813
  The STS endpoint URL.
614
814
  """
615
815
  return pulumi.get(self, "aws_sts_endpoint")
616
816
 
617
817
  @aws_sts_endpoint.setter
618
- def aws_sts_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
818
+ def aws_sts_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
619
819
  pulumi.set(self, "aws_sts_endpoint", value)
620
820
 
621
- @property
821
+ @_builtins.property
622
822
  @pulumi.getter(name="awsWebIdentityTokenFile")
623
- def aws_web_identity_token_file(self) -> Optional[pulumi.Input[builtins.str]]:
823
+ def aws_web_identity_token_file(self) -> Optional[pulumi.Input[_builtins.str]]:
624
824
  """
625
825
  Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
626
826
  """
627
827
  return pulumi.get(self, "aws_web_identity_token_file")
628
828
 
629
829
  @aws_web_identity_token_file.setter
630
- def aws_web_identity_token_file(self, value: Optional[pulumi.Input[builtins.str]]):
830
+ def aws_web_identity_token_file(self, value: Optional[pulumi.Input[_builtins.str]]):
631
831
  pulumi.set(self, "aws_web_identity_token_file", value)
632
832
 
633
- @property
833
+ @_builtins.property
634
834
  @pulumi.getter(name="headerValue")
635
- def header_value(self) -> Optional[pulumi.Input[builtins.str]]:
835
+ def header_value(self) -> Optional[pulumi.Input[_builtins.str]]:
636
836
  """
637
837
  The Vault header value to include in the STS signing request.
638
838
  """
639
839
  return pulumi.get(self, "header_value")
640
840
 
641
841
  @header_value.setter
642
- def header_value(self, value: Optional[pulumi.Input[builtins.str]]):
842
+ def header_value(self, value: Optional[pulumi.Input[_builtins.str]]):
643
843
  pulumi.set(self, "header_value", value)
644
844
 
645
- @property
845
+ @_builtins.property
646
846
  @pulumi.getter
647
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
847
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
648
848
  """
649
849
  The path where the authentication engine is mounted.
650
850
  """
651
851
  return pulumi.get(self, "mount")
652
852
 
653
853
  @mount.setter
654
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
854
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
655
855
  pulumi.set(self, "mount", value)
656
856
 
657
- @property
857
+ @_builtins.property
658
858
  @pulumi.getter
659
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
859
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
660
860
  """
661
861
  The authentication engine's namespace. Conflicts with use_root_namespace
662
862
  """
663
863
  return pulumi.get(self, "namespace")
664
864
 
665
865
  @namespace.setter
666
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
866
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
667
867
  pulumi.set(self, "namespace", value)
668
868
 
669
- @property
869
+ @_builtins.property
670
870
  @pulumi.getter(name="useRootNamespace")
671
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
871
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
672
872
  """
673
873
  Authenticate to the root Vault namespace. Conflicts with namespace
674
874
  """
675
875
  return pulumi.get(self, "use_root_namespace")
676
876
 
677
877
  @use_root_namespace.setter
678
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
878
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
679
879
  pulumi.set(self, "use_root_namespace", value)
680
880
 
681
881
 
682
882
  if not MYPY:
683
883
  class ProviderAuthLoginAzureArgsDict(TypedDict):
684
- resource_group_name: pulumi.Input[builtins.str]
884
+ resource_group_name: pulumi.Input[_builtins.str]
685
885
  """
686
886
  The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
687
887
  """
688
- role: pulumi.Input[builtins.str]
888
+ role: pulumi.Input[_builtins.str]
689
889
  """
690
890
  Name of the login role.
691
891
  """
692
- subscription_id: pulumi.Input[builtins.str]
892
+ subscription_id: pulumi.Input[_builtins.str]
693
893
  """
694
894
  The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
695
895
  """
696
- client_id: NotRequired[pulumi.Input[builtins.str]]
896
+ client_id: NotRequired[pulumi.Input[_builtins.str]]
697
897
  """
698
898
  The identity's client ID.
699
899
  """
700
- jwt: NotRequired[pulumi.Input[builtins.str]]
900
+ jwt: NotRequired[pulumi.Input[_builtins.str]]
701
901
  """
702
902
  A signed JSON Web Token. If not specified on will be created automatically
703
903
  """
704
- mount: NotRequired[pulumi.Input[builtins.str]]
904
+ mount: NotRequired[pulumi.Input[_builtins.str]]
705
905
  """
706
906
  The path where the authentication engine is mounted.
707
907
  """
708
- namespace: NotRequired[pulumi.Input[builtins.str]]
908
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
709
909
  """
710
910
  The authentication engine's namespace. Conflicts with use_root_namespace
711
911
  """
712
- scope: NotRequired[pulumi.Input[builtins.str]]
912
+ scope: NotRequired[pulumi.Input[_builtins.str]]
713
913
  """
714
914
  The scopes to include in the token request.
715
915
  """
716
- tenant_id: NotRequired[pulumi.Input[builtins.str]]
916
+ tenant_id: NotRequired[pulumi.Input[_builtins.str]]
717
917
  """
718
918
  Provides the tenant ID to use in a multi-tenant authentication scenario.
719
919
  """
720
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
920
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
721
921
  """
722
922
  Authenticate to the root Vault namespace. Conflicts with namespace
723
923
  """
724
- vm_name: NotRequired[pulumi.Input[builtins.str]]
924
+ vm_name: NotRequired[pulumi.Input[_builtins.str]]
725
925
  """
726
926
  The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
727
927
  """
728
- vmss_name: NotRequired[pulumi.Input[builtins.str]]
928
+ vmss_name: NotRequired[pulumi.Input[_builtins.str]]
729
929
  """
730
930
  The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
731
931
  """
@@ -735,31 +935,31 @@ elif False:
735
935
  @pulumi.input_type
736
936
  class ProviderAuthLoginAzureArgs:
737
937
  def __init__(__self__, *,
738
- resource_group_name: pulumi.Input[builtins.str],
739
- role: pulumi.Input[builtins.str],
740
- subscription_id: pulumi.Input[builtins.str],
741
- client_id: Optional[pulumi.Input[builtins.str]] = None,
742
- jwt: Optional[pulumi.Input[builtins.str]] = None,
743
- mount: Optional[pulumi.Input[builtins.str]] = None,
744
- namespace: Optional[pulumi.Input[builtins.str]] = None,
745
- scope: Optional[pulumi.Input[builtins.str]] = None,
746
- tenant_id: Optional[pulumi.Input[builtins.str]] = None,
747
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None,
748
- vm_name: Optional[pulumi.Input[builtins.str]] = None,
749
- vmss_name: Optional[pulumi.Input[builtins.str]] = None):
750
- """
751
- :param pulumi.Input[builtins.str] resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
752
- :param pulumi.Input[builtins.str] role: Name of the login role.
753
- :param pulumi.Input[builtins.str] subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
754
- :param pulumi.Input[builtins.str] client_id: The identity's client ID.
755
- :param pulumi.Input[builtins.str] jwt: A signed JSON Web Token. If not specified on will be created automatically
756
- :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
757
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
758
- :param pulumi.Input[builtins.str] scope: The scopes to include in the token request.
759
- :param pulumi.Input[builtins.str] tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
760
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
761
- :param pulumi.Input[builtins.str] vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
762
- :param pulumi.Input[builtins.str] vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
938
+ resource_group_name: pulumi.Input[_builtins.str],
939
+ role: pulumi.Input[_builtins.str],
940
+ subscription_id: pulumi.Input[_builtins.str],
941
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
942
+ jwt: Optional[pulumi.Input[_builtins.str]] = None,
943
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
944
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
945
+ scope: Optional[pulumi.Input[_builtins.str]] = None,
946
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
947
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
948
+ vm_name: Optional[pulumi.Input[_builtins.str]] = None,
949
+ vmss_name: Optional[pulumi.Input[_builtins.str]] = None):
950
+ """
951
+ :param pulumi.Input[_builtins.str] resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
952
+ :param pulumi.Input[_builtins.str] role: Name of the login role.
953
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
954
+ :param pulumi.Input[_builtins.str] client_id: The identity's client ID.
955
+ :param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token. If not specified on will be created automatically
956
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
957
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
958
+ :param pulumi.Input[_builtins.str] scope: The scopes to include in the token request.
959
+ :param pulumi.Input[_builtins.str] tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
960
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
961
+ :param pulumi.Input[_builtins.str] vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
962
+ :param pulumi.Input[_builtins.str] vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
763
963
  """
764
964
  pulumi.set(__self__, "resource_group_name", resource_group_name)
765
965
  pulumi.set(__self__, "role", role)
@@ -783,174 +983,174 @@ class ProviderAuthLoginAzureArgs:
783
983
  if vmss_name is not None:
784
984
  pulumi.set(__self__, "vmss_name", vmss_name)
785
985
 
786
- @property
986
+ @_builtins.property
787
987
  @pulumi.getter(name="resourceGroupName")
788
- def resource_group_name(self) -> pulumi.Input[builtins.str]:
988
+ def resource_group_name(self) -> pulumi.Input[_builtins.str]:
789
989
  """
790
990
  The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
791
991
  """
792
992
  return pulumi.get(self, "resource_group_name")
793
993
 
794
994
  @resource_group_name.setter
795
- def resource_group_name(self, value: pulumi.Input[builtins.str]):
995
+ def resource_group_name(self, value: pulumi.Input[_builtins.str]):
796
996
  pulumi.set(self, "resource_group_name", value)
797
997
 
798
- @property
998
+ @_builtins.property
799
999
  @pulumi.getter
800
- def role(self) -> pulumi.Input[builtins.str]:
1000
+ def role(self) -> pulumi.Input[_builtins.str]:
801
1001
  """
802
1002
  Name of the login role.
803
1003
  """
804
1004
  return pulumi.get(self, "role")
805
1005
 
806
1006
  @role.setter
807
- def role(self, value: pulumi.Input[builtins.str]):
1007
+ def role(self, value: pulumi.Input[_builtins.str]):
808
1008
  pulumi.set(self, "role", value)
809
1009
 
810
- @property
1010
+ @_builtins.property
811
1011
  @pulumi.getter(name="subscriptionId")
812
- def subscription_id(self) -> pulumi.Input[builtins.str]:
1012
+ def subscription_id(self) -> pulumi.Input[_builtins.str]:
813
1013
  """
814
1014
  The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
815
1015
  """
816
1016
  return pulumi.get(self, "subscription_id")
817
1017
 
818
1018
  @subscription_id.setter
819
- def subscription_id(self, value: pulumi.Input[builtins.str]):
1019
+ def subscription_id(self, value: pulumi.Input[_builtins.str]):
820
1020
  pulumi.set(self, "subscription_id", value)
821
1021
 
822
- @property
1022
+ @_builtins.property
823
1023
  @pulumi.getter(name="clientId")
824
- def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
1024
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
825
1025
  """
826
1026
  The identity's client ID.
827
1027
  """
828
1028
  return pulumi.get(self, "client_id")
829
1029
 
830
1030
  @client_id.setter
831
- def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
1031
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
832
1032
  pulumi.set(self, "client_id", value)
833
1033
 
834
- @property
1034
+ @_builtins.property
835
1035
  @pulumi.getter
836
- def jwt(self) -> Optional[pulumi.Input[builtins.str]]:
1036
+ def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
837
1037
  """
838
1038
  A signed JSON Web Token. If not specified on will be created automatically
839
1039
  """
840
1040
  return pulumi.get(self, "jwt")
841
1041
 
842
1042
  @jwt.setter
843
- def jwt(self, value: Optional[pulumi.Input[builtins.str]]):
1043
+ def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
844
1044
  pulumi.set(self, "jwt", value)
845
1045
 
846
- @property
1046
+ @_builtins.property
847
1047
  @pulumi.getter
848
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1048
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
849
1049
  """
850
1050
  The path where the authentication engine is mounted.
851
1051
  """
852
1052
  return pulumi.get(self, "mount")
853
1053
 
854
1054
  @mount.setter
855
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1055
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
856
1056
  pulumi.set(self, "mount", value)
857
1057
 
858
- @property
1058
+ @_builtins.property
859
1059
  @pulumi.getter
860
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1060
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
861
1061
  """
862
1062
  The authentication engine's namespace. Conflicts with use_root_namespace
863
1063
  """
864
1064
  return pulumi.get(self, "namespace")
865
1065
 
866
1066
  @namespace.setter
867
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1067
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
868
1068
  pulumi.set(self, "namespace", value)
869
1069
 
870
- @property
1070
+ @_builtins.property
871
1071
  @pulumi.getter
872
- def scope(self) -> Optional[pulumi.Input[builtins.str]]:
1072
+ def scope(self) -> Optional[pulumi.Input[_builtins.str]]:
873
1073
  """
874
1074
  The scopes to include in the token request.
875
1075
  """
876
1076
  return pulumi.get(self, "scope")
877
1077
 
878
1078
  @scope.setter
879
- def scope(self, value: Optional[pulumi.Input[builtins.str]]):
1079
+ def scope(self, value: Optional[pulumi.Input[_builtins.str]]):
880
1080
  pulumi.set(self, "scope", value)
881
1081
 
882
- @property
1082
+ @_builtins.property
883
1083
  @pulumi.getter(name="tenantId")
884
- def tenant_id(self) -> Optional[pulumi.Input[builtins.str]]:
1084
+ def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
885
1085
  """
886
1086
  Provides the tenant ID to use in a multi-tenant authentication scenario.
887
1087
  """
888
1088
  return pulumi.get(self, "tenant_id")
889
1089
 
890
1090
  @tenant_id.setter
891
- def tenant_id(self, value: Optional[pulumi.Input[builtins.str]]):
1091
+ def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
892
1092
  pulumi.set(self, "tenant_id", value)
893
1093
 
894
- @property
1094
+ @_builtins.property
895
1095
  @pulumi.getter(name="useRootNamespace")
896
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1096
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
897
1097
  """
898
1098
  Authenticate to the root Vault namespace. Conflicts with namespace
899
1099
  """
900
1100
  return pulumi.get(self, "use_root_namespace")
901
1101
 
902
1102
  @use_root_namespace.setter
903
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1103
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
904
1104
  pulumi.set(self, "use_root_namespace", value)
905
1105
 
906
- @property
1106
+ @_builtins.property
907
1107
  @pulumi.getter(name="vmName")
908
- def vm_name(self) -> Optional[pulumi.Input[builtins.str]]:
1108
+ def vm_name(self) -> Optional[pulumi.Input[_builtins.str]]:
909
1109
  """
910
1110
  The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
911
1111
  """
912
1112
  return pulumi.get(self, "vm_name")
913
1113
 
914
1114
  @vm_name.setter
915
- def vm_name(self, value: Optional[pulumi.Input[builtins.str]]):
1115
+ def vm_name(self, value: Optional[pulumi.Input[_builtins.str]]):
916
1116
  pulumi.set(self, "vm_name", value)
917
1117
 
918
- @property
1118
+ @_builtins.property
919
1119
  @pulumi.getter(name="vmssName")
920
- def vmss_name(self) -> Optional[pulumi.Input[builtins.str]]:
1120
+ def vmss_name(self) -> Optional[pulumi.Input[_builtins.str]]:
921
1121
  """
922
1122
  The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
923
1123
  """
924
1124
  return pulumi.get(self, "vmss_name")
925
1125
 
926
1126
  @vmss_name.setter
927
- def vmss_name(self, value: Optional[pulumi.Input[builtins.str]]):
1127
+ def vmss_name(self, value: Optional[pulumi.Input[_builtins.str]]):
928
1128
  pulumi.set(self, "vmss_name", value)
929
1129
 
930
1130
 
931
1131
  if not MYPY:
932
1132
  class ProviderAuthLoginCertArgsDict(TypedDict):
933
- cert_file: pulumi.Input[builtins.str]
1133
+ cert_file: pulumi.Input[_builtins.str]
934
1134
  """
935
1135
  Path to a file containing the client certificate.
936
1136
  """
937
- key_file: pulumi.Input[builtins.str]
1137
+ key_file: pulumi.Input[_builtins.str]
938
1138
  """
939
1139
  Path to a file containing the private key that the certificate was issued for.
940
1140
  """
941
- mount: NotRequired[pulumi.Input[builtins.str]]
1141
+ mount: NotRequired[pulumi.Input[_builtins.str]]
942
1142
  """
943
1143
  The path where the authentication engine is mounted.
944
1144
  """
945
- name: NotRequired[pulumi.Input[builtins.str]]
1145
+ name: NotRequired[pulumi.Input[_builtins.str]]
946
1146
  """
947
1147
  Name of the certificate's role
948
1148
  """
949
- namespace: NotRequired[pulumi.Input[builtins.str]]
1149
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
950
1150
  """
951
1151
  The authentication engine's namespace. Conflicts with use_root_namespace
952
1152
  """
953
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1153
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
954
1154
  """
955
1155
  Authenticate to the root Vault namespace. Conflicts with namespace
956
1156
  """
@@ -960,19 +1160,19 @@ elif False:
960
1160
  @pulumi.input_type
961
1161
  class ProviderAuthLoginCertArgs:
962
1162
  def __init__(__self__, *,
963
- cert_file: pulumi.Input[builtins.str],
964
- key_file: pulumi.Input[builtins.str],
965
- mount: Optional[pulumi.Input[builtins.str]] = None,
966
- name: Optional[pulumi.Input[builtins.str]] = None,
967
- namespace: Optional[pulumi.Input[builtins.str]] = None,
968
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
969
- """
970
- :param pulumi.Input[builtins.str] cert_file: Path to a file containing the client certificate.
971
- :param pulumi.Input[builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
972
- :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
973
- :param pulumi.Input[builtins.str] name: Name of the certificate's role
974
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
975
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1163
+ cert_file: pulumi.Input[_builtins.str],
1164
+ key_file: pulumi.Input[_builtins.str],
1165
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1166
+ name: Optional[pulumi.Input[_builtins.str]] = None,
1167
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1168
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
1169
+ """
1170
+ :param pulumi.Input[_builtins.str] cert_file: Path to a file containing the client certificate.
1171
+ :param pulumi.Input[_builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
1172
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1173
+ :param pulumi.Input[_builtins.str] name: Name of the certificate's role
1174
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1175
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
976
1176
  """
977
1177
  pulumi.set(__self__, "cert_file", cert_file)
978
1178
  pulumi.set(__self__, "key_file", key_file)
@@ -985,106 +1185,106 @@ class ProviderAuthLoginCertArgs:
985
1185
  if use_root_namespace is not None:
986
1186
  pulumi.set(__self__, "use_root_namespace", use_root_namespace)
987
1187
 
988
- @property
1188
+ @_builtins.property
989
1189
  @pulumi.getter(name="certFile")
990
- def cert_file(self) -> pulumi.Input[builtins.str]:
1190
+ def cert_file(self) -> pulumi.Input[_builtins.str]:
991
1191
  """
992
1192
  Path to a file containing the client certificate.
993
1193
  """
994
1194
  return pulumi.get(self, "cert_file")
995
1195
 
996
1196
  @cert_file.setter
997
- def cert_file(self, value: pulumi.Input[builtins.str]):
1197
+ def cert_file(self, value: pulumi.Input[_builtins.str]):
998
1198
  pulumi.set(self, "cert_file", value)
999
1199
 
1000
- @property
1200
+ @_builtins.property
1001
1201
  @pulumi.getter(name="keyFile")
1002
- def key_file(self) -> pulumi.Input[builtins.str]:
1202
+ def key_file(self) -> pulumi.Input[_builtins.str]:
1003
1203
  """
1004
1204
  Path to a file containing the private key that the certificate was issued for.
1005
1205
  """
1006
1206
  return pulumi.get(self, "key_file")
1007
1207
 
1008
1208
  @key_file.setter
1009
- def key_file(self, value: pulumi.Input[builtins.str]):
1209
+ def key_file(self, value: pulumi.Input[_builtins.str]):
1010
1210
  pulumi.set(self, "key_file", value)
1011
1211
 
1012
- @property
1212
+ @_builtins.property
1013
1213
  @pulumi.getter
1014
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1214
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1015
1215
  """
1016
1216
  The path where the authentication engine is mounted.
1017
1217
  """
1018
1218
  return pulumi.get(self, "mount")
1019
1219
 
1020
1220
  @mount.setter
1021
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1221
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1022
1222
  pulumi.set(self, "mount", value)
1023
1223
 
1024
- @property
1224
+ @_builtins.property
1025
1225
  @pulumi.getter
1026
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
1226
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
1027
1227
  """
1028
1228
  Name of the certificate's role
1029
1229
  """
1030
1230
  return pulumi.get(self, "name")
1031
1231
 
1032
1232
  @name.setter
1033
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
1233
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
1034
1234
  pulumi.set(self, "name", value)
1035
1235
 
1036
- @property
1236
+ @_builtins.property
1037
1237
  @pulumi.getter
1038
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1238
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1039
1239
  """
1040
1240
  The authentication engine's namespace. Conflicts with use_root_namespace
1041
1241
  """
1042
1242
  return pulumi.get(self, "namespace")
1043
1243
 
1044
1244
  @namespace.setter
1045
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1245
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1046
1246
  pulumi.set(self, "namespace", value)
1047
1247
 
1048
- @property
1248
+ @_builtins.property
1049
1249
  @pulumi.getter(name="useRootNamespace")
1050
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1250
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1051
1251
  """
1052
1252
  Authenticate to the root Vault namespace. Conflicts with namespace
1053
1253
  """
1054
1254
  return pulumi.get(self, "use_root_namespace")
1055
1255
 
1056
1256
  @use_root_namespace.setter
1057
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1257
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1058
1258
  pulumi.set(self, "use_root_namespace", value)
1059
1259
 
1060
1260
 
1061
1261
  if not MYPY:
1062
1262
  class ProviderAuthLoginGcpArgsDict(TypedDict):
1063
- role: pulumi.Input[builtins.str]
1263
+ role: pulumi.Input[_builtins.str]
1064
1264
  """
1065
1265
  Name of the login role.
1066
1266
  """
1067
- credentials: NotRequired[pulumi.Input[builtins.str]]
1267
+ credentials: NotRequired[pulumi.Input[_builtins.str]]
1068
1268
  """
1069
1269
  Path to the Google Cloud credentials file.
1070
1270
  """
1071
- jwt: NotRequired[pulumi.Input[builtins.str]]
1271
+ jwt: NotRequired[pulumi.Input[_builtins.str]]
1072
1272
  """
1073
1273
  A signed JSON Web Token.
1074
1274
  """
1075
- mount: NotRequired[pulumi.Input[builtins.str]]
1275
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1076
1276
  """
1077
1277
  The path where the authentication engine is mounted.
1078
1278
  """
1079
- namespace: NotRequired[pulumi.Input[builtins.str]]
1279
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1080
1280
  """
1081
1281
  The authentication engine's namespace. Conflicts with use_root_namespace
1082
1282
  """
1083
- service_account: NotRequired[pulumi.Input[builtins.str]]
1283
+ service_account: NotRequired[pulumi.Input[_builtins.str]]
1084
1284
  """
1085
1285
  IAM service account.
1086
1286
  """
1087
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1287
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1088
1288
  """
1089
1289
  Authenticate to the root Vault namespace. Conflicts with namespace
1090
1290
  """
@@ -1094,21 +1294,21 @@ elif False:
1094
1294
  @pulumi.input_type
1095
1295
  class ProviderAuthLoginGcpArgs:
1096
1296
  def __init__(__self__, *,
1097
- role: pulumi.Input[builtins.str],
1098
- credentials: Optional[pulumi.Input[builtins.str]] = None,
1099
- jwt: Optional[pulumi.Input[builtins.str]] = None,
1100
- mount: Optional[pulumi.Input[builtins.str]] = None,
1101
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1102
- service_account: Optional[pulumi.Input[builtins.str]] = None,
1103
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
1104
- """
1105
- :param pulumi.Input[builtins.str] role: Name of the login role.
1106
- :param pulumi.Input[builtins.str] credentials: Path to the Google Cloud credentials file.
1107
- :param pulumi.Input[builtins.str] jwt: A signed JSON Web Token.
1108
- :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1109
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1110
- :param pulumi.Input[builtins.str] service_account: IAM service account.
1111
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1297
+ role: pulumi.Input[_builtins.str],
1298
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
1299
+ jwt: Optional[pulumi.Input[_builtins.str]] = None,
1300
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1301
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1302
+ service_account: Optional[pulumi.Input[_builtins.str]] = None,
1303
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
1304
+ """
1305
+ :param pulumi.Input[_builtins.str] role: Name of the login role.
1306
+ :param pulumi.Input[_builtins.str] credentials: Path to the Google Cloud credentials file.
1307
+ :param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token.
1308
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1309
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1310
+ :param pulumi.Input[_builtins.str] service_account: IAM service account.
1311
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1112
1312
  """
1113
1313
  pulumi.set(__self__, "role", role)
1114
1314
  if credentials is not None:
@@ -1124,110 +1324,110 @@ class ProviderAuthLoginGcpArgs:
1124
1324
  if use_root_namespace is not None:
1125
1325
  pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1126
1326
 
1127
- @property
1327
+ @_builtins.property
1128
1328
  @pulumi.getter
1129
- def role(self) -> pulumi.Input[builtins.str]:
1329
+ def role(self) -> pulumi.Input[_builtins.str]:
1130
1330
  """
1131
1331
  Name of the login role.
1132
1332
  """
1133
1333
  return pulumi.get(self, "role")
1134
1334
 
1135
1335
  @role.setter
1136
- def role(self, value: pulumi.Input[builtins.str]):
1336
+ def role(self, value: pulumi.Input[_builtins.str]):
1137
1337
  pulumi.set(self, "role", value)
1138
1338
 
1139
- @property
1339
+ @_builtins.property
1140
1340
  @pulumi.getter
1141
- def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
1341
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
1142
1342
  """
1143
1343
  Path to the Google Cloud credentials file.
1144
1344
  """
1145
1345
  return pulumi.get(self, "credentials")
1146
1346
 
1147
1347
  @credentials.setter
1148
- def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
1348
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
1149
1349
  pulumi.set(self, "credentials", value)
1150
1350
 
1151
- @property
1351
+ @_builtins.property
1152
1352
  @pulumi.getter
1153
- def jwt(self) -> Optional[pulumi.Input[builtins.str]]:
1353
+ def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
1154
1354
  """
1155
1355
  A signed JSON Web Token.
1156
1356
  """
1157
1357
  return pulumi.get(self, "jwt")
1158
1358
 
1159
1359
  @jwt.setter
1160
- def jwt(self, value: Optional[pulumi.Input[builtins.str]]):
1360
+ def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
1161
1361
  pulumi.set(self, "jwt", value)
1162
1362
 
1163
- @property
1363
+ @_builtins.property
1164
1364
  @pulumi.getter
1165
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1365
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1166
1366
  """
1167
1367
  The path where the authentication engine is mounted.
1168
1368
  """
1169
1369
  return pulumi.get(self, "mount")
1170
1370
 
1171
1371
  @mount.setter
1172
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1372
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1173
1373
  pulumi.set(self, "mount", value)
1174
1374
 
1175
- @property
1375
+ @_builtins.property
1176
1376
  @pulumi.getter
1177
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1377
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1178
1378
  """
1179
1379
  The authentication engine's namespace. Conflicts with use_root_namespace
1180
1380
  """
1181
1381
  return pulumi.get(self, "namespace")
1182
1382
 
1183
1383
  @namespace.setter
1184
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1384
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1185
1385
  pulumi.set(self, "namespace", value)
1186
1386
 
1187
- @property
1387
+ @_builtins.property
1188
1388
  @pulumi.getter(name="serviceAccount")
1189
- def service_account(self) -> Optional[pulumi.Input[builtins.str]]:
1389
+ def service_account(self) -> Optional[pulumi.Input[_builtins.str]]:
1190
1390
  """
1191
1391
  IAM service account.
1192
1392
  """
1193
1393
  return pulumi.get(self, "service_account")
1194
1394
 
1195
1395
  @service_account.setter
1196
- def service_account(self, value: Optional[pulumi.Input[builtins.str]]):
1396
+ def service_account(self, value: Optional[pulumi.Input[_builtins.str]]):
1197
1397
  pulumi.set(self, "service_account", value)
1198
1398
 
1199
- @property
1399
+ @_builtins.property
1200
1400
  @pulumi.getter(name="useRootNamespace")
1201
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1401
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1202
1402
  """
1203
1403
  Authenticate to the root Vault namespace. Conflicts with namespace
1204
1404
  """
1205
1405
  return pulumi.get(self, "use_root_namespace")
1206
1406
 
1207
1407
  @use_root_namespace.setter
1208
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1408
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1209
1409
  pulumi.set(self, "use_root_namespace", value)
1210
1410
 
1211
1411
 
1212
1412
  if not MYPY:
1213
1413
  class ProviderAuthLoginJwtArgsDict(TypedDict):
1214
- role: pulumi.Input[builtins.str]
1414
+ role: pulumi.Input[_builtins.str]
1215
1415
  """
1216
1416
  Name of the login role.
1217
1417
  """
1218
- jwt: NotRequired[pulumi.Input[builtins.str]]
1418
+ jwt: NotRequired[pulumi.Input[_builtins.str]]
1219
1419
  """
1220
1420
  A signed JSON Web Token.
1221
1421
  """
1222
- mount: NotRequired[pulumi.Input[builtins.str]]
1422
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1223
1423
  """
1224
1424
  The path where the authentication engine is mounted.
1225
1425
  """
1226
- namespace: NotRequired[pulumi.Input[builtins.str]]
1426
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1227
1427
  """
1228
1428
  The authentication engine's namespace. Conflicts with use_root_namespace
1229
1429
  """
1230
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1430
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1231
1431
  """
1232
1432
  Authenticate to the root Vault namespace. Conflicts with namespace
1233
1433
  """
@@ -1237,17 +1437,17 @@ elif False:
1237
1437
  @pulumi.input_type
1238
1438
  class ProviderAuthLoginJwtArgs:
1239
1439
  def __init__(__self__, *,
1240
- role: pulumi.Input[builtins.str],
1241
- jwt: Optional[pulumi.Input[builtins.str]] = None,
1242
- mount: Optional[pulumi.Input[builtins.str]] = None,
1243
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1244
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
1245
- """
1246
- :param pulumi.Input[builtins.str] role: Name of the login role.
1247
- :param pulumi.Input[builtins.str] jwt: A signed JSON Web Token.
1248
- :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1249
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1250
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1440
+ role: pulumi.Input[_builtins.str],
1441
+ jwt: Optional[pulumi.Input[_builtins.str]] = None,
1442
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1443
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1444
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
1445
+ """
1446
+ :param pulumi.Input[_builtins.str] role: Name of the login role.
1447
+ :param pulumi.Input[_builtins.str] jwt: A signed JSON Web Token.
1448
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1449
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1450
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1251
1451
  """
1252
1452
  pulumi.set(__self__, "role", role)
1253
1453
  if jwt is not None:
@@ -1259,110 +1459,110 @@ class ProviderAuthLoginJwtArgs:
1259
1459
  if use_root_namespace is not None:
1260
1460
  pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1261
1461
 
1262
- @property
1462
+ @_builtins.property
1263
1463
  @pulumi.getter
1264
- def role(self) -> pulumi.Input[builtins.str]:
1464
+ def role(self) -> pulumi.Input[_builtins.str]:
1265
1465
  """
1266
1466
  Name of the login role.
1267
1467
  """
1268
1468
  return pulumi.get(self, "role")
1269
1469
 
1270
1470
  @role.setter
1271
- def role(self, value: pulumi.Input[builtins.str]):
1471
+ def role(self, value: pulumi.Input[_builtins.str]):
1272
1472
  pulumi.set(self, "role", value)
1273
1473
 
1274
- @property
1474
+ @_builtins.property
1275
1475
  @pulumi.getter
1276
- def jwt(self) -> Optional[pulumi.Input[builtins.str]]:
1476
+ def jwt(self) -> Optional[pulumi.Input[_builtins.str]]:
1277
1477
  """
1278
1478
  A signed JSON Web Token.
1279
1479
  """
1280
1480
  return pulumi.get(self, "jwt")
1281
1481
 
1282
1482
  @jwt.setter
1283
- def jwt(self, value: Optional[pulumi.Input[builtins.str]]):
1483
+ def jwt(self, value: Optional[pulumi.Input[_builtins.str]]):
1284
1484
  pulumi.set(self, "jwt", value)
1285
1485
 
1286
- @property
1486
+ @_builtins.property
1287
1487
  @pulumi.getter
1288
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1488
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1289
1489
  """
1290
1490
  The path where the authentication engine is mounted.
1291
1491
  """
1292
1492
  return pulumi.get(self, "mount")
1293
1493
 
1294
1494
  @mount.setter
1295
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1495
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1296
1496
  pulumi.set(self, "mount", value)
1297
1497
 
1298
- @property
1498
+ @_builtins.property
1299
1499
  @pulumi.getter
1300
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1500
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1301
1501
  """
1302
1502
  The authentication engine's namespace. Conflicts with use_root_namespace
1303
1503
  """
1304
1504
  return pulumi.get(self, "namespace")
1305
1505
 
1306
1506
  @namespace.setter
1307
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1507
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1308
1508
  pulumi.set(self, "namespace", value)
1309
1509
 
1310
- @property
1510
+ @_builtins.property
1311
1511
  @pulumi.getter(name="useRootNamespace")
1312
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1512
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1313
1513
  """
1314
1514
  Authenticate to the root Vault namespace. Conflicts with namespace
1315
1515
  """
1316
1516
  return pulumi.get(self, "use_root_namespace")
1317
1517
 
1318
1518
  @use_root_namespace.setter
1319
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1519
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1320
1520
  pulumi.set(self, "use_root_namespace", value)
1321
1521
 
1322
1522
 
1323
1523
  if not MYPY:
1324
1524
  class ProviderAuthLoginKerberosArgsDict(TypedDict):
1325
- disable_fast_negotiation: NotRequired[pulumi.Input[builtins.bool]]
1525
+ disable_fast_negotiation: NotRequired[pulumi.Input[_builtins.bool]]
1326
1526
  """
1327
1527
  Disable the Kerberos FAST negotiation.
1328
1528
  """
1329
- keytab_path: NotRequired[pulumi.Input[builtins.str]]
1529
+ keytab_path: NotRequired[pulumi.Input[_builtins.str]]
1330
1530
  """
1331
1531
  The Kerberos keytab file containing the entry of the login entity.
1332
1532
  """
1333
- krb5conf_path: NotRequired[pulumi.Input[builtins.str]]
1533
+ krb5conf_path: NotRequired[pulumi.Input[_builtins.str]]
1334
1534
  """
1335
1535
  A valid Kerberos configuration file e.g. /etc/krb5.conf.
1336
1536
  """
1337
- mount: NotRequired[pulumi.Input[builtins.str]]
1537
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1338
1538
  """
1339
1539
  The path where the authentication engine is mounted.
1340
1540
  """
1341
- namespace: NotRequired[pulumi.Input[builtins.str]]
1541
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1342
1542
  """
1343
1543
  The authentication engine's namespace. Conflicts with use_root_namespace
1344
1544
  """
1345
- realm: NotRequired[pulumi.Input[builtins.str]]
1545
+ realm: NotRequired[pulumi.Input[_builtins.str]]
1346
1546
  """
1347
1547
  The Kerberos server's authoritative authentication domain
1348
1548
  """
1349
- remove_instance_name: NotRequired[pulumi.Input[builtins.bool]]
1549
+ remove_instance_name: NotRequired[pulumi.Input[_builtins.bool]]
1350
1550
  """
1351
1551
  Strip the host from the username found in the keytab.
1352
1552
  """
1353
- service: NotRequired[pulumi.Input[builtins.str]]
1553
+ service: NotRequired[pulumi.Input[_builtins.str]]
1354
1554
  """
1355
1555
  The service principle name.
1356
1556
  """
1357
- token: NotRequired[pulumi.Input[builtins.str]]
1557
+ token: NotRequired[pulumi.Input[_builtins.str]]
1358
1558
  """
1359
1559
  Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1360
1560
  """
1361
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1561
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1362
1562
  """
1363
1563
  Authenticate to the root Vault namespace. Conflicts with namespace
1364
1564
  """
1365
- username: NotRequired[pulumi.Input[builtins.str]]
1565
+ username: NotRequired[pulumi.Input[_builtins.str]]
1366
1566
  """
1367
1567
  The username to login into Kerberos with.
1368
1568
  """
@@ -1372,29 +1572,29 @@ elif False:
1372
1572
  @pulumi.input_type
1373
1573
  class ProviderAuthLoginKerberosArgs:
1374
1574
  def __init__(__self__, *,
1375
- disable_fast_negotiation: Optional[pulumi.Input[builtins.bool]] = None,
1376
- keytab_path: Optional[pulumi.Input[builtins.str]] = None,
1377
- krb5conf_path: Optional[pulumi.Input[builtins.str]] = None,
1378
- mount: Optional[pulumi.Input[builtins.str]] = None,
1379
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1380
- realm: Optional[pulumi.Input[builtins.str]] = None,
1381
- remove_instance_name: Optional[pulumi.Input[builtins.bool]] = None,
1382
- service: Optional[pulumi.Input[builtins.str]] = None,
1383
- token: Optional[pulumi.Input[builtins.str]] = None,
1384
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None,
1385
- username: Optional[pulumi.Input[builtins.str]] = None):
1386
- """
1387
- :param pulumi.Input[builtins.bool] disable_fast_negotiation: Disable the Kerberos FAST negotiation.
1388
- :param pulumi.Input[builtins.str] keytab_path: The Kerberos keytab file containing the entry of the login entity.
1389
- :param pulumi.Input[builtins.str] krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
1390
- :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1391
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1392
- :param pulumi.Input[builtins.str] realm: The Kerberos server's authoritative authentication domain
1393
- :param pulumi.Input[builtins.bool] remove_instance_name: Strip the host from the username found in the keytab.
1394
- :param pulumi.Input[builtins.str] service: The service principle name.
1395
- :param pulumi.Input[builtins.str] token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1396
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1397
- :param pulumi.Input[builtins.str] username: The username to login into Kerberos with.
1575
+ disable_fast_negotiation: Optional[pulumi.Input[_builtins.bool]] = None,
1576
+ keytab_path: Optional[pulumi.Input[_builtins.str]] = None,
1577
+ krb5conf_path: Optional[pulumi.Input[_builtins.str]] = None,
1578
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1579
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1580
+ realm: Optional[pulumi.Input[_builtins.str]] = None,
1581
+ remove_instance_name: Optional[pulumi.Input[_builtins.bool]] = None,
1582
+ service: Optional[pulumi.Input[_builtins.str]] = None,
1583
+ token: Optional[pulumi.Input[_builtins.str]] = None,
1584
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
1585
+ username: Optional[pulumi.Input[_builtins.str]] = None):
1586
+ """
1587
+ :param pulumi.Input[_builtins.bool] disable_fast_negotiation: Disable the Kerberos FAST negotiation.
1588
+ :param pulumi.Input[_builtins.str] keytab_path: The Kerberos keytab file containing the entry of the login entity.
1589
+ :param pulumi.Input[_builtins.str] krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
1590
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1591
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1592
+ :param pulumi.Input[_builtins.str] realm: The Kerberos server's authoritative authentication domain
1593
+ :param pulumi.Input[_builtins.bool] remove_instance_name: Strip the host from the username found in the keytab.
1594
+ :param pulumi.Input[_builtins.str] service: The service principle name.
1595
+ :param pulumi.Input[_builtins.str] token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1596
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1597
+ :param pulumi.Input[_builtins.str] username: The username to login into Kerberos with.
1398
1598
  """
1399
1599
  if disable_fast_negotiation is not None:
1400
1600
  pulumi.set(__self__, "disable_fast_negotiation", disable_fast_negotiation)
@@ -1419,158 +1619,158 @@ class ProviderAuthLoginKerberosArgs:
1419
1619
  if username is not None:
1420
1620
  pulumi.set(__self__, "username", username)
1421
1621
 
1422
- @property
1622
+ @_builtins.property
1423
1623
  @pulumi.getter(name="disableFastNegotiation")
1424
- def disable_fast_negotiation(self) -> Optional[pulumi.Input[builtins.bool]]:
1624
+ def disable_fast_negotiation(self) -> Optional[pulumi.Input[_builtins.bool]]:
1425
1625
  """
1426
1626
  Disable the Kerberos FAST negotiation.
1427
1627
  """
1428
1628
  return pulumi.get(self, "disable_fast_negotiation")
1429
1629
 
1430
1630
  @disable_fast_negotiation.setter
1431
- def disable_fast_negotiation(self, value: Optional[pulumi.Input[builtins.bool]]):
1631
+ def disable_fast_negotiation(self, value: Optional[pulumi.Input[_builtins.bool]]):
1432
1632
  pulumi.set(self, "disable_fast_negotiation", value)
1433
1633
 
1434
- @property
1634
+ @_builtins.property
1435
1635
  @pulumi.getter(name="keytabPath")
1436
- def keytab_path(self) -> Optional[pulumi.Input[builtins.str]]:
1636
+ def keytab_path(self) -> Optional[pulumi.Input[_builtins.str]]:
1437
1637
  """
1438
1638
  The Kerberos keytab file containing the entry of the login entity.
1439
1639
  """
1440
1640
  return pulumi.get(self, "keytab_path")
1441
1641
 
1442
1642
  @keytab_path.setter
1443
- def keytab_path(self, value: Optional[pulumi.Input[builtins.str]]):
1643
+ def keytab_path(self, value: Optional[pulumi.Input[_builtins.str]]):
1444
1644
  pulumi.set(self, "keytab_path", value)
1445
1645
 
1446
- @property
1646
+ @_builtins.property
1447
1647
  @pulumi.getter(name="krb5confPath")
1448
- def krb5conf_path(self) -> Optional[pulumi.Input[builtins.str]]:
1648
+ def krb5conf_path(self) -> Optional[pulumi.Input[_builtins.str]]:
1449
1649
  """
1450
1650
  A valid Kerberos configuration file e.g. /etc/krb5.conf.
1451
1651
  """
1452
1652
  return pulumi.get(self, "krb5conf_path")
1453
1653
 
1454
1654
  @krb5conf_path.setter
1455
- def krb5conf_path(self, value: Optional[pulumi.Input[builtins.str]]):
1655
+ def krb5conf_path(self, value: Optional[pulumi.Input[_builtins.str]]):
1456
1656
  pulumi.set(self, "krb5conf_path", value)
1457
1657
 
1458
- @property
1658
+ @_builtins.property
1459
1659
  @pulumi.getter
1460
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1660
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1461
1661
  """
1462
1662
  The path where the authentication engine is mounted.
1463
1663
  """
1464
1664
  return pulumi.get(self, "mount")
1465
1665
 
1466
1666
  @mount.setter
1467
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1667
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1468
1668
  pulumi.set(self, "mount", value)
1469
1669
 
1470
- @property
1670
+ @_builtins.property
1471
1671
  @pulumi.getter
1472
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1672
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1473
1673
  """
1474
1674
  The authentication engine's namespace. Conflicts with use_root_namespace
1475
1675
  """
1476
1676
  return pulumi.get(self, "namespace")
1477
1677
 
1478
1678
  @namespace.setter
1479
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1679
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1480
1680
  pulumi.set(self, "namespace", value)
1481
1681
 
1482
- @property
1682
+ @_builtins.property
1483
1683
  @pulumi.getter
1484
- def realm(self) -> Optional[pulumi.Input[builtins.str]]:
1684
+ def realm(self) -> Optional[pulumi.Input[_builtins.str]]:
1485
1685
  """
1486
1686
  The Kerberos server's authoritative authentication domain
1487
1687
  """
1488
1688
  return pulumi.get(self, "realm")
1489
1689
 
1490
1690
  @realm.setter
1491
- def realm(self, value: Optional[pulumi.Input[builtins.str]]):
1691
+ def realm(self, value: Optional[pulumi.Input[_builtins.str]]):
1492
1692
  pulumi.set(self, "realm", value)
1493
1693
 
1494
- @property
1694
+ @_builtins.property
1495
1695
  @pulumi.getter(name="removeInstanceName")
1496
- def remove_instance_name(self) -> Optional[pulumi.Input[builtins.bool]]:
1696
+ def remove_instance_name(self) -> Optional[pulumi.Input[_builtins.bool]]:
1497
1697
  """
1498
1698
  Strip the host from the username found in the keytab.
1499
1699
  """
1500
1700
  return pulumi.get(self, "remove_instance_name")
1501
1701
 
1502
1702
  @remove_instance_name.setter
1503
- def remove_instance_name(self, value: Optional[pulumi.Input[builtins.bool]]):
1703
+ def remove_instance_name(self, value: Optional[pulumi.Input[_builtins.bool]]):
1504
1704
  pulumi.set(self, "remove_instance_name", value)
1505
1705
 
1506
- @property
1706
+ @_builtins.property
1507
1707
  @pulumi.getter
1508
- def service(self) -> Optional[pulumi.Input[builtins.str]]:
1708
+ def service(self) -> Optional[pulumi.Input[_builtins.str]]:
1509
1709
  """
1510
1710
  The service principle name.
1511
1711
  """
1512
1712
  return pulumi.get(self, "service")
1513
1713
 
1514
1714
  @service.setter
1515
- def service(self, value: Optional[pulumi.Input[builtins.str]]):
1715
+ def service(self, value: Optional[pulumi.Input[_builtins.str]]):
1516
1716
  pulumi.set(self, "service", value)
1517
1717
 
1518
- @property
1718
+ @_builtins.property
1519
1719
  @pulumi.getter
1520
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
1720
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
1521
1721
  """
1522
1722
  Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1523
1723
  """
1524
1724
  return pulumi.get(self, "token")
1525
1725
 
1526
1726
  @token.setter
1527
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
1727
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
1528
1728
  pulumi.set(self, "token", value)
1529
1729
 
1530
- @property
1730
+ @_builtins.property
1531
1731
  @pulumi.getter(name="useRootNamespace")
1532
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1732
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1533
1733
  """
1534
1734
  Authenticate to the root Vault namespace. Conflicts with namespace
1535
1735
  """
1536
1736
  return pulumi.get(self, "use_root_namespace")
1537
1737
 
1538
1738
  @use_root_namespace.setter
1539
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1739
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1540
1740
  pulumi.set(self, "use_root_namespace", value)
1541
1741
 
1542
- @property
1742
+ @_builtins.property
1543
1743
  @pulumi.getter
1544
- def username(self) -> Optional[pulumi.Input[builtins.str]]:
1744
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
1545
1745
  """
1546
1746
  The username to login into Kerberos with.
1547
1747
  """
1548
1748
  return pulumi.get(self, "username")
1549
1749
 
1550
1750
  @username.setter
1551
- def username(self, value: Optional[pulumi.Input[builtins.str]]):
1751
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
1552
1752
  pulumi.set(self, "username", value)
1553
1753
 
1554
1754
 
1555
1755
  if not MYPY:
1556
1756
  class ProviderAuthLoginOciArgsDict(TypedDict):
1557
- auth_type: pulumi.Input[builtins.str]
1757
+ auth_type: pulumi.Input[_builtins.str]
1558
1758
  """
1559
1759
  Authentication type to use when getting OCI credentials.
1560
1760
  """
1561
- role: pulumi.Input[builtins.str]
1761
+ role: pulumi.Input[_builtins.str]
1562
1762
  """
1563
1763
  Name of the login role.
1564
1764
  """
1565
- mount: NotRequired[pulumi.Input[builtins.str]]
1765
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1566
1766
  """
1567
1767
  The path where the authentication engine is mounted.
1568
1768
  """
1569
- namespace: NotRequired[pulumi.Input[builtins.str]]
1769
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1570
1770
  """
1571
1771
  The authentication engine's namespace. Conflicts with use_root_namespace
1572
1772
  """
1573
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1773
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1574
1774
  """
1575
1775
  Authenticate to the root Vault namespace. Conflicts with namespace
1576
1776
  """
@@ -1580,17 +1780,17 @@ elif False:
1580
1780
  @pulumi.input_type
1581
1781
  class ProviderAuthLoginOciArgs:
1582
1782
  def __init__(__self__, *,
1583
- auth_type: pulumi.Input[builtins.str],
1584
- role: pulumi.Input[builtins.str],
1585
- mount: Optional[pulumi.Input[builtins.str]] = None,
1586
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1587
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
1588
- """
1589
- :param pulumi.Input[builtins.str] auth_type: Authentication type to use when getting OCI credentials.
1590
- :param pulumi.Input[builtins.str] role: Name of the login role.
1591
- :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1592
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1593
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1783
+ auth_type: pulumi.Input[_builtins.str],
1784
+ role: pulumi.Input[_builtins.str],
1785
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1786
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1787
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
1788
+ """
1789
+ :param pulumi.Input[_builtins.str] auth_type: Authentication type to use when getting OCI credentials.
1790
+ :param pulumi.Input[_builtins.str] role: Name of the login role.
1791
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1792
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1793
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1594
1794
  """
1595
1795
  pulumi.set(__self__, "auth_type", auth_type)
1596
1796
  pulumi.set(__self__, "role", role)
@@ -1601,90 +1801,90 @@ class ProviderAuthLoginOciArgs:
1601
1801
  if use_root_namespace is not None:
1602
1802
  pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1603
1803
 
1604
- @property
1804
+ @_builtins.property
1605
1805
  @pulumi.getter(name="authType")
1606
- def auth_type(self) -> pulumi.Input[builtins.str]:
1806
+ def auth_type(self) -> pulumi.Input[_builtins.str]:
1607
1807
  """
1608
1808
  Authentication type to use when getting OCI credentials.
1609
1809
  """
1610
1810
  return pulumi.get(self, "auth_type")
1611
1811
 
1612
1812
  @auth_type.setter
1613
- def auth_type(self, value: pulumi.Input[builtins.str]):
1813
+ def auth_type(self, value: pulumi.Input[_builtins.str]):
1614
1814
  pulumi.set(self, "auth_type", value)
1615
1815
 
1616
- @property
1816
+ @_builtins.property
1617
1817
  @pulumi.getter
1618
- def role(self) -> pulumi.Input[builtins.str]:
1818
+ def role(self) -> pulumi.Input[_builtins.str]:
1619
1819
  """
1620
1820
  Name of the login role.
1621
1821
  """
1622
1822
  return pulumi.get(self, "role")
1623
1823
 
1624
1824
  @role.setter
1625
- def role(self, value: pulumi.Input[builtins.str]):
1825
+ def role(self, value: pulumi.Input[_builtins.str]):
1626
1826
  pulumi.set(self, "role", value)
1627
1827
 
1628
- @property
1828
+ @_builtins.property
1629
1829
  @pulumi.getter
1630
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1830
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1631
1831
  """
1632
1832
  The path where the authentication engine is mounted.
1633
1833
  """
1634
1834
  return pulumi.get(self, "mount")
1635
1835
 
1636
1836
  @mount.setter
1637
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1837
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1638
1838
  pulumi.set(self, "mount", value)
1639
1839
 
1640
- @property
1840
+ @_builtins.property
1641
1841
  @pulumi.getter
1642
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1842
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1643
1843
  """
1644
1844
  The authentication engine's namespace. Conflicts with use_root_namespace
1645
1845
  """
1646
1846
  return pulumi.get(self, "namespace")
1647
1847
 
1648
1848
  @namespace.setter
1649
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1849
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1650
1850
  pulumi.set(self, "namespace", value)
1651
1851
 
1652
- @property
1852
+ @_builtins.property
1653
1853
  @pulumi.getter(name="useRootNamespace")
1654
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1854
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1655
1855
  """
1656
1856
  Authenticate to the root Vault namespace. Conflicts with namespace
1657
1857
  """
1658
1858
  return pulumi.get(self, "use_root_namespace")
1659
1859
 
1660
1860
  @use_root_namespace.setter
1661
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1861
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1662
1862
  pulumi.set(self, "use_root_namespace", value)
1663
1863
 
1664
1864
 
1665
1865
  if not MYPY:
1666
1866
  class ProviderAuthLoginOidcArgsDict(TypedDict):
1667
- role: pulumi.Input[builtins.str]
1867
+ role: pulumi.Input[_builtins.str]
1668
1868
  """
1669
1869
  Name of the login role.
1670
1870
  """
1671
- callback_address: NotRequired[pulumi.Input[builtins.str]]
1871
+ callback_address: NotRequired[pulumi.Input[_builtins.str]]
1672
1872
  """
1673
1873
  The callback address. Must be a valid URI without the path.
1674
1874
  """
1675
- callback_listener_address: NotRequired[pulumi.Input[builtins.str]]
1875
+ callback_listener_address: NotRequired[pulumi.Input[_builtins.str]]
1676
1876
  """
1677
1877
  The callback listener's address. Must be a valid URI without the path.
1678
1878
  """
1679
- mount: NotRequired[pulumi.Input[builtins.str]]
1879
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1680
1880
  """
1681
1881
  The path where the authentication engine is mounted.
1682
1882
  """
1683
- namespace: NotRequired[pulumi.Input[builtins.str]]
1883
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1684
1884
  """
1685
1885
  The authentication engine's namespace. Conflicts with use_root_namespace
1686
1886
  """
1687
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1887
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1688
1888
  """
1689
1889
  Authenticate to the root Vault namespace. Conflicts with namespace
1690
1890
  """
@@ -1694,19 +1894,19 @@ elif False:
1694
1894
  @pulumi.input_type
1695
1895
  class ProviderAuthLoginOidcArgs:
1696
1896
  def __init__(__self__, *,
1697
- role: pulumi.Input[builtins.str],
1698
- callback_address: Optional[pulumi.Input[builtins.str]] = None,
1699
- callback_listener_address: Optional[pulumi.Input[builtins.str]] = None,
1700
- mount: Optional[pulumi.Input[builtins.str]] = None,
1701
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1702
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
1703
- """
1704
- :param pulumi.Input[builtins.str] role: Name of the login role.
1705
- :param pulumi.Input[builtins.str] callback_address: The callback address. Must be a valid URI without the path.
1706
- :param pulumi.Input[builtins.str] callback_listener_address: The callback listener's address. Must be a valid URI without the path.
1707
- :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1708
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1709
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1897
+ role: pulumi.Input[_builtins.str],
1898
+ callback_address: Optional[pulumi.Input[_builtins.str]] = None,
1899
+ callback_listener_address: Optional[pulumi.Input[_builtins.str]] = None,
1900
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
1901
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1902
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
1903
+ """
1904
+ :param pulumi.Input[_builtins.str] role: Name of the login role.
1905
+ :param pulumi.Input[_builtins.str] callback_address: The callback address. Must be a valid URI without the path.
1906
+ :param pulumi.Input[_builtins.str] callback_listener_address: The callback listener's address. Must be a valid URI without the path.
1907
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
1908
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1909
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1710
1910
  """
1711
1911
  pulumi.set(__self__, "role", role)
1712
1912
  if callback_address is not None:
@@ -1720,98 +1920,98 @@ class ProviderAuthLoginOidcArgs:
1720
1920
  if use_root_namespace is not None:
1721
1921
  pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1722
1922
 
1723
- @property
1923
+ @_builtins.property
1724
1924
  @pulumi.getter
1725
- def role(self) -> pulumi.Input[builtins.str]:
1925
+ def role(self) -> pulumi.Input[_builtins.str]:
1726
1926
  """
1727
1927
  Name of the login role.
1728
1928
  """
1729
1929
  return pulumi.get(self, "role")
1730
1930
 
1731
1931
  @role.setter
1732
- def role(self, value: pulumi.Input[builtins.str]):
1932
+ def role(self, value: pulumi.Input[_builtins.str]):
1733
1933
  pulumi.set(self, "role", value)
1734
1934
 
1735
- @property
1935
+ @_builtins.property
1736
1936
  @pulumi.getter(name="callbackAddress")
1737
- def callback_address(self) -> Optional[pulumi.Input[builtins.str]]:
1937
+ def callback_address(self) -> Optional[pulumi.Input[_builtins.str]]:
1738
1938
  """
1739
1939
  The callback address. Must be a valid URI without the path.
1740
1940
  """
1741
1941
  return pulumi.get(self, "callback_address")
1742
1942
 
1743
1943
  @callback_address.setter
1744
- def callback_address(self, value: Optional[pulumi.Input[builtins.str]]):
1944
+ def callback_address(self, value: Optional[pulumi.Input[_builtins.str]]):
1745
1945
  pulumi.set(self, "callback_address", value)
1746
1946
 
1747
- @property
1947
+ @_builtins.property
1748
1948
  @pulumi.getter(name="callbackListenerAddress")
1749
- def callback_listener_address(self) -> Optional[pulumi.Input[builtins.str]]:
1949
+ def callback_listener_address(self) -> Optional[pulumi.Input[_builtins.str]]:
1750
1950
  """
1751
1951
  The callback listener's address. Must be a valid URI without the path.
1752
1952
  """
1753
1953
  return pulumi.get(self, "callback_listener_address")
1754
1954
 
1755
1955
  @callback_listener_address.setter
1756
- def callback_listener_address(self, value: Optional[pulumi.Input[builtins.str]]):
1956
+ def callback_listener_address(self, value: Optional[pulumi.Input[_builtins.str]]):
1757
1957
  pulumi.set(self, "callback_listener_address", value)
1758
1958
 
1759
- @property
1959
+ @_builtins.property
1760
1960
  @pulumi.getter
1761
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1961
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1762
1962
  """
1763
1963
  The path where the authentication engine is mounted.
1764
1964
  """
1765
1965
  return pulumi.get(self, "mount")
1766
1966
 
1767
1967
  @mount.setter
1768
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1968
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1769
1969
  pulumi.set(self, "mount", value)
1770
1970
 
1771
- @property
1971
+ @_builtins.property
1772
1972
  @pulumi.getter
1773
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1973
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1774
1974
  """
1775
1975
  The authentication engine's namespace. Conflicts with use_root_namespace
1776
1976
  """
1777
1977
  return pulumi.get(self, "namespace")
1778
1978
 
1779
1979
  @namespace.setter
1780
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1980
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1781
1981
  pulumi.set(self, "namespace", value)
1782
1982
 
1783
- @property
1983
+ @_builtins.property
1784
1984
  @pulumi.getter(name="useRootNamespace")
1785
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1985
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1786
1986
  """
1787
1987
  Authenticate to the root Vault namespace. Conflicts with namespace
1788
1988
  """
1789
1989
  return pulumi.get(self, "use_root_namespace")
1790
1990
 
1791
1991
  @use_root_namespace.setter
1792
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1992
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1793
1993
  pulumi.set(self, "use_root_namespace", value)
1794
1994
 
1795
1995
 
1796
1996
  if not MYPY:
1797
1997
  class ProviderAuthLoginRadiusArgsDict(TypedDict):
1798
- mount: NotRequired[pulumi.Input[builtins.str]]
1998
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1799
1999
  """
1800
2000
  The path where the authentication engine is mounted.
1801
2001
  """
1802
- namespace: NotRequired[pulumi.Input[builtins.str]]
2002
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1803
2003
  """
1804
2004
  The authentication engine's namespace. Conflicts with use_root_namespace
1805
2005
  """
1806
- password: NotRequired[pulumi.Input[builtins.str]]
2006
+ password: NotRequired[pulumi.Input[_builtins.str]]
1807
2007
  """
1808
2008
  The Radius password for username.
1809
2009
  """
1810
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
2010
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1811
2011
  """
1812
2012
  Authenticate to the root Vault namespace. Conflicts with namespace
1813
2013
  """
1814
- username: NotRequired[pulumi.Input[builtins.str]]
2014
+ username: NotRequired[pulumi.Input[_builtins.str]]
1815
2015
  """
1816
2016
  The Radius username.
1817
2017
  """
@@ -1821,17 +2021,17 @@ elif False:
1821
2021
  @pulumi.input_type
1822
2022
  class ProviderAuthLoginRadiusArgs:
1823
2023
  def __init__(__self__, *,
1824
- mount: Optional[pulumi.Input[builtins.str]] = None,
1825
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1826
- password: Optional[pulumi.Input[builtins.str]] = None,
1827
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None,
1828
- username: Optional[pulumi.Input[builtins.str]] = None):
1829
- """
1830
- :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1831
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1832
- :param pulumi.Input[builtins.str] password: The Radius password for username.
1833
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1834
- :param pulumi.Input[builtins.str] username: The Radius username.
2024
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
2025
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
2026
+ password: Optional[pulumi.Input[_builtins.str]] = None,
2027
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
2028
+ username: Optional[pulumi.Input[_builtins.str]] = None):
2029
+ """
2030
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
2031
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
2032
+ :param pulumi.Input[_builtins.str] password: The Radius password for username.
2033
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
2034
+ :param pulumi.Input[_builtins.str] username: The Radius username.
1835
2035
  """
1836
2036
  if mount is not None:
1837
2037
  pulumi.set(__self__, "mount", mount)
@@ -1844,78 +2044,78 @@ class ProviderAuthLoginRadiusArgs:
1844
2044
  if username is not None:
1845
2045
  pulumi.set(__self__, "username", username)
1846
2046
 
1847
- @property
2047
+ @_builtins.property
1848
2048
  @pulumi.getter
1849
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
2049
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
1850
2050
  """
1851
2051
  The path where the authentication engine is mounted.
1852
2052
  """
1853
2053
  return pulumi.get(self, "mount")
1854
2054
 
1855
2055
  @mount.setter
1856
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
2056
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
1857
2057
  pulumi.set(self, "mount", value)
1858
2058
 
1859
- @property
2059
+ @_builtins.property
1860
2060
  @pulumi.getter
1861
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
2061
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1862
2062
  """
1863
2063
  The authentication engine's namespace. Conflicts with use_root_namespace
1864
2064
  """
1865
2065
  return pulumi.get(self, "namespace")
1866
2066
 
1867
2067
  @namespace.setter
1868
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
2068
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1869
2069
  pulumi.set(self, "namespace", value)
1870
2070
 
1871
- @property
2071
+ @_builtins.property
1872
2072
  @pulumi.getter
1873
- def password(self) -> Optional[pulumi.Input[builtins.str]]:
2073
+ def password(self) -> Optional[pulumi.Input[_builtins.str]]:
1874
2074
  """
1875
2075
  The Radius password for username.
1876
2076
  """
1877
2077
  return pulumi.get(self, "password")
1878
2078
 
1879
2079
  @password.setter
1880
- def password(self, value: Optional[pulumi.Input[builtins.str]]):
2080
+ def password(self, value: Optional[pulumi.Input[_builtins.str]]):
1881
2081
  pulumi.set(self, "password", value)
1882
2082
 
1883
- @property
2083
+ @_builtins.property
1884
2084
  @pulumi.getter(name="useRootNamespace")
1885
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
2085
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1886
2086
  """
1887
2087
  Authenticate to the root Vault namespace. Conflicts with namespace
1888
2088
  """
1889
2089
  return pulumi.get(self, "use_root_namespace")
1890
2090
 
1891
2091
  @use_root_namespace.setter
1892
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
2092
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1893
2093
  pulumi.set(self, "use_root_namespace", value)
1894
2094
 
1895
- @property
2095
+ @_builtins.property
1896
2096
  @pulumi.getter
1897
- def username(self) -> Optional[pulumi.Input[builtins.str]]:
2097
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
1898
2098
  """
1899
2099
  The Radius username.
1900
2100
  """
1901
2101
  return pulumi.get(self, "username")
1902
2102
 
1903
2103
  @username.setter
1904
- def username(self, value: Optional[pulumi.Input[builtins.str]]):
2104
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
1905
2105
  pulumi.set(self, "username", value)
1906
2106
 
1907
2107
 
1908
2108
  if not MYPY:
1909
2109
  class ProviderAuthLoginTokenFileArgsDict(TypedDict):
1910
- filename: NotRequired[pulumi.Input[builtins.str]]
2110
+ filename: NotRequired[pulumi.Input[_builtins.str]]
1911
2111
  """
1912
2112
  The name of a file containing a single line that is a valid Vault token
1913
2113
  """
1914
- namespace: NotRequired[pulumi.Input[builtins.str]]
2114
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1915
2115
  """
1916
2116
  The authentication engine's namespace. Conflicts with use_root_namespace
1917
2117
  """
1918
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
2118
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1919
2119
  """
1920
2120
  Authenticate to the root Vault namespace. Conflicts with namespace
1921
2121
  """
@@ -1925,13 +2125,13 @@ elif False:
1925
2125
  @pulumi.input_type
1926
2126
  class ProviderAuthLoginTokenFileArgs:
1927
2127
  def __init__(__self__, *,
1928
- filename: Optional[pulumi.Input[builtins.str]] = None,
1929
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1930
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
2128
+ filename: Optional[pulumi.Input[_builtins.str]] = None,
2129
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
2130
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None):
1931
2131
  """
1932
- :param pulumi.Input[builtins.str] filename: The name of a file containing a single line that is a valid Vault token
1933
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1934
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
2132
+ :param pulumi.Input[_builtins.str] filename: The name of a file containing a single line that is a valid Vault token
2133
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
2134
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1935
2135
  """
1936
2136
  if filename is not None:
1937
2137
  pulumi.set(__self__, "filename", filename)
@@ -1940,66 +2140,66 @@ class ProviderAuthLoginTokenFileArgs:
1940
2140
  if use_root_namespace is not None:
1941
2141
  pulumi.set(__self__, "use_root_namespace", use_root_namespace)
1942
2142
 
1943
- @property
2143
+ @_builtins.property
1944
2144
  @pulumi.getter
1945
- def filename(self) -> Optional[pulumi.Input[builtins.str]]:
2145
+ def filename(self) -> Optional[pulumi.Input[_builtins.str]]:
1946
2146
  """
1947
2147
  The name of a file containing a single line that is a valid Vault token
1948
2148
  """
1949
2149
  return pulumi.get(self, "filename")
1950
2150
 
1951
2151
  @filename.setter
1952
- def filename(self, value: Optional[pulumi.Input[builtins.str]]):
2152
+ def filename(self, value: Optional[pulumi.Input[_builtins.str]]):
1953
2153
  pulumi.set(self, "filename", value)
1954
2154
 
1955
- @property
2155
+ @_builtins.property
1956
2156
  @pulumi.getter
1957
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
2157
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
1958
2158
  """
1959
2159
  The authentication engine's namespace. Conflicts with use_root_namespace
1960
2160
  """
1961
2161
  return pulumi.get(self, "namespace")
1962
2162
 
1963
2163
  @namespace.setter
1964
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
2164
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
1965
2165
  pulumi.set(self, "namespace", value)
1966
2166
 
1967
- @property
2167
+ @_builtins.property
1968
2168
  @pulumi.getter(name="useRootNamespace")
1969
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
2169
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
1970
2170
  """
1971
2171
  Authenticate to the root Vault namespace. Conflicts with namespace
1972
2172
  """
1973
2173
  return pulumi.get(self, "use_root_namespace")
1974
2174
 
1975
2175
  @use_root_namespace.setter
1976
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
2176
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
1977
2177
  pulumi.set(self, "use_root_namespace", value)
1978
2178
 
1979
2179
 
1980
2180
  if not MYPY:
1981
2181
  class ProviderAuthLoginUserpassArgsDict(TypedDict):
1982
- mount: NotRequired[pulumi.Input[builtins.str]]
2182
+ mount: NotRequired[pulumi.Input[_builtins.str]]
1983
2183
  """
1984
2184
  The path where the authentication engine is mounted.
1985
2185
  """
1986
- namespace: NotRequired[pulumi.Input[builtins.str]]
2186
+ namespace: NotRequired[pulumi.Input[_builtins.str]]
1987
2187
  """
1988
2188
  The authentication engine's namespace. Conflicts with use_root_namespace
1989
2189
  """
1990
- password: NotRequired[pulumi.Input[builtins.str]]
2190
+ password: NotRequired[pulumi.Input[_builtins.str]]
1991
2191
  """
1992
2192
  Login with password
1993
2193
  """
1994
- password_file: NotRequired[pulumi.Input[builtins.str]]
2194
+ password_file: NotRequired[pulumi.Input[_builtins.str]]
1995
2195
  """
1996
2196
  Login with password from a file
1997
2197
  """
1998
- use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
2198
+ use_root_namespace: NotRequired[pulumi.Input[_builtins.bool]]
1999
2199
  """
2000
2200
  Authenticate to the root Vault namespace. Conflicts with namespace
2001
2201
  """
2002
- username: NotRequired[pulumi.Input[builtins.str]]
2202
+ username: NotRequired[pulumi.Input[_builtins.str]]
2003
2203
  """
2004
2204
  Login with username
2005
2205
  """
@@ -2009,19 +2209,19 @@ elif False:
2009
2209
  @pulumi.input_type
2010
2210
  class ProviderAuthLoginUserpassArgs:
2011
2211
  def __init__(__self__, *,
2012
- mount: Optional[pulumi.Input[builtins.str]] = None,
2013
- namespace: Optional[pulumi.Input[builtins.str]] = None,
2014
- password: Optional[pulumi.Input[builtins.str]] = None,
2015
- password_file: Optional[pulumi.Input[builtins.str]] = None,
2016
- use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None,
2017
- username: Optional[pulumi.Input[builtins.str]] = None):
2018
- """
2019
- :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
2020
- :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
2021
- :param pulumi.Input[builtins.str] password: Login with password
2022
- :param pulumi.Input[builtins.str] password_file: Login with password from a file
2023
- :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
2024
- :param pulumi.Input[builtins.str] username: Login with username
2212
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
2213
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
2214
+ password: Optional[pulumi.Input[_builtins.str]] = None,
2215
+ password_file: Optional[pulumi.Input[_builtins.str]] = None,
2216
+ use_root_namespace: Optional[pulumi.Input[_builtins.bool]] = None,
2217
+ username: Optional[pulumi.Input[_builtins.str]] = None):
2218
+ """
2219
+ :param pulumi.Input[_builtins.str] mount: The path where the authentication engine is mounted.
2220
+ :param pulumi.Input[_builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
2221
+ :param pulumi.Input[_builtins.str] password: Login with password
2222
+ :param pulumi.Input[_builtins.str] password_file: Login with password from a file
2223
+ :param pulumi.Input[_builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
2224
+ :param pulumi.Input[_builtins.str] username: Login with username
2025
2225
  """
2026
2226
  if mount is not None:
2027
2227
  pulumi.set(__self__, "mount", mount)
@@ -2036,86 +2236,86 @@ class ProviderAuthLoginUserpassArgs:
2036
2236
  if username is not None:
2037
2237
  pulumi.set(__self__, "username", username)
2038
2238
 
2039
- @property
2239
+ @_builtins.property
2040
2240
  @pulumi.getter
2041
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
2241
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
2042
2242
  """
2043
2243
  The path where the authentication engine is mounted.
2044
2244
  """
2045
2245
  return pulumi.get(self, "mount")
2046
2246
 
2047
2247
  @mount.setter
2048
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
2248
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
2049
2249
  pulumi.set(self, "mount", value)
2050
2250
 
2051
- @property
2251
+ @_builtins.property
2052
2252
  @pulumi.getter
2053
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
2253
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
2054
2254
  """
2055
2255
  The authentication engine's namespace. Conflicts with use_root_namespace
2056
2256
  """
2057
2257
  return pulumi.get(self, "namespace")
2058
2258
 
2059
2259
  @namespace.setter
2060
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
2260
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
2061
2261
  pulumi.set(self, "namespace", value)
2062
2262
 
2063
- @property
2263
+ @_builtins.property
2064
2264
  @pulumi.getter
2065
- def password(self) -> Optional[pulumi.Input[builtins.str]]:
2265
+ def password(self) -> Optional[pulumi.Input[_builtins.str]]:
2066
2266
  """
2067
2267
  Login with password
2068
2268
  """
2069
2269
  return pulumi.get(self, "password")
2070
2270
 
2071
2271
  @password.setter
2072
- def password(self, value: Optional[pulumi.Input[builtins.str]]):
2272
+ def password(self, value: Optional[pulumi.Input[_builtins.str]]):
2073
2273
  pulumi.set(self, "password", value)
2074
2274
 
2075
- @property
2275
+ @_builtins.property
2076
2276
  @pulumi.getter(name="passwordFile")
2077
- def password_file(self) -> Optional[pulumi.Input[builtins.str]]:
2277
+ def password_file(self) -> Optional[pulumi.Input[_builtins.str]]:
2078
2278
  """
2079
2279
  Login with password from a file
2080
2280
  """
2081
2281
  return pulumi.get(self, "password_file")
2082
2282
 
2083
2283
  @password_file.setter
2084
- def password_file(self, value: Optional[pulumi.Input[builtins.str]]):
2284
+ def password_file(self, value: Optional[pulumi.Input[_builtins.str]]):
2085
2285
  pulumi.set(self, "password_file", value)
2086
2286
 
2087
- @property
2287
+ @_builtins.property
2088
2288
  @pulumi.getter(name="useRootNamespace")
2089
- def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
2289
+ def use_root_namespace(self) -> Optional[pulumi.Input[_builtins.bool]]:
2090
2290
  """
2091
2291
  Authenticate to the root Vault namespace. Conflicts with namespace
2092
2292
  """
2093
2293
  return pulumi.get(self, "use_root_namespace")
2094
2294
 
2095
2295
  @use_root_namespace.setter
2096
- def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
2296
+ def use_root_namespace(self, value: Optional[pulumi.Input[_builtins.bool]]):
2097
2297
  pulumi.set(self, "use_root_namespace", value)
2098
2298
 
2099
- @property
2299
+ @_builtins.property
2100
2300
  @pulumi.getter
2101
- def username(self) -> Optional[pulumi.Input[builtins.str]]:
2301
+ def username(self) -> Optional[pulumi.Input[_builtins.str]]:
2102
2302
  """
2103
2303
  Login with username
2104
2304
  """
2105
2305
  return pulumi.get(self, "username")
2106
2306
 
2107
2307
  @username.setter
2108
- def username(self, value: Optional[pulumi.Input[builtins.str]]):
2308
+ def username(self, value: Optional[pulumi.Input[_builtins.str]]):
2109
2309
  pulumi.set(self, "username", value)
2110
2310
 
2111
2311
 
2112
2312
  if not MYPY:
2113
2313
  class ProviderClientAuthArgsDict(TypedDict):
2114
- cert_file: pulumi.Input[builtins.str]
2314
+ cert_file: pulumi.Input[_builtins.str]
2115
2315
  """
2116
2316
  Path to a file containing the client certificate.
2117
2317
  """
2118
- key_file: pulumi.Input[builtins.str]
2318
+ key_file: pulumi.Input[_builtins.str]
2119
2319
  """
2120
2320
  Path to a file containing the private key that the certificate was issued for.
2121
2321
  """
@@ -2125,47 +2325,47 @@ elif False:
2125
2325
  @pulumi.input_type
2126
2326
  class ProviderClientAuthArgs:
2127
2327
  def __init__(__self__, *,
2128
- cert_file: pulumi.Input[builtins.str],
2129
- key_file: pulumi.Input[builtins.str]):
2328
+ cert_file: pulumi.Input[_builtins.str],
2329
+ key_file: pulumi.Input[_builtins.str]):
2130
2330
  """
2131
- :param pulumi.Input[builtins.str] cert_file: Path to a file containing the client certificate.
2132
- :param pulumi.Input[builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
2331
+ :param pulumi.Input[_builtins.str] cert_file: Path to a file containing the client certificate.
2332
+ :param pulumi.Input[_builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
2133
2333
  """
2134
2334
  pulumi.set(__self__, "cert_file", cert_file)
2135
2335
  pulumi.set(__self__, "key_file", key_file)
2136
2336
 
2137
- @property
2337
+ @_builtins.property
2138
2338
  @pulumi.getter(name="certFile")
2139
- def cert_file(self) -> pulumi.Input[builtins.str]:
2339
+ def cert_file(self) -> pulumi.Input[_builtins.str]:
2140
2340
  """
2141
2341
  Path to a file containing the client certificate.
2142
2342
  """
2143
2343
  return pulumi.get(self, "cert_file")
2144
2344
 
2145
2345
  @cert_file.setter
2146
- def cert_file(self, value: pulumi.Input[builtins.str]):
2346
+ def cert_file(self, value: pulumi.Input[_builtins.str]):
2147
2347
  pulumi.set(self, "cert_file", value)
2148
2348
 
2149
- @property
2349
+ @_builtins.property
2150
2350
  @pulumi.getter(name="keyFile")
2151
- def key_file(self) -> pulumi.Input[builtins.str]:
2351
+ def key_file(self) -> pulumi.Input[_builtins.str]:
2152
2352
  """
2153
2353
  Path to a file containing the private key that the certificate was issued for.
2154
2354
  """
2155
2355
  return pulumi.get(self, "key_file")
2156
2356
 
2157
2357
  @key_file.setter
2158
- def key_file(self, value: pulumi.Input[builtins.str]):
2358
+ def key_file(self, value: pulumi.Input[_builtins.str]):
2159
2359
  pulumi.set(self, "key_file", value)
2160
2360
 
2161
2361
 
2162
2362
  if not MYPY:
2163
2363
  class ProviderHeaderArgsDict(TypedDict):
2164
- name: pulumi.Input[builtins.str]
2364
+ name: pulumi.Input[_builtins.str]
2165
2365
  """
2166
2366
  The header name
2167
2367
  """
2168
- value: pulumi.Input[builtins.str]
2368
+ value: pulumi.Input[_builtins.str]
2169
2369
  """
2170
2370
  The header value
2171
2371
  """
@@ -2175,47 +2375,47 @@ elif False:
2175
2375
  @pulumi.input_type
2176
2376
  class ProviderHeaderArgs:
2177
2377
  def __init__(__self__, *,
2178
- name: pulumi.Input[builtins.str],
2179
- value: pulumi.Input[builtins.str]):
2378
+ name: pulumi.Input[_builtins.str],
2379
+ value: pulumi.Input[_builtins.str]):
2180
2380
  """
2181
- :param pulumi.Input[builtins.str] name: The header name
2182
- :param pulumi.Input[builtins.str] value: The header value
2381
+ :param pulumi.Input[_builtins.str] name: The header name
2382
+ :param pulumi.Input[_builtins.str] value: The header value
2183
2383
  """
2184
2384
  pulumi.set(__self__, "name", name)
2185
2385
  pulumi.set(__self__, "value", value)
2186
2386
 
2187
- @property
2387
+ @_builtins.property
2188
2388
  @pulumi.getter
2189
- def name(self) -> pulumi.Input[builtins.str]:
2389
+ def name(self) -> pulumi.Input[_builtins.str]:
2190
2390
  """
2191
2391
  The header name
2192
2392
  """
2193
2393
  return pulumi.get(self, "name")
2194
2394
 
2195
2395
  @name.setter
2196
- def name(self, value: pulumi.Input[builtins.str]):
2396
+ def name(self, value: pulumi.Input[_builtins.str]):
2197
2397
  pulumi.set(self, "name", value)
2198
2398
 
2199
- @property
2399
+ @_builtins.property
2200
2400
  @pulumi.getter
2201
- def value(self) -> pulumi.Input[builtins.str]:
2401
+ def value(self) -> pulumi.Input[_builtins.str]:
2202
2402
  """
2203
2403
  The header value
2204
2404
  """
2205
2405
  return pulumi.get(self, "value")
2206
2406
 
2207
2407
  @value.setter
2208
- def value(self, value: pulumi.Input[builtins.str]):
2408
+ def value(self, value: pulumi.Input[_builtins.str]):
2209
2409
  pulumi.set(self, "value", value)
2210
2410
 
2211
2411
 
2212
2412
  if not MYPY:
2213
2413
  class GetPolicyDocumentRuleArgsDict(TypedDict):
2214
- capabilities: Sequence[builtins.str]
2414
+ capabilities: Sequence[_builtins.str]
2215
2415
  """
2216
2416
  A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2217
2417
  """
2218
- path: builtins.str
2418
+ path: _builtins.str
2219
2419
  """
2220
2420
  A path in Vault that this rule applies to.
2221
2421
  """
@@ -2227,23 +2427,23 @@ if not MYPY:
2227
2427
  """
2228
2428
  Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
2229
2429
  """
2230
- description: NotRequired[builtins.str]
2430
+ description: NotRequired[_builtins.str]
2231
2431
  """
2232
2432
  Description of the rule. Will be added as a comment to rendered rule.
2233
2433
  """
2234
- max_wrapping_ttl: NotRequired[builtins.str]
2434
+ max_wrapping_ttl: NotRequired[_builtins.str]
2235
2435
  """
2236
2436
  The maximum allowed TTL that clients can specify for a wrapped response.
2237
2437
  """
2238
- min_wrapping_ttl: NotRequired[builtins.str]
2438
+ min_wrapping_ttl: NotRequired[_builtins.str]
2239
2439
  """
2240
2440
  The minimum allowed TTL that clients can specify for a wrapped response.
2241
2441
  """
2242
- required_parameters: NotRequired[Sequence[builtins.str]]
2442
+ required_parameters: NotRequired[Sequence[_builtins.str]]
2243
2443
  """
2244
2444
  A list of parameters that must be specified.
2245
2445
  """
2246
- subscribe_event_types: NotRequired[Sequence[builtins.str]]
2446
+ subscribe_event_types: NotRequired[Sequence[_builtins.str]]
2247
2447
  """
2248
2448
  A list of event types to subscribe to when using `subscribe` capability.
2249
2449
  """
@@ -2253,25 +2453,25 @@ elif False:
2253
2453
  @pulumi.input_type
2254
2454
  class GetPolicyDocumentRuleArgs:
2255
2455
  def __init__(__self__, *,
2256
- capabilities: Sequence[builtins.str],
2257
- path: builtins.str,
2456
+ capabilities: Sequence[_builtins.str],
2457
+ path: _builtins.str,
2258
2458
  allowed_parameters: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']] = None,
2259
2459
  denied_parameters: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']] = None,
2260
- description: Optional[builtins.str] = None,
2261
- max_wrapping_ttl: Optional[builtins.str] = None,
2262
- min_wrapping_ttl: Optional[builtins.str] = None,
2263
- required_parameters: Optional[Sequence[builtins.str]] = None,
2264
- subscribe_event_types: Optional[Sequence[builtins.str]] = None):
2265
- """
2266
- :param Sequence[builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2267
- :param builtins.str path: A path in Vault that this rule applies to.
2460
+ description: Optional[_builtins.str] = None,
2461
+ max_wrapping_ttl: Optional[_builtins.str] = None,
2462
+ min_wrapping_ttl: Optional[_builtins.str] = None,
2463
+ required_parameters: Optional[Sequence[_builtins.str]] = None,
2464
+ subscribe_event_types: Optional[Sequence[_builtins.str]] = None):
2465
+ """
2466
+ :param Sequence[_builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2467
+ :param _builtins.str path: A path in Vault that this rule applies to.
2268
2468
  :param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
2269
2469
  :param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
2270
- :param builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
2271
- :param builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
2272
- :param builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
2273
- :param Sequence[builtins.str] required_parameters: A list of parameters that must be specified.
2274
- :param Sequence[builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
2470
+ :param _builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
2471
+ :param _builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
2472
+ :param _builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
2473
+ :param Sequence[_builtins.str] required_parameters: A list of parameters that must be specified.
2474
+ :param Sequence[_builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
2275
2475
  """
2276
2476
  pulumi.set(__self__, "capabilities", capabilities)
2277
2477
  pulumi.set(__self__, "path", path)
@@ -2290,31 +2490,31 @@ class GetPolicyDocumentRuleArgs:
2290
2490
  if subscribe_event_types is not None:
2291
2491
  pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
2292
2492
 
2293
- @property
2493
+ @_builtins.property
2294
2494
  @pulumi.getter
2295
- def capabilities(self) -> Sequence[builtins.str]:
2495
+ def capabilities(self) -> Sequence[_builtins.str]:
2296
2496
  """
2297
2497
  A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2298
2498
  """
2299
2499
  return pulumi.get(self, "capabilities")
2300
2500
 
2301
2501
  @capabilities.setter
2302
- def capabilities(self, value: Sequence[builtins.str]):
2502
+ def capabilities(self, value: Sequence[_builtins.str]):
2303
2503
  pulumi.set(self, "capabilities", value)
2304
2504
 
2305
- @property
2505
+ @_builtins.property
2306
2506
  @pulumi.getter
2307
- def path(self) -> builtins.str:
2507
+ def path(self) -> _builtins.str:
2308
2508
  """
2309
2509
  A path in Vault that this rule applies to.
2310
2510
  """
2311
2511
  return pulumi.get(self, "path")
2312
2512
 
2313
2513
  @path.setter
2314
- def path(self, value: builtins.str):
2514
+ def path(self, value: _builtins.str):
2315
2515
  pulumi.set(self, "path", value)
2316
2516
 
2317
- @property
2517
+ @_builtins.property
2318
2518
  @pulumi.getter(name="allowedParameters")
2319
2519
  def allowed_parameters(self) -> Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']]:
2320
2520
  """
@@ -2326,7 +2526,7 @@ class GetPolicyDocumentRuleArgs:
2326
2526
  def allowed_parameters(self, value: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']]):
2327
2527
  pulumi.set(self, "allowed_parameters", value)
2328
2528
 
2329
- @property
2529
+ @_builtins.property
2330
2530
  @pulumi.getter(name="deniedParameters")
2331
2531
  def denied_parameters(self) -> Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']]:
2332
2532
  """
@@ -2338,74 +2538,74 @@ class GetPolicyDocumentRuleArgs:
2338
2538
  def denied_parameters(self, value: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']]):
2339
2539
  pulumi.set(self, "denied_parameters", value)
2340
2540
 
2341
- @property
2541
+ @_builtins.property
2342
2542
  @pulumi.getter
2343
- def description(self) -> Optional[builtins.str]:
2543
+ def description(self) -> Optional[_builtins.str]:
2344
2544
  """
2345
2545
  Description of the rule. Will be added as a comment to rendered rule.
2346
2546
  """
2347
2547
  return pulumi.get(self, "description")
2348
2548
 
2349
2549
  @description.setter
2350
- def description(self, value: Optional[builtins.str]):
2550
+ def description(self, value: Optional[_builtins.str]):
2351
2551
  pulumi.set(self, "description", value)
2352
2552
 
2353
- @property
2553
+ @_builtins.property
2354
2554
  @pulumi.getter(name="maxWrappingTtl")
2355
- def max_wrapping_ttl(self) -> Optional[builtins.str]:
2555
+ def max_wrapping_ttl(self) -> Optional[_builtins.str]:
2356
2556
  """
2357
2557
  The maximum allowed TTL that clients can specify for a wrapped response.
2358
2558
  """
2359
2559
  return pulumi.get(self, "max_wrapping_ttl")
2360
2560
 
2361
2561
  @max_wrapping_ttl.setter
2362
- def max_wrapping_ttl(self, value: Optional[builtins.str]):
2562
+ def max_wrapping_ttl(self, value: Optional[_builtins.str]):
2363
2563
  pulumi.set(self, "max_wrapping_ttl", value)
2364
2564
 
2365
- @property
2565
+ @_builtins.property
2366
2566
  @pulumi.getter(name="minWrappingTtl")
2367
- def min_wrapping_ttl(self) -> Optional[builtins.str]:
2567
+ def min_wrapping_ttl(self) -> Optional[_builtins.str]:
2368
2568
  """
2369
2569
  The minimum allowed TTL that clients can specify for a wrapped response.
2370
2570
  """
2371
2571
  return pulumi.get(self, "min_wrapping_ttl")
2372
2572
 
2373
2573
  @min_wrapping_ttl.setter
2374
- def min_wrapping_ttl(self, value: Optional[builtins.str]):
2574
+ def min_wrapping_ttl(self, value: Optional[_builtins.str]):
2375
2575
  pulumi.set(self, "min_wrapping_ttl", value)
2376
2576
 
2377
- @property
2577
+ @_builtins.property
2378
2578
  @pulumi.getter(name="requiredParameters")
2379
- def required_parameters(self) -> Optional[Sequence[builtins.str]]:
2579
+ def required_parameters(self) -> Optional[Sequence[_builtins.str]]:
2380
2580
  """
2381
2581
  A list of parameters that must be specified.
2382
2582
  """
2383
2583
  return pulumi.get(self, "required_parameters")
2384
2584
 
2385
2585
  @required_parameters.setter
2386
- def required_parameters(self, value: Optional[Sequence[builtins.str]]):
2586
+ def required_parameters(self, value: Optional[Sequence[_builtins.str]]):
2387
2587
  pulumi.set(self, "required_parameters", value)
2388
2588
 
2389
- @property
2589
+ @_builtins.property
2390
2590
  @pulumi.getter(name="subscribeEventTypes")
2391
- def subscribe_event_types(self) -> Optional[Sequence[builtins.str]]:
2591
+ def subscribe_event_types(self) -> Optional[Sequence[_builtins.str]]:
2392
2592
  """
2393
2593
  A list of event types to subscribe to when using `subscribe` capability.
2394
2594
  """
2395
2595
  return pulumi.get(self, "subscribe_event_types")
2396
2596
 
2397
2597
  @subscribe_event_types.setter
2398
- def subscribe_event_types(self, value: Optional[Sequence[builtins.str]]):
2598
+ def subscribe_event_types(self, value: Optional[Sequence[_builtins.str]]):
2399
2599
  pulumi.set(self, "subscribe_event_types", value)
2400
2600
 
2401
2601
 
2402
2602
  if not MYPY:
2403
2603
  class GetPolicyDocumentRuleAllowedParameterArgsDict(TypedDict):
2404
- key: builtins.str
2604
+ key: _builtins.str
2405
2605
  """
2406
2606
  Name of permitted key.
2407
2607
  """
2408
- values: Sequence[builtins.str]
2608
+ values: Sequence[_builtins.str]
2409
2609
  """
2410
2610
  A list of values what are permitted by policy rule.
2411
2611
  """
@@ -2415,47 +2615,47 @@ elif False:
2415
2615
  @pulumi.input_type
2416
2616
  class GetPolicyDocumentRuleAllowedParameterArgs:
2417
2617
  def __init__(__self__, *,
2418
- key: builtins.str,
2419
- values: Sequence[builtins.str]):
2618
+ key: _builtins.str,
2619
+ values: Sequence[_builtins.str]):
2420
2620
  """
2421
- :param builtins.str key: Name of permitted key.
2422
- :param Sequence[builtins.str] values: A list of values what are permitted by policy rule.
2621
+ :param _builtins.str key: Name of permitted key.
2622
+ :param Sequence[_builtins.str] values: A list of values what are permitted by policy rule.
2423
2623
  """
2424
2624
  pulumi.set(__self__, "key", key)
2425
2625
  pulumi.set(__self__, "values", values)
2426
2626
 
2427
- @property
2627
+ @_builtins.property
2428
2628
  @pulumi.getter
2429
- def key(self) -> builtins.str:
2629
+ def key(self) -> _builtins.str:
2430
2630
  """
2431
2631
  Name of permitted key.
2432
2632
  """
2433
2633
  return pulumi.get(self, "key")
2434
2634
 
2435
2635
  @key.setter
2436
- def key(self, value: builtins.str):
2636
+ def key(self, value: _builtins.str):
2437
2637
  pulumi.set(self, "key", value)
2438
2638
 
2439
- @property
2639
+ @_builtins.property
2440
2640
  @pulumi.getter
2441
- def values(self) -> Sequence[builtins.str]:
2641
+ def values(self) -> Sequence[_builtins.str]:
2442
2642
  """
2443
2643
  A list of values what are permitted by policy rule.
2444
2644
  """
2445
2645
  return pulumi.get(self, "values")
2446
2646
 
2447
2647
  @values.setter
2448
- def values(self, value: Sequence[builtins.str]):
2648
+ def values(self, value: Sequence[_builtins.str]):
2449
2649
  pulumi.set(self, "values", value)
2450
2650
 
2451
2651
 
2452
2652
  if not MYPY:
2453
2653
  class GetPolicyDocumentRuleDeniedParameterArgsDict(TypedDict):
2454
- key: builtins.str
2654
+ key: _builtins.str
2455
2655
  """
2456
2656
  Name of denied key.
2457
2657
  """
2458
- values: Sequence[builtins.str]
2658
+ values: Sequence[_builtins.str]
2459
2659
  """
2460
2660
  A list of values what are denied by policy rule.
2461
2661
  """
@@ -2465,37 +2665,37 @@ elif False:
2465
2665
  @pulumi.input_type
2466
2666
  class GetPolicyDocumentRuleDeniedParameterArgs:
2467
2667
  def __init__(__self__, *,
2468
- key: builtins.str,
2469
- values: Sequence[builtins.str]):
2668
+ key: _builtins.str,
2669
+ values: Sequence[_builtins.str]):
2470
2670
  """
2471
- :param builtins.str key: Name of denied key.
2472
- :param Sequence[builtins.str] values: A list of values what are denied by policy rule.
2671
+ :param _builtins.str key: Name of denied key.
2672
+ :param Sequence[_builtins.str] values: A list of values what are denied by policy rule.
2473
2673
  """
2474
2674
  pulumi.set(__self__, "key", key)
2475
2675
  pulumi.set(__self__, "values", values)
2476
2676
 
2477
- @property
2677
+ @_builtins.property
2478
2678
  @pulumi.getter
2479
- def key(self) -> builtins.str:
2679
+ def key(self) -> _builtins.str:
2480
2680
  """
2481
2681
  Name of denied key.
2482
2682
  """
2483
2683
  return pulumi.get(self, "key")
2484
2684
 
2485
2685
  @key.setter
2486
- def key(self, value: builtins.str):
2686
+ def key(self, value: _builtins.str):
2487
2687
  pulumi.set(self, "key", value)
2488
2688
 
2489
- @property
2689
+ @_builtins.property
2490
2690
  @pulumi.getter
2491
- def values(self) -> Sequence[builtins.str]:
2691
+ def values(self) -> Sequence[_builtins.str]:
2492
2692
  """
2493
2693
  A list of values what are denied by policy rule.
2494
2694
  """
2495
2695
  return pulumi.get(self, "values")
2496
2696
 
2497
2697
  @values.setter
2498
- def values(self, value: Sequence[builtins.str]):
2698
+ def values(self, value: Sequence[_builtins.str]):
2499
2699
  pulumi.set(self, "values", value)
2500
2700
 
2501
2701