pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,29 +19,29 @@ __all__ = ['SecretBackendLibrarySetArgs', 'SecretBackendLibrarySet']
20
19
  @pulumi.input_type
21
20
  class SecretBackendLibrarySetArgs:
22
21
  def __init__(__self__, *,
23
- service_account_names: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
24
- disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
25
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
26
- mount: Optional[pulumi.Input[builtins.str]] = None,
27
- name: Optional[pulumi.Input[builtins.str]] = None,
28
- namespace: Optional[pulumi.Input[builtins.str]] = None,
29
- ttl: Optional[pulumi.Input[builtins.int]] = None):
22
+ service_account_names: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
23
+ disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
25
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
26
+ name: Optional[pulumi.Input[_builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
28
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
30
29
  """
31
30
  The set of arguments for constructing a SecretBackendLibrarySet resource.
32
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
33
- :param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service
31
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
32
+ :param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
34
33
  accounts must be checked in by the entity or client token that checked them
35
34
  out. Defaults to false.
36
- :param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
35
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
37
36
  to the configuration max_ttl if not provided.
38
- :param pulumi.Input[builtins.str] mount: The path where the LDAP secrets backend is mounted.
39
- :param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
37
+ :param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
38
+ :param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
40
39
  Must be unique within the backend.
41
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
40
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
42
41
  The value should not contain leading or trailing forward slashes.
43
42
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
44
43
  *Available only for Vault Enterprise*.
45
- :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
44
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
46
45
  ttl if not provided.
47
46
  """
48
47
  pulumi.set(__self__, "service_account_names", service_account_names)
@@ -59,21 +58,21 @@ class SecretBackendLibrarySetArgs:
59
58
  if ttl is not None:
60
59
  pulumi.set(__self__, "ttl", ttl)
61
60
 
62
- @property
61
+ @_builtins.property
63
62
  @pulumi.getter(name="serviceAccountNames")
64
- def service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
63
+ def service_account_names(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
65
64
  """
66
65
  Specifies the slice of service accounts mapped to this set.
67
66
  """
68
67
  return pulumi.get(self, "service_account_names")
69
68
 
70
69
  @service_account_names.setter
71
- def service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
70
+ def service_account_names(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
72
71
  pulumi.set(self, "service_account_names", value)
73
72
 
74
- @property
73
+ @_builtins.property
75
74
  @pulumi.getter(name="disableCheckInEnforcement")
76
- def disable_check_in_enforcement(self) -> Optional[pulumi.Input[builtins.bool]]:
75
+ def disable_check_in_enforcement(self) -> Optional[pulumi.Input[_builtins.bool]]:
77
76
  """
78
77
  Disable enforcing that service
79
78
  accounts must be checked in by the entity or client token that checked them
@@ -82,12 +81,12 @@ class SecretBackendLibrarySetArgs:
82
81
  return pulumi.get(self, "disable_check_in_enforcement")
83
82
 
84
83
  @disable_check_in_enforcement.setter
85
- def disable_check_in_enforcement(self, value: Optional[pulumi.Input[builtins.bool]]):
84
+ def disable_check_in_enforcement(self, value: Optional[pulumi.Input[_builtins.bool]]):
86
85
  pulumi.set(self, "disable_check_in_enforcement", value)
87
86
 
88
- @property
87
+ @_builtins.property
89
88
  @pulumi.getter(name="maxTtl")
90
- def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
89
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
91
90
  """
92
91
  The maximum password time-to-live in seconds. Defaults
93
92
  to the configuration max_ttl if not provided.
@@ -95,24 +94,24 @@ class SecretBackendLibrarySetArgs:
95
94
  return pulumi.get(self, "max_ttl")
96
95
 
97
96
  @max_ttl.setter
98
- def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
97
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
99
98
  pulumi.set(self, "max_ttl", value)
100
99
 
101
- @property
100
+ @_builtins.property
102
101
  @pulumi.getter
103
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
102
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
104
103
  """
105
104
  The path where the LDAP secrets backend is mounted.
106
105
  """
107
106
  return pulumi.get(self, "mount")
108
107
 
109
108
  @mount.setter
110
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
109
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
111
110
  pulumi.set(self, "mount", value)
112
111
 
113
- @property
112
+ @_builtins.property
114
113
  @pulumi.getter
115
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
114
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
116
115
  """
117
116
  The name to identify this set of service accounts.
118
117
  Must be unique within the backend.
@@ -120,12 +119,12 @@ class SecretBackendLibrarySetArgs:
120
119
  return pulumi.get(self, "name")
121
120
 
122
121
  @name.setter
123
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
122
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
124
123
  pulumi.set(self, "name", value)
125
124
 
126
- @property
125
+ @_builtins.property
127
126
  @pulumi.getter
128
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
127
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
129
128
  """
130
129
  The namespace to provision the resource in.
131
130
  The value should not contain leading or trailing forward slashes.
@@ -135,12 +134,12 @@ class SecretBackendLibrarySetArgs:
135
134
  return pulumi.get(self, "namespace")
136
135
 
137
136
  @namespace.setter
138
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
137
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
139
138
  pulumi.set(self, "namespace", value)
140
139
 
141
- @property
140
+ @_builtins.property
142
141
  @pulumi.getter
143
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
142
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
144
143
  """
145
144
  The password time-to-live in seconds. Defaults to the configuration
146
145
  ttl if not provided.
@@ -148,36 +147,36 @@ class SecretBackendLibrarySetArgs:
148
147
  return pulumi.get(self, "ttl")
149
148
 
150
149
  @ttl.setter
151
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
150
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
152
151
  pulumi.set(self, "ttl", value)
153
152
 
154
153
 
155
154
  @pulumi.input_type
156
155
  class _SecretBackendLibrarySetState:
157
156
  def __init__(__self__, *,
158
- disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
159
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
160
- mount: Optional[pulumi.Input[builtins.str]] = None,
161
- name: Optional[pulumi.Input[builtins.str]] = None,
162
- namespace: Optional[pulumi.Input[builtins.str]] = None,
163
- service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
164
- ttl: Optional[pulumi.Input[builtins.int]] = None):
157
+ disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
158
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
159
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
160
+ name: Optional[pulumi.Input[_builtins.str]] = None,
161
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
162
+ service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
163
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
165
164
  """
166
165
  Input properties used for looking up and filtering SecretBackendLibrarySet resources.
167
- :param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service
166
+ :param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
168
167
  accounts must be checked in by the entity or client token that checked them
169
168
  out. Defaults to false.
170
- :param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
169
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
171
170
  to the configuration max_ttl if not provided.
172
- :param pulumi.Input[builtins.str] mount: The path where the LDAP secrets backend is mounted.
173
- :param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
171
+ :param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
172
+ :param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
174
173
  Must be unique within the backend.
175
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
174
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
176
175
  The value should not contain leading or trailing forward slashes.
177
176
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
178
177
  *Available only for Vault Enterprise*.
179
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
180
- :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
178
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
179
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
181
180
  ttl if not provided.
182
181
  """
183
182
  if disable_check_in_enforcement is not None:
@@ -195,9 +194,9 @@ class _SecretBackendLibrarySetState:
195
194
  if ttl is not None:
196
195
  pulumi.set(__self__, "ttl", ttl)
197
196
 
198
- @property
197
+ @_builtins.property
199
198
  @pulumi.getter(name="disableCheckInEnforcement")
200
- def disable_check_in_enforcement(self) -> Optional[pulumi.Input[builtins.bool]]:
199
+ def disable_check_in_enforcement(self) -> Optional[pulumi.Input[_builtins.bool]]:
201
200
  """
202
201
  Disable enforcing that service
203
202
  accounts must be checked in by the entity or client token that checked them
@@ -206,12 +205,12 @@ class _SecretBackendLibrarySetState:
206
205
  return pulumi.get(self, "disable_check_in_enforcement")
207
206
 
208
207
  @disable_check_in_enforcement.setter
209
- def disable_check_in_enforcement(self, value: Optional[pulumi.Input[builtins.bool]]):
208
+ def disable_check_in_enforcement(self, value: Optional[pulumi.Input[_builtins.bool]]):
210
209
  pulumi.set(self, "disable_check_in_enforcement", value)
211
210
 
212
- @property
211
+ @_builtins.property
213
212
  @pulumi.getter(name="maxTtl")
214
- def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
213
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
215
214
  """
216
215
  The maximum password time-to-live in seconds. Defaults
217
216
  to the configuration max_ttl if not provided.
@@ -219,24 +218,24 @@ class _SecretBackendLibrarySetState:
219
218
  return pulumi.get(self, "max_ttl")
220
219
 
221
220
  @max_ttl.setter
222
- def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
221
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
223
222
  pulumi.set(self, "max_ttl", value)
224
223
 
225
- @property
224
+ @_builtins.property
226
225
  @pulumi.getter
227
- def mount(self) -> Optional[pulumi.Input[builtins.str]]:
226
+ def mount(self) -> Optional[pulumi.Input[_builtins.str]]:
228
227
  """
229
228
  The path where the LDAP secrets backend is mounted.
230
229
  """
231
230
  return pulumi.get(self, "mount")
232
231
 
233
232
  @mount.setter
234
- def mount(self, value: Optional[pulumi.Input[builtins.str]]):
233
+ def mount(self, value: Optional[pulumi.Input[_builtins.str]]):
235
234
  pulumi.set(self, "mount", value)
236
235
 
237
- @property
236
+ @_builtins.property
238
237
  @pulumi.getter
239
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
238
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
240
239
  """
241
240
  The name to identify this set of service accounts.
242
241
  Must be unique within the backend.
@@ -244,12 +243,12 @@ class _SecretBackendLibrarySetState:
244
243
  return pulumi.get(self, "name")
245
244
 
246
245
  @name.setter
247
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
246
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
248
247
  pulumi.set(self, "name", value)
249
248
 
250
- @property
249
+ @_builtins.property
251
250
  @pulumi.getter
252
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
251
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
253
252
  """
254
253
  The namespace to provision the resource in.
255
254
  The value should not contain leading or trailing forward slashes.
@@ -259,24 +258,24 @@ class _SecretBackendLibrarySetState:
259
258
  return pulumi.get(self, "namespace")
260
259
 
261
260
  @namespace.setter
262
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
261
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
263
262
  pulumi.set(self, "namespace", value)
264
263
 
265
- @property
264
+ @_builtins.property
266
265
  @pulumi.getter(name="serviceAccountNames")
267
- def service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
266
+ def service_account_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
268
267
  """
269
268
  Specifies the slice of service accounts mapped to this set.
270
269
  """
271
270
  return pulumi.get(self, "service_account_names")
272
271
 
273
272
  @service_account_names.setter
274
- def service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
273
+ def service_account_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
275
274
  pulumi.set(self, "service_account_names", value)
276
275
 
277
- @property
276
+ @_builtins.property
278
277
  @pulumi.getter
279
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
278
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
280
279
  """
281
280
  The password time-to-live in seconds. Defaults to the configuration
282
281
  ttl if not provided.
@@ -284,7 +283,7 @@ class _SecretBackendLibrarySetState:
284
283
  return pulumi.get(self, "ttl")
285
284
 
286
285
  @ttl.setter
287
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
286
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
288
287
  pulumi.set(self, "ttl", value)
289
288
 
290
289
 
@@ -294,13 +293,13 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
294
293
  def __init__(__self__,
295
294
  resource_name: str,
296
295
  opts: Optional[pulumi.ResourceOptions] = None,
297
- disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
298
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
299
- mount: Optional[pulumi.Input[builtins.str]] = None,
300
- name: Optional[pulumi.Input[builtins.str]] = None,
301
- namespace: Optional[pulumi.Input[builtins.str]] = None,
302
- service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
303
- ttl: Optional[pulumi.Input[builtins.int]] = None,
296
+ disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
297
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
298
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
299
+ name: Optional[pulumi.Input[_builtins.str]] = None,
300
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
301
+ service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
302
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
304
303
  __props__=None):
305
304
  """
306
305
  ## Example Usage
@@ -338,20 +337,20 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
338
337
 
339
338
  :param str resource_name: The name of the resource.
340
339
  :param pulumi.ResourceOptions opts: Options for the resource.
341
- :param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service
340
+ :param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
342
341
  accounts must be checked in by the entity or client token that checked them
343
342
  out. Defaults to false.
344
- :param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
343
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
345
344
  to the configuration max_ttl if not provided.
346
- :param pulumi.Input[builtins.str] mount: The path where the LDAP secrets backend is mounted.
347
- :param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
345
+ :param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
346
+ :param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
348
347
  Must be unique within the backend.
349
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
348
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
350
349
  The value should not contain leading or trailing forward slashes.
351
350
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
352
351
  *Available only for Vault Enterprise*.
353
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
354
- :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
352
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
353
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
355
354
  ttl if not provided.
356
355
  """
357
356
  ...
@@ -409,13 +408,13 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
409
408
  def _internal_init(__self__,
410
409
  resource_name: str,
411
410
  opts: Optional[pulumi.ResourceOptions] = None,
412
- disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
413
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
414
- mount: Optional[pulumi.Input[builtins.str]] = None,
415
- name: Optional[pulumi.Input[builtins.str]] = None,
416
- namespace: Optional[pulumi.Input[builtins.str]] = None,
417
- service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
418
- ttl: Optional[pulumi.Input[builtins.int]] = None,
411
+ disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
412
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
413
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
414
+ name: Optional[pulumi.Input[_builtins.str]] = None,
415
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
416
+ service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
417
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
419
418
  __props__=None):
420
419
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
421
420
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -444,13 +443,13 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
444
443
  def get(resource_name: str,
445
444
  id: pulumi.Input[str],
446
445
  opts: Optional[pulumi.ResourceOptions] = None,
447
- disable_check_in_enforcement: Optional[pulumi.Input[builtins.bool]] = None,
448
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
449
- mount: Optional[pulumi.Input[builtins.str]] = None,
450
- name: Optional[pulumi.Input[builtins.str]] = None,
451
- namespace: Optional[pulumi.Input[builtins.str]] = None,
452
- service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
453
- ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'SecretBackendLibrarySet':
446
+ disable_check_in_enforcement: Optional[pulumi.Input[_builtins.bool]] = None,
447
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
448
+ mount: Optional[pulumi.Input[_builtins.str]] = None,
449
+ name: Optional[pulumi.Input[_builtins.str]] = None,
450
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
451
+ service_account_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
452
+ ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretBackendLibrarySet':
454
453
  """
455
454
  Get an existing SecretBackendLibrarySet resource's state with the given name, id, and optional extra
456
455
  properties used to qualify the lookup.
@@ -458,20 +457,20 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
458
457
  :param str resource_name: The unique name of the resulting resource.
459
458
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
460
459
  :param pulumi.ResourceOptions opts: Options for the resource.
461
- :param pulumi.Input[builtins.bool] disable_check_in_enforcement: Disable enforcing that service
460
+ :param pulumi.Input[_builtins.bool] disable_check_in_enforcement: Disable enforcing that service
462
461
  accounts must be checked in by the entity or client token that checked them
463
462
  out. Defaults to false.
464
- :param pulumi.Input[builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
463
+ :param pulumi.Input[_builtins.int] max_ttl: The maximum password time-to-live in seconds. Defaults
465
464
  to the configuration max_ttl if not provided.
466
- :param pulumi.Input[builtins.str] mount: The path where the LDAP secrets backend is mounted.
467
- :param pulumi.Input[builtins.str] name: The name to identify this set of service accounts.
465
+ :param pulumi.Input[_builtins.str] mount: The path where the LDAP secrets backend is mounted.
466
+ :param pulumi.Input[_builtins.str] name: The name to identify this set of service accounts.
468
467
  Must be unique within the backend.
469
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
468
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
470
469
  The value should not contain leading or trailing forward slashes.
471
470
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
472
471
  *Available only for Vault Enterprise*.
473
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
474
- :param pulumi.Input[builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
472
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_account_names: Specifies the slice of service accounts mapped to this set.
473
+ :param pulumi.Input[_builtins.int] ttl: The password time-to-live in seconds. Defaults to the configuration
475
474
  ttl if not provided.
476
475
  """
477
476
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -487,9 +486,9 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
487
486
  __props__.__dict__["ttl"] = ttl
488
487
  return SecretBackendLibrarySet(resource_name, opts=opts, __props__=__props__)
489
488
 
490
- @property
489
+ @_builtins.property
491
490
  @pulumi.getter(name="disableCheckInEnforcement")
492
- def disable_check_in_enforcement(self) -> pulumi.Output[Optional[builtins.bool]]:
491
+ def disable_check_in_enforcement(self) -> pulumi.Output[Optional[_builtins.bool]]:
493
492
  """
494
493
  Disable enforcing that service
495
494
  accounts must be checked in by the entity or client token that checked them
@@ -497,35 +496,35 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
497
496
  """
498
497
  return pulumi.get(self, "disable_check_in_enforcement")
499
498
 
500
- @property
499
+ @_builtins.property
501
500
  @pulumi.getter(name="maxTtl")
502
- def max_ttl(self) -> pulumi.Output[builtins.int]:
501
+ def max_ttl(self) -> pulumi.Output[_builtins.int]:
503
502
  """
504
503
  The maximum password time-to-live in seconds. Defaults
505
504
  to the configuration max_ttl if not provided.
506
505
  """
507
506
  return pulumi.get(self, "max_ttl")
508
507
 
509
- @property
508
+ @_builtins.property
510
509
  @pulumi.getter
511
- def mount(self) -> pulumi.Output[Optional[builtins.str]]:
510
+ def mount(self) -> pulumi.Output[Optional[_builtins.str]]:
512
511
  """
513
512
  The path where the LDAP secrets backend is mounted.
514
513
  """
515
514
  return pulumi.get(self, "mount")
516
515
 
517
- @property
516
+ @_builtins.property
518
517
  @pulumi.getter
519
- def name(self) -> pulumi.Output[builtins.str]:
518
+ def name(self) -> pulumi.Output[_builtins.str]:
520
519
  """
521
520
  The name to identify this set of service accounts.
522
521
  Must be unique within the backend.
523
522
  """
524
523
  return pulumi.get(self, "name")
525
524
 
526
- @property
525
+ @_builtins.property
527
526
  @pulumi.getter
528
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
527
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
529
528
  """
530
529
  The namespace to provision the resource in.
531
530
  The value should not contain leading or trailing forward slashes.
@@ -534,17 +533,17 @@ class SecretBackendLibrarySet(pulumi.CustomResource):
534
533
  """
535
534
  return pulumi.get(self, "namespace")
536
535
 
537
- @property
536
+ @_builtins.property
538
537
  @pulumi.getter(name="serviceAccountNames")
539
- def service_account_names(self) -> pulumi.Output[Sequence[builtins.str]]:
538
+ def service_account_names(self) -> pulumi.Output[Sequence[_builtins.str]]:
540
539
  """
541
540
  Specifies the slice of service accounts mapped to this set.
542
541
  """
543
542
  return pulumi.get(self, "service_account_names")
544
543
 
545
- @property
544
+ @_builtins.property
546
545
  @pulumi.getter
547
- def ttl(self) -> pulumi.Output[builtins.int]:
546
+ def ttl(self) -> pulumi.Output[_builtins.int]:
548
547
  """
549
548
  The password time-to-live in seconds. Defaults to the configuration
550
549
  ttl if not provided.