pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,21 +19,21 @@ __all__ = ['AuthBackendRoletagBlacklistArgs', 'AuthBackendRoletagBlacklist']
20
19
  @pulumi.input_type
21
20
  class AuthBackendRoletagBlacklistArgs:
22
21
  def __init__(__self__, *,
23
- backend: pulumi.Input[builtins.str],
24
- disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
25
- namespace: Optional[pulumi.Input[builtins.str]] = None,
26
- safety_buffer: Optional[pulumi.Input[builtins.int]] = None):
22
+ backend: pulumi.Input[_builtins.str],
23
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None):
27
26
  """
28
27
  The set of arguments for constructing a AuthBackendRoletagBlacklist resource.
29
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
28
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
30
29
  mounted at.
31
- :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
30
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
32
31
  tidying of the roletag blacklist entries. Defaults to false.
33
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
32
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
34
33
  The value should not contain leading or trailing forward slashes.
35
34
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
36
35
  *Available only for Vault Enterprise*.
37
- :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
36
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
38
37
  beyond the roletag expiration, before it is removed from the backend storage.
39
38
  Defaults to 259,200 seconds, or 72 hours.
40
39
  """
@@ -46,9 +45,9 @@ class AuthBackendRoletagBlacklistArgs:
46
45
  if safety_buffer is not None:
47
46
  pulumi.set(__self__, "safety_buffer", safety_buffer)
48
47
 
49
- @property
48
+ @_builtins.property
50
49
  @pulumi.getter
51
- def backend(self) -> pulumi.Input[builtins.str]:
50
+ def backend(self) -> pulumi.Input[_builtins.str]:
52
51
  """
53
52
  The path the AWS auth backend being configured was
54
53
  mounted at.
@@ -56,12 +55,12 @@ class AuthBackendRoletagBlacklistArgs:
56
55
  return pulumi.get(self, "backend")
57
56
 
58
57
  @backend.setter
59
- def backend(self, value: pulumi.Input[builtins.str]):
58
+ def backend(self, value: pulumi.Input[_builtins.str]):
60
59
  pulumi.set(self, "backend", value)
61
60
 
62
- @property
61
+ @_builtins.property
63
62
  @pulumi.getter(name="disablePeriodicTidy")
64
- def disable_periodic_tidy(self) -> Optional[pulumi.Input[builtins.bool]]:
63
+ def disable_periodic_tidy(self) -> Optional[pulumi.Input[_builtins.bool]]:
65
64
  """
66
65
  If set to true, disables the periodic
67
66
  tidying of the roletag blacklist entries. Defaults to false.
@@ -69,12 +68,12 @@ class AuthBackendRoletagBlacklistArgs:
69
68
  return pulumi.get(self, "disable_periodic_tidy")
70
69
 
71
70
  @disable_periodic_tidy.setter
72
- def disable_periodic_tidy(self, value: Optional[pulumi.Input[builtins.bool]]):
71
+ def disable_periodic_tidy(self, value: Optional[pulumi.Input[_builtins.bool]]):
73
72
  pulumi.set(self, "disable_periodic_tidy", value)
74
73
 
75
- @property
74
+ @_builtins.property
76
75
  @pulumi.getter
77
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
76
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
78
77
  """
79
78
  The namespace to provision the resource in.
80
79
  The value should not contain leading or trailing forward slashes.
@@ -84,12 +83,12 @@ class AuthBackendRoletagBlacklistArgs:
84
83
  return pulumi.get(self, "namespace")
85
84
 
86
85
  @namespace.setter
87
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
86
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
88
87
  pulumi.set(self, "namespace", value)
89
88
 
90
- @property
89
+ @_builtins.property
91
90
  @pulumi.getter(name="safetyBuffer")
92
- def safety_buffer(self) -> Optional[pulumi.Input[builtins.int]]:
91
+ def safety_buffer(self) -> Optional[pulumi.Input[_builtins.int]]:
93
92
  """
94
93
  The amount of extra time that must have passed
95
94
  beyond the roletag expiration, before it is removed from the backend storage.
@@ -98,28 +97,28 @@ class AuthBackendRoletagBlacklistArgs:
98
97
  return pulumi.get(self, "safety_buffer")
99
98
 
100
99
  @safety_buffer.setter
101
- def safety_buffer(self, value: Optional[pulumi.Input[builtins.int]]):
100
+ def safety_buffer(self, value: Optional[pulumi.Input[_builtins.int]]):
102
101
  pulumi.set(self, "safety_buffer", value)
103
102
 
104
103
 
105
104
  @pulumi.input_type
106
105
  class _AuthBackendRoletagBlacklistState:
107
106
  def __init__(__self__, *,
108
- backend: Optional[pulumi.Input[builtins.str]] = None,
109
- disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
110
- namespace: Optional[pulumi.Input[builtins.str]] = None,
111
- safety_buffer: Optional[pulumi.Input[builtins.int]] = None):
107
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
108
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
109
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
110
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None):
112
111
  """
113
112
  Input properties used for looking up and filtering AuthBackendRoletagBlacklist resources.
114
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
113
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
115
114
  mounted at.
116
- :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
115
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
117
116
  tidying of the roletag blacklist entries. Defaults to false.
118
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
117
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
119
118
  The value should not contain leading or trailing forward slashes.
120
119
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
121
120
  *Available only for Vault Enterprise*.
122
- :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
121
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
123
122
  beyond the roletag expiration, before it is removed from the backend storage.
124
123
  Defaults to 259,200 seconds, or 72 hours.
125
124
  """
@@ -132,9 +131,9 @@ class _AuthBackendRoletagBlacklistState:
132
131
  if safety_buffer is not None:
133
132
  pulumi.set(__self__, "safety_buffer", safety_buffer)
134
133
 
135
- @property
134
+ @_builtins.property
136
135
  @pulumi.getter
137
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
136
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
138
137
  """
139
138
  The path the AWS auth backend being configured was
140
139
  mounted at.
@@ -142,12 +141,12 @@ class _AuthBackendRoletagBlacklistState:
142
141
  return pulumi.get(self, "backend")
143
142
 
144
143
  @backend.setter
145
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
144
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
146
145
  pulumi.set(self, "backend", value)
147
146
 
148
- @property
147
+ @_builtins.property
149
148
  @pulumi.getter(name="disablePeriodicTidy")
150
- def disable_periodic_tidy(self) -> Optional[pulumi.Input[builtins.bool]]:
149
+ def disable_periodic_tidy(self) -> Optional[pulumi.Input[_builtins.bool]]:
151
150
  """
152
151
  If set to true, disables the periodic
153
152
  tidying of the roletag blacklist entries. Defaults to false.
@@ -155,12 +154,12 @@ class _AuthBackendRoletagBlacklistState:
155
154
  return pulumi.get(self, "disable_periodic_tidy")
156
155
 
157
156
  @disable_periodic_tidy.setter
158
- def disable_periodic_tidy(self, value: Optional[pulumi.Input[builtins.bool]]):
157
+ def disable_periodic_tidy(self, value: Optional[pulumi.Input[_builtins.bool]]):
159
158
  pulumi.set(self, "disable_periodic_tidy", value)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter
163
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
162
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
164
163
  """
165
164
  The namespace to provision the resource in.
166
165
  The value should not contain leading or trailing forward slashes.
@@ -170,12 +169,12 @@ class _AuthBackendRoletagBlacklistState:
170
169
  return pulumi.get(self, "namespace")
171
170
 
172
171
  @namespace.setter
173
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
172
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
174
173
  pulumi.set(self, "namespace", value)
175
174
 
176
- @property
175
+ @_builtins.property
177
176
  @pulumi.getter(name="safetyBuffer")
178
- def safety_buffer(self) -> Optional[pulumi.Input[builtins.int]]:
177
+ def safety_buffer(self) -> Optional[pulumi.Input[_builtins.int]]:
179
178
  """
180
179
  The amount of extra time that must have passed
181
180
  beyond the roletag expiration, before it is removed from the backend storage.
@@ -184,7 +183,7 @@ class _AuthBackendRoletagBlacklistState:
184
183
  return pulumi.get(self, "safety_buffer")
185
184
 
186
185
  @safety_buffer.setter
187
- def safety_buffer(self, value: Optional[pulumi.Input[builtins.int]]):
186
+ def safety_buffer(self, value: Optional[pulumi.Input[_builtins.int]]):
188
187
  pulumi.set(self, "safety_buffer", value)
189
188
 
190
189
 
@@ -194,10 +193,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
194
193
  def __init__(__self__,
195
194
  resource_name: str,
196
195
  opts: Optional[pulumi.ResourceOptions] = None,
197
- backend: Optional[pulumi.Input[builtins.str]] = None,
198
- disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
199
- namespace: Optional[pulumi.Input[builtins.str]] = None,
200
- safety_buffer: Optional[pulumi.Input[builtins.int]] = None,
196
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
197
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
198
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
199
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None,
201
200
  __props__=None):
202
201
  """
203
202
  Configures the periodic tidying operation of the blacklisted role tag entries.
@@ -216,15 +215,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
216
215
 
217
216
  :param str resource_name: The name of the resource.
218
217
  :param pulumi.ResourceOptions opts: Options for the resource.
219
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
218
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
220
219
  mounted at.
221
- :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
220
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
222
221
  tidying of the roletag blacklist entries. Defaults to false.
223
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
222
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
224
223
  The value should not contain leading or trailing forward slashes.
225
224
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
226
225
  *Available only for Vault Enterprise*.
227
- :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
226
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
228
227
  beyond the roletag expiration, before it is removed from the backend storage.
229
228
  Defaults to 259,200 seconds, or 72 hours.
230
229
  """
@@ -264,10 +263,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
264
263
  def _internal_init(__self__,
265
264
  resource_name: str,
266
265
  opts: Optional[pulumi.ResourceOptions] = None,
267
- backend: Optional[pulumi.Input[builtins.str]] = None,
268
- disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
269
- namespace: Optional[pulumi.Input[builtins.str]] = None,
270
- safety_buffer: Optional[pulumi.Input[builtins.int]] = None,
266
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
267
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
268
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
269
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None,
271
270
  __props__=None):
272
271
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
273
272
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -293,10 +292,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
293
292
  def get(resource_name: str,
294
293
  id: pulumi.Input[str],
295
294
  opts: Optional[pulumi.ResourceOptions] = None,
296
- backend: Optional[pulumi.Input[builtins.str]] = None,
297
- disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
298
- namespace: Optional[pulumi.Input[builtins.str]] = None,
299
- safety_buffer: Optional[pulumi.Input[builtins.int]] = None) -> 'AuthBackendRoletagBlacklist':
295
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
296
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
297
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
298
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None) -> 'AuthBackendRoletagBlacklist':
300
299
  """
301
300
  Get an existing AuthBackendRoletagBlacklist resource's state with the given name, id, and optional extra
302
301
  properties used to qualify the lookup.
@@ -304,15 +303,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
304
303
  :param str resource_name: The unique name of the resulting resource.
305
304
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
306
305
  :param pulumi.ResourceOptions opts: Options for the resource.
307
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
306
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
308
307
  mounted at.
309
- :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
308
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
310
309
  tidying of the roletag blacklist entries. Defaults to false.
311
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
310
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
312
311
  The value should not contain leading or trailing forward slashes.
313
312
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
314
313
  *Available only for Vault Enterprise*.
315
- :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
314
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time that must have passed
316
315
  beyond the roletag expiration, before it is removed from the backend storage.
317
316
  Defaults to 259,200 seconds, or 72 hours.
318
317
  """
@@ -326,27 +325,27 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
326
325
  __props__.__dict__["safety_buffer"] = safety_buffer
327
326
  return AuthBackendRoletagBlacklist(resource_name, opts=opts, __props__=__props__)
328
327
 
329
- @property
328
+ @_builtins.property
330
329
  @pulumi.getter
331
- def backend(self) -> pulumi.Output[builtins.str]:
330
+ def backend(self) -> pulumi.Output[_builtins.str]:
332
331
  """
333
332
  The path the AWS auth backend being configured was
334
333
  mounted at.
335
334
  """
336
335
  return pulumi.get(self, "backend")
337
336
 
338
- @property
337
+ @_builtins.property
339
338
  @pulumi.getter(name="disablePeriodicTidy")
340
- def disable_periodic_tidy(self) -> pulumi.Output[Optional[builtins.bool]]:
339
+ def disable_periodic_tidy(self) -> pulumi.Output[Optional[_builtins.bool]]:
341
340
  """
342
341
  If set to true, disables the periodic
343
342
  tidying of the roletag blacklist entries. Defaults to false.
344
343
  """
345
344
  return pulumi.get(self, "disable_periodic_tidy")
346
345
 
347
- @property
346
+ @_builtins.property
348
347
  @pulumi.getter
349
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
348
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
350
349
  """
351
350
  The namespace to provision the resource in.
352
351
  The value should not contain leading or trailing forward slashes.
@@ -355,9 +354,9 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
355
354
  """
356
355
  return pulumi.get(self, "namespace")
357
356
 
358
- @property
357
+ @_builtins.property
359
358
  @pulumi.getter(name="safetyBuffer")
360
- def safety_buffer(self) -> pulumi.Output[Optional[builtins.int]]:
359
+ def safety_buffer(self) -> pulumi.Output[Optional[_builtins.int]]:
361
360
  """
362
361
  The amount of extra time that must have passed
363
362
  beyond the roletag expiration, before it is removed from the backend storage.