pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,68 +19,68 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- access_key: Optional[pulumi.Input[builtins.str]] = None,
24
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
25
- description: Optional[pulumi.Input[builtins.str]] = None,
26
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
27
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
28
- iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
29
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
30
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
31
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
32
- local: Optional[pulumi.Input[builtins.bool]] = None,
33
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
34
- namespace: Optional[pulumi.Input[builtins.str]] = None,
35
- path: Optional[pulumi.Input[builtins.str]] = None,
36
- region: Optional[pulumi.Input[builtins.str]] = None,
37
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
38
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
39
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
40
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
41
- secret_key: Optional[pulumi.Input[builtins.str]] = None,
42
- sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
43
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
44
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
45
- sts_region: Optional[pulumi.Input[builtins.str]] = None,
46
- username_template: Optional[pulumi.Input[builtins.str]] = None):
22
+ access_key: Optional[pulumi.Input[_builtins.str]] = None,
23
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
24
+ description: Optional[pulumi.Input[_builtins.str]] = None,
25
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
27
+ iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
28
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
29
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
30
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
33
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
34
+ path: Optional[pulumi.Input[_builtins.str]] = None,
35
+ region: Optional[pulumi.Input[_builtins.str]] = None,
36
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
37
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
38
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
39
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
40
+ secret_key: Optional[pulumi.Input[_builtins.str]] = None,
41
+ sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
42
+ sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
43
+ sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
44
+ sts_region: Optional[pulumi.Input[_builtins.str]] = None,
45
+ username_template: Optional[pulumi.Input[_builtins.str]] = None):
47
46
  """
48
47
  The set of arguments for constructing a SecretBackend resource.
49
- :param pulumi.Input[builtins.str] access_key: The AWS Access Key ID this backend should use to
48
+ :param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
50
49
  issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
51
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
50
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
52
51
  issued by this backend.
53
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
54
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
55
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
52
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
53
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
54
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
56
55
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
57
- :param pulumi.Input[builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
58
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
59
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
60
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
61
- :param pulumi.Input[builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
62
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
56
+ :param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
57
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
58
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
59
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
60
+ :param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
61
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
63
62
  for credentials issued by this backend.
64
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
63
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
65
64
  The value should not contain leading or trailing forward slashes.
66
65
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
67
66
  *Available only for Vault Enterprise*.
68
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
67
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
69
68
  not begin or end with a `/`. Defaults to `aws`.
70
- :param pulumi.Input[builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
71
- :param pulumi.Input[builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
72
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
69
+ :param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
70
+ :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
71
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
73
72
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
74
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
73
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
75
74
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
76
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
75
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
77
76
  a rotation when a scheduled token rotation occurs. The default rotation window is
78
77
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
79
- :param pulumi.Input[builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
80
- :param pulumi.Input[builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
81
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
82
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
83
- :param pulumi.Input[builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
84
- :param pulumi.Input[builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
78
+ :param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
79
+ :param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
80
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
81
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
82
+ :param pulumi.Input[_builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
83
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
85
84
 
86
85
  ```
87
86
  {{ if (eq .Type "STS") }}
@@ -141,9 +140,9 @@ class SecretBackendArgs:
141
140
  if username_template is not None:
142
141
  pulumi.set(__self__, "username_template", username_template)
143
142
 
144
- @property
143
+ @_builtins.property
145
144
  @pulumi.getter(name="accessKey")
146
- def access_key(self) -> Optional[pulumi.Input[builtins.str]]:
145
+ def access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
147
146
  """
148
147
  The AWS Access Key ID this backend should use to
149
148
  issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
@@ -151,12 +150,12 @@ class SecretBackendArgs:
151
150
  return pulumi.get(self, "access_key")
152
151
 
153
152
  @access_key.setter
154
- def access_key(self, value: Optional[pulumi.Input[builtins.str]]):
153
+ def access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
155
154
  pulumi.set(self, "access_key", value)
156
155
 
157
- @property
156
+ @_builtins.property
158
157
  @pulumi.getter(name="defaultLeaseTtlSeconds")
159
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
158
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
160
159
  """
161
160
  The default TTL for credentials
162
161
  issued by this backend.
@@ -164,36 +163,36 @@ class SecretBackendArgs:
164
163
  return pulumi.get(self, "default_lease_ttl_seconds")
165
164
 
166
165
  @default_lease_ttl_seconds.setter
167
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
166
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
168
167
  pulumi.set(self, "default_lease_ttl_seconds", value)
169
168
 
170
- @property
169
+ @_builtins.property
171
170
  @pulumi.getter
172
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
171
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
173
172
  """
174
173
  A human-friendly description for this backend.
175
174
  """
176
175
  return pulumi.get(self, "description")
177
176
 
178
177
  @description.setter
179
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
178
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
180
179
  pulumi.set(self, "description", value)
181
180
 
182
- @property
181
+ @_builtins.property
183
182
  @pulumi.getter(name="disableAutomatedRotation")
184
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
183
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
185
184
  """
186
185
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
187
186
  """
188
187
  return pulumi.get(self, "disable_automated_rotation")
189
188
 
190
189
  @disable_automated_rotation.setter
191
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
190
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
192
191
  pulumi.set(self, "disable_automated_rotation", value)
193
192
 
194
- @property
193
+ @_builtins.property
195
194
  @pulumi.getter(name="disableRemount")
196
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
195
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
197
196
  """
198
197
  If set, opts out of mount migration on path updates.
199
198
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -201,72 +200,72 @@ class SecretBackendArgs:
201
200
  return pulumi.get(self, "disable_remount")
202
201
 
203
202
  @disable_remount.setter
204
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
203
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
205
204
  pulumi.set(self, "disable_remount", value)
206
205
 
207
- @property
206
+ @_builtins.property
208
207
  @pulumi.getter(name="iamEndpoint")
209
- def iam_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
208
+ def iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
210
209
  """
211
210
  Specifies a custom HTTP IAM endpoint to use.
212
211
  """
213
212
  return pulumi.get(self, "iam_endpoint")
214
213
 
215
214
  @iam_endpoint.setter
216
- def iam_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
215
+ def iam_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
217
216
  pulumi.set(self, "iam_endpoint", value)
218
217
 
219
- @property
218
+ @_builtins.property
220
219
  @pulumi.getter(name="identityTokenAudience")
221
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
220
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
222
221
  """
223
222
  The audience claim value. Requires Vault 1.16+.
224
223
  """
225
224
  return pulumi.get(self, "identity_token_audience")
226
225
 
227
226
  @identity_token_audience.setter
228
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
227
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
229
228
  pulumi.set(self, "identity_token_audience", value)
230
229
 
231
- @property
230
+ @_builtins.property
232
231
  @pulumi.getter(name="identityTokenKey")
233
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
232
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
234
233
  """
235
234
  The key to use for signing identity tokens. Requires Vault 1.16+.
236
235
  """
237
236
  return pulumi.get(self, "identity_token_key")
238
237
 
239
238
  @identity_token_key.setter
240
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
239
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
241
240
  pulumi.set(self, "identity_token_key", value)
242
241
 
243
- @property
242
+ @_builtins.property
244
243
  @pulumi.getter(name="identityTokenTtl")
245
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
244
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
246
245
  """
247
246
  The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
248
247
  """
249
248
  return pulumi.get(self, "identity_token_ttl")
250
249
 
251
250
  @identity_token_ttl.setter
252
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
251
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
253
252
  pulumi.set(self, "identity_token_ttl", value)
254
253
 
255
- @property
254
+ @_builtins.property
256
255
  @pulumi.getter
257
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
256
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
258
257
  """
259
258
  Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
260
259
  """
261
260
  return pulumi.get(self, "local")
262
261
 
263
262
  @local.setter
264
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
263
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
265
264
  pulumi.set(self, "local", value)
266
265
 
267
- @property
266
+ @_builtins.property
268
267
  @pulumi.getter(name="maxLeaseTtlSeconds")
269
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
268
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
270
269
  """
271
270
  The maximum TTL that can be requested
272
271
  for credentials issued by this backend.
@@ -274,12 +273,12 @@ class SecretBackendArgs:
274
273
  return pulumi.get(self, "max_lease_ttl_seconds")
275
274
 
276
275
  @max_lease_ttl_seconds.setter
277
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
276
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
278
277
  pulumi.set(self, "max_lease_ttl_seconds", value)
279
278
 
280
- @property
279
+ @_builtins.property
281
280
  @pulumi.getter
282
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
281
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
283
282
  """
284
283
  The namespace to provision the resource in.
285
284
  The value should not contain leading or trailing forward slashes.
@@ -289,12 +288,12 @@ class SecretBackendArgs:
289
288
  return pulumi.get(self, "namespace")
290
289
 
291
290
  @namespace.setter
292
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
291
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
293
292
  pulumi.set(self, "namespace", value)
294
293
 
295
- @property
294
+ @_builtins.property
296
295
  @pulumi.getter
297
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
296
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
298
297
  """
299
298
  The unique path this backend should be mounted at. Must
300
299
  not begin or end with a `/`. Defaults to `aws`.
@@ -302,36 +301,36 @@ class SecretBackendArgs:
302
301
  return pulumi.get(self, "path")
303
302
 
304
303
  @path.setter
305
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
304
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
306
305
  pulumi.set(self, "path", value)
307
306
 
308
- @property
307
+ @_builtins.property
309
308
  @pulumi.getter
310
- def region(self) -> Optional[pulumi.Input[builtins.str]]:
309
+ def region(self) -> Optional[pulumi.Input[_builtins.str]]:
311
310
  """
312
311
  The AWS region to make API calls against. Defaults to us-east-1.
313
312
  """
314
313
  return pulumi.get(self, "region")
315
314
 
316
315
  @region.setter
317
- def region(self, value: Optional[pulumi.Input[builtins.str]]):
316
+ def region(self, value: Optional[pulumi.Input[_builtins.str]]):
318
317
  pulumi.set(self, "region", value)
319
318
 
320
- @property
319
+ @_builtins.property
321
320
  @pulumi.getter(name="roleArn")
322
- def role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
321
+ def role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
323
322
  """
324
323
  Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
325
324
  """
326
325
  return pulumi.get(self, "role_arn")
327
326
 
328
327
  @role_arn.setter
329
- def role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
328
+ def role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
330
329
  pulumi.set(self, "role_arn", value)
331
330
 
332
- @property
331
+ @_builtins.property
333
332
  @pulumi.getter(name="rotationPeriod")
334
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
333
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
335
334
  """
336
335
  The amount of time in seconds Vault should wait before rotating the root credential.
337
336
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -339,12 +338,12 @@ class SecretBackendArgs:
339
338
  return pulumi.get(self, "rotation_period")
340
339
 
341
340
  @rotation_period.setter
342
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
341
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
343
342
  pulumi.set(self, "rotation_period", value)
344
343
 
345
- @property
344
+ @_builtins.property
346
345
  @pulumi.getter(name="rotationSchedule")
347
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
346
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
348
347
  """
349
348
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
350
349
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -352,12 +351,12 @@ class SecretBackendArgs:
352
351
  return pulumi.get(self, "rotation_schedule")
353
352
 
354
353
  @rotation_schedule.setter
355
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
354
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
356
355
  pulumi.set(self, "rotation_schedule", value)
357
356
 
358
- @property
357
+ @_builtins.property
359
358
  @pulumi.getter(name="rotationWindow")
360
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
359
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
361
360
  """
362
361
  The maximum amount of time in seconds allowed to complete
363
362
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -366,72 +365,72 @@ class SecretBackendArgs:
366
365
  return pulumi.get(self, "rotation_window")
367
366
 
368
367
  @rotation_window.setter
369
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
368
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
370
369
  pulumi.set(self, "rotation_window", value)
371
370
 
372
- @property
371
+ @_builtins.property
373
372
  @pulumi.getter(name="secretKey")
374
- def secret_key(self) -> Optional[pulumi.Input[builtins.str]]:
373
+ def secret_key(self) -> Optional[pulumi.Input[_builtins.str]]:
375
374
  """
376
375
  The AWS Secret Access Key to use when generating new credentials.
377
376
  """
378
377
  return pulumi.get(self, "secret_key")
379
378
 
380
379
  @secret_key.setter
381
- def secret_key(self, value: Optional[pulumi.Input[builtins.str]]):
380
+ def secret_key(self, value: Optional[pulumi.Input[_builtins.str]]):
382
381
  pulumi.set(self, "secret_key", value)
383
382
 
384
- @property
383
+ @_builtins.property
385
384
  @pulumi.getter(name="stsEndpoint")
386
- def sts_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
385
+ def sts_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
387
386
  """
388
387
  Specifies a custom HTTP STS endpoint to use.
389
388
  """
390
389
  return pulumi.get(self, "sts_endpoint")
391
390
 
392
391
  @sts_endpoint.setter
393
- def sts_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
392
+ def sts_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
394
393
  pulumi.set(self, "sts_endpoint", value)
395
394
 
396
- @property
395
+ @_builtins.property
397
396
  @pulumi.getter(name="stsFallbackEndpoints")
398
- def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
397
+ def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
399
398
  """
400
399
  Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
401
400
  """
402
401
  return pulumi.get(self, "sts_fallback_endpoints")
403
402
 
404
403
  @sts_fallback_endpoints.setter
405
- def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
404
+ def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
406
405
  pulumi.set(self, "sts_fallback_endpoints", value)
407
406
 
408
- @property
407
+ @_builtins.property
409
408
  @pulumi.getter(name="stsFallbackRegions")
410
- def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
409
+ def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
411
410
  """
412
411
  Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
413
412
  """
414
413
  return pulumi.get(self, "sts_fallback_regions")
415
414
 
416
415
  @sts_fallback_regions.setter
417
- def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
416
+ def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
418
417
  pulumi.set(self, "sts_fallback_regions", value)
419
418
 
420
- @property
419
+ @_builtins.property
421
420
  @pulumi.getter(name="stsRegion")
422
- def sts_region(self) -> Optional[pulumi.Input[builtins.str]]:
421
+ def sts_region(self) -> Optional[pulumi.Input[_builtins.str]]:
423
422
  """
424
423
  Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
425
424
  """
426
425
  return pulumi.get(self, "sts_region")
427
426
 
428
427
  @sts_region.setter
429
- def sts_region(self, value: Optional[pulumi.Input[builtins.str]]):
428
+ def sts_region(self, value: Optional[pulumi.Input[_builtins.str]]):
430
429
  pulumi.set(self, "sts_region", value)
431
430
 
432
- @property
431
+ @_builtins.property
433
432
  @pulumi.getter(name="usernameTemplate")
434
- def username_template(self) -> Optional[pulumi.Input[builtins.str]]:
433
+ def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
435
434
  """
436
435
  Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
437
436
 
@@ -447,75 +446,75 @@ class SecretBackendArgs:
447
446
  return pulumi.get(self, "username_template")
448
447
 
449
448
  @username_template.setter
450
- def username_template(self, value: Optional[pulumi.Input[builtins.str]]):
449
+ def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
451
450
  pulumi.set(self, "username_template", value)
452
451
 
453
452
 
454
453
  @pulumi.input_type
455
454
  class _SecretBackendState:
456
455
  def __init__(__self__, *,
457
- access_key: Optional[pulumi.Input[builtins.str]] = None,
458
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
459
- description: Optional[pulumi.Input[builtins.str]] = None,
460
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
461
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
462
- iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
463
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
464
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
465
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
466
- local: Optional[pulumi.Input[builtins.bool]] = None,
467
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
468
- namespace: Optional[pulumi.Input[builtins.str]] = None,
469
- path: Optional[pulumi.Input[builtins.str]] = None,
470
- region: Optional[pulumi.Input[builtins.str]] = None,
471
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
472
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
473
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
474
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
475
- secret_key: Optional[pulumi.Input[builtins.str]] = None,
476
- sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
477
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
478
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
479
- sts_region: Optional[pulumi.Input[builtins.str]] = None,
480
- username_template: Optional[pulumi.Input[builtins.str]] = None):
456
+ access_key: Optional[pulumi.Input[_builtins.str]] = None,
457
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
458
+ description: Optional[pulumi.Input[_builtins.str]] = None,
459
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
460
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
461
+ iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
462
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
463
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
464
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
465
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
466
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
467
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
468
+ path: Optional[pulumi.Input[_builtins.str]] = None,
469
+ region: Optional[pulumi.Input[_builtins.str]] = None,
470
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
471
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
472
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
473
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
474
+ secret_key: Optional[pulumi.Input[_builtins.str]] = None,
475
+ sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
476
+ sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
477
+ sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
478
+ sts_region: Optional[pulumi.Input[_builtins.str]] = None,
479
+ username_template: Optional[pulumi.Input[_builtins.str]] = None):
481
480
  """
482
481
  Input properties used for looking up and filtering SecretBackend resources.
483
- :param pulumi.Input[builtins.str] access_key: The AWS Access Key ID this backend should use to
482
+ :param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
484
483
  issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
485
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
484
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
486
485
  issued by this backend.
487
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
488
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
489
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
486
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
487
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
488
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
490
489
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
491
- :param pulumi.Input[builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
492
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
493
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
494
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
495
- :param pulumi.Input[builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
496
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
490
+ :param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
491
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
492
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
493
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
494
+ :param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
495
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
497
496
  for credentials issued by this backend.
498
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
497
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
499
498
  The value should not contain leading or trailing forward slashes.
500
499
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
501
500
  *Available only for Vault Enterprise*.
502
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
501
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
503
502
  not begin or end with a `/`. Defaults to `aws`.
504
- :param pulumi.Input[builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
505
- :param pulumi.Input[builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
506
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
503
+ :param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
504
+ :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
505
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
507
506
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
508
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
507
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
509
508
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
510
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
509
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
511
510
  a rotation when a scheduled token rotation occurs. The default rotation window is
512
511
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
513
- :param pulumi.Input[builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
514
- :param pulumi.Input[builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
515
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
516
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
517
- :param pulumi.Input[builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
518
- :param pulumi.Input[builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
512
+ :param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
513
+ :param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
514
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
515
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
516
+ :param pulumi.Input[_builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
517
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
519
518
 
520
519
  ```
521
520
  {{ if (eq .Type "STS") }}
@@ -575,9 +574,9 @@ class _SecretBackendState:
575
574
  if username_template is not None:
576
575
  pulumi.set(__self__, "username_template", username_template)
577
576
 
578
- @property
577
+ @_builtins.property
579
578
  @pulumi.getter(name="accessKey")
580
- def access_key(self) -> Optional[pulumi.Input[builtins.str]]:
579
+ def access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
581
580
  """
582
581
  The AWS Access Key ID this backend should use to
583
582
  issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
@@ -585,12 +584,12 @@ class _SecretBackendState:
585
584
  return pulumi.get(self, "access_key")
586
585
 
587
586
  @access_key.setter
588
- def access_key(self, value: Optional[pulumi.Input[builtins.str]]):
587
+ def access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
589
588
  pulumi.set(self, "access_key", value)
590
589
 
591
- @property
590
+ @_builtins.property
592
591
  @pulumi.getter(name="defaultLeaseTtlSeconds")
593
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
592
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
594
593
  """
595
594
  The default TTL for credentials
596
595
  issued by this backend.
@@ -598,36 +597,36 @@ class _SecretBackendState:
598
597
  return pulumi.get(self, "default_lease_ttl_seconds")
599
598
 
600
599
  @default_lease_ttl_seconds.setter
601
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
600
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
602
601
  pulumi.set(self, "default_lease_ttl_seconds", value)
603
602
 
604
- @property
603
+ @_builtins.property
605
604
  @pulumi.getter
606
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
605
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
607
606
  """
608
607
  A human-friendly description for this backend.
609
608
  """
610
609
  return pulumi.get(self, "description")
611
610
 
612
611
  @description.setter
613
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
612
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
614
613
  pulumi.set(self, "description", value)
615
614
 
616
- @property
615
+ @_builtins.property
617
616
  @pulumi.getter(name="disableAutomatedRotation")
618
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
617
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
619
618
  """
620
619
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
621
620
  """
622
621
  return pulumi.get(self, "disable_automated_rotation")
623
622
 
624
623
  @disable_automated_rotation.setter
625
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
624
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
626
625
  pulumi.set(self, "disable_automated_rotation", value)
627
626
 
628
- @property
627
+ @_builtins.property
629
628
  @pulumi.getter(name="disableRemount")
630
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
629
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
631
630
  """
632
631
  If set, opts out of mount migration on path updates.
633
632
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -635,72 +634,72 @@ class _SecretBackendState:
635
634
  return pulumi.get(self, "disable_remount")
636
635
 
637
636
  @disable_remount.setter
638
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
637
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
639
638
  pulumi.set(self, "disable_remount", value)
640
639
 
641
- @property
640
+ @_builtins.property
642
641
  @pulumi.getter(name="iamEndpoint")
643
- def iam_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
642
+ def iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
644
643
  """
645
644
  Specifies a custom HTTP IAM endpoint to use.
646
645
  """
647
646
  return pulumi.get(self, "iam_endpoint")
648
647
 
649
648
  @iam_endpoint.setter
650
- def iam_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
649
+ def iam_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
651
650
  pulumi.set(self, "iam_endpoint", value)
652
651
 
653
- @property
652
+ @_builtins.property
654
653
  @pulumi.getter(name="identityTokenAudience")
655
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
654
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
656
655
  """
657
656
  The audience claim value. Requires Vault 1.16+.
658
657
  """
659
658
  return pulumi.get(self, "identity_token_audience")
660
659
 
661
660
  @identity_token_audience.setter
662
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
661
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
663
662
  pulumi.set(self, "identity_token_audience", value)
664
663
 
665
- @property
664
+ @_builtins.property
666
665
  @pulumi.getter(name="identityTokenKey")
667
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
666
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
668
667
  """
669
668
  The key to use for signing identity tokens. Requires Vault 1.16+.
670
669
  """
671
670
  return pulumi.get(self, "identity_token_key")
672
671
 
673
672
  @identity_token_key.setter
674
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
673
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
675
674
  pulumi.set(self, "identity_token_key", value)
676
675
 
677
- @property
676
+ @_builtins.property
678
677
  @pulumi.getter(name="identityTokenTtl")
679
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
678
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
680
679
  """
681
680
  The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
682
681
  """
683
682
  return pulumi.get(self, "identity_token_ttl")
684
683
 
685
684
  @identity_token_ttl.setter
686
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
685
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
687
686
  pulumi.set(self, "identity_token_ttl", value)
688
687
 
689
- @property
688
+ @_builtins.property
690
689
  @pulumi.getter
691
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
690
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
692
691
  """
693
692
  Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
694
693
  """
695
694
  return pulumi.get(self, "local")
696
695
 
697
696
  @local.setter
698
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
697
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
699
698
  pulumi.set(self, "local", value)
700
699
 
701
- @property
700
+ @_builtins.property
702
701
  @pulumi.getter(name="maxLeaseTtlSeconds")
703
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
702
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
704
703
  """
705
704
  The maximum TTL that can be requested
706
705
  for credentials issued by this backend.
@@ -708,12 +707,12 @@ class _SecretBackendState:
708
707
  return pulumi.get(self, "max_lease_ttl_seconds")
709
708
 
710
709
  @max_lease_ttl_seconds.setter
711
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
710
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
712
711
  pulumi.set(self, "max_lease_ttl_seconds", value)
713
712
 
714
- @property
713
+ @_builtins.property
715
714
  @pulumi.getter
716
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
715
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
717
716
  """
718
717
  The namespace to provision the resource in.
719
718
  The value should not contain leading or trailing forward slashes.
@@ -723,12 +722,12 @@ class _SecretBackendState:
723
722
  return pulumi.get(self, "namespace")
724
723
 
725
724
  @namespace.setter
726
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
725
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
727
726
  pulumi.set(self, "namespace", value)
728
727
 
729
- @property
728
+ @_builtins.property
730
729
  @pulumi.getter
731
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
730
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
732
731
  """
733
732
  The unique path this backend should be mounted at. Must
734
733
  not begin or end with a `/`. Defaults to `aws`.
@@ -736,36 +735,36 @@ class _SecretBackendState:
736
735
  return pulumi.get(self, "path")
737
736
 
738
737
  @path.setter
739
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
738
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
740
739
  pulumi.set(self, "path", value)
741
740
 
742
- @property
741
+ @_builtins.property
743
742
  @pulumi.getter
744
- def region(self) -> Optional[pulumi.Input[builtins.str]]:
743
+ def region(self) -> Optional[pulumi.Input[_builtins.str]]:
745
744
  """
746
745
  The AWS region to make API calls against. Defaults to us-east-1.
747
746
  """
748
747
  return pulumi.get(self, "region")
749
748
 
750
749
  @region.setter
751
- def region(self, value: Optional[pulumi.Input[builtins.str]]):
750
+ def region(self, value: Optional[pulumi.Input[_builtins.str]]):
752
751
  pulumi.set(self, "region", value)
753
752
 
754
- @property
753
+ @_builtins.property
755
754
  @pulumi.getter(name="roleArn")
756
- def role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
755
+ def role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
757
756
  """
758
757
  Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
759
758
  """
760
759
  return pulumi.get(self, "role_arn")
761
760
 
762
761
  @role_arn.setter
763
- def role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
762
+ def role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
764
763
  pulumi.set(self, "role_arn", value)
765
764
 
766
- @property
765
+ @_builtins.property
767
766
  @pulumi.getter(name="rotationPeriod")
768
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
767
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
769
768
  """
770
769
  The amount of time in seconds Vault should wait before rotating the root credential.
771
770
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -773,12 +772,12 @@ class _SecretBackendState:
773
772
  return pulumi.get(self, "rotation_period")
774
773
 
775
774
  @rotation_period.setter
776
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
775
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
777
776
  pulumi.set(self, "rotation_period", value)
778
777
 
779
- @property
778
+ @_builtins.property
780
779
  @pulumi.getter(name="rotationSchedule")
781
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
780
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
782
781
  """
783
782
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
784
783
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -786,12 +785,12 @@ class _SecretBackendState:
786
785
  return pulumi.get(self, "rotation_schedule")
787
786
 
788
787
  @rotation_schedule.setter
789
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
788
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
790
789
  pulumi.set(self, "rotation_schedule", value)
791
790
 
792
- @property
791
+ @_builtins.property
793
792
  @pulumi.getter(name="rotationWindow")
794
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
793
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
795
794
  """
796
795
  The maximum amount of time in seconds allowed to complete
797
796
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -800,72 +799,72 @@ class _SecretBackendState:
800
799
  return pulumi.get(self, "rotation_window")
801
800
 
802
801
  @rotation_window.setter
803
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
802
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
804
803
  pulumi.set(self, "rotation_window", value)
805
804
 
806
- @property
805
+ @_builtins.property
807
806
  @pulumi.getter(name="secretKey")
808
- def secret_key(self) -> Optional[pulumi.Input[builtins.str]]:
807
+ def secret_key(self) -> Optional[pulumi.Input[_builtins.str]]:
809
808
  """
810
809
  The AWS Secret Access Key to use when generating new credentials.
811
810
  """
812
811
  return pulumi.get(self, "secret_key")
813
812
 
814
813
  @secret_key.setter
815
- def secret_key(self, value: Optional[pulumi.Input[builtins.str]]):
814
+ def secret_key(self, value: Optional[pulumi.Input[_builtins.str]]):
816
815
  pulumi.set(self, "secret_key", value)
817
816
 
818
- @property
817
+ @_builtins.property
819
818
  @pulumi.getter(name="stsEndpoint")
820
- def sts_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
819
+ def sts_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
821
820
  """
822
821
  Specifies a custom HTTP STS endpoint to use.
823
822
  """
824
823
  return pulumi.get(self, "sts_endpoint")
825
824
 
826
825
  @sts_endpoint.setter
827
- def sts_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
826
+ def sts_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
828
827
  pulumi.set(self, "sts_endpoint", value)
829
828
 
830
- @property
829
+ @_builtins.property
831
830
  @pulumi.getter(name="stsFallbackEndpoints")
832
- def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
831
+ def sts_fallback_endpoints(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
833
832
  """
834
833
  Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
835
834
  """
836
835
  return pulumi.get(self, "sts_fallback_endpoints")
837
836
 
838
837
  @sts_fallback_endpoints.setter
839
- def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
838
+ def sts_fallback_endpoints(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
840
839
  pulumi.set(self, "sts_fallback_endpoints", value)
841
840
 
842
- @property
841
+ @_builtins.property
843
842
  @pulumi.getter(name="stsFallbackRegions")
844
- def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
843
+ def sts_fallback_regions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
845
844
  """
846
845
  Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
847
846
  """
848
847
  return pulumi.get(self, "sts_fallback_regions")
849
848
 
850
849
  @sts_fallback_regions.setter
851
- def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
850
+ def sts_fallback_regions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
852
851
  pulumi.set(self, "sts_fallback_regions", value)
853
852
 
854
- @property
853
+ @_builtins.property
855
854
  @pulumi.getter(name="stsRegion")
856
- def sts_region(self) -> Optional[pulumi.Input[builtins.str]]:
855
+ def sts_region(self) -> Optional[pulumi.Input[_builtins.str]]:
857
856
  """
858
857
  Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
859
858
  """
860
859
  return pulumi.get(self, "sts_region")
861
860
 
862
861
  @sts_region.setter
863
- def sts_region(self, value: Optional[pulumi.Input[builtins.str]]):
862
+ def sts_region(self, value: Optional[pulumi.Input[_builtins.str]]):
864
863
  pulumi.set(self, "sts_region", value)
865
864
 
866
- @property
865
+ @_builtins.property
867
866
  @pulumi.getter(name="usernameTemplate")
868
- def username_template(self) -> Optional[pulumi.Input[builtins.str]]:
867
+ def username_template(self) -> Optional[pulumi.Input[_builtins.str]]:
869
868
  """
870
869
  Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
871
870
 
@@ -881,7 +880,7 @@ class _SecretBackendState:
881
880
  return pulumi.get(self, "username_template")
882
881
 
883
882
  @username_template.setter
884
- def username_template(self, value: Optional[pulumi.Input[builtins.str]]):
883
+ def username_template(self, value: Optional[pulumi.Input[_builtins.str]]):
885
884
  pulumi.set(self, "username_template", value)
886
885
 
887
886
 
@@ -891,30 +890,30 @@ class SecretBackend(pulumi.CustomResource):
891
890
  def __init__(__self__,
892
891
  resource_name: str,
893
892
  opts: Optional[pulumi.ResourceOptions] = None,
894
- access_key: Optional[pulumi.Input[builtins.str]] = None,
895
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
896
- description: Optional[pulumi.Input[builtins.str]] = None,
897
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
898
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
899
- iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
900
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
901
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
902
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
903
- local: Optional[pulumi.Input[builtins.bool]] = None,
904
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
905
- namespace: Optional[pulumi.Input[builtins.str]] = None,
906
- path: Optional[pulumi.Input[builtins.str]] = None,
907
- region: Optional[pulumi.Input[builtins.str]] = None,
908
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
909
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
910
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
911
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
912
- secret_key: Optional[pulumi.Input[builtins.str]] = None,
913
- sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
914
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
915
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
916
- sts_region: Optional[pulumi.Input[builtins.str]] = None,
917
- username_template: Optional[pulumi.Input[builtins.str]] = None,
893
+ access_key: Optional[pulumi.Input[_builtins.str]] = None,
894
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
895
+ description: Optional[pulumi.Input[_builtins.str]] = None,
896
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
897
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
898
+ iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
899
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
900
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
901
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
902
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
903
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
904
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
905
+ path: Optional[pulumi.Input[_builtins.str]] = None,
906
+ region: Optional[pulumi.Input[_builtins.str]] = None,
907
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
908
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
909
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
910
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
911
+ secret_key: Optional[pulumi.Input[_builtins.str]] = None,
912
+ sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
913
+ sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
914
+ sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
915
+ sts_region: Optional[pulumi.Input[_builtins.str]] = None,
916
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
918
917
  __props__=None):
919
918
  """
920
919
  ## Import
@@ -927,42 +926,42 @@ class SecretBackend(pulumi.CustomResource):
927
926
 
928
927
  :param str resource_name: The name of the resource.
929
928
  :param pulumi.ResourceOptions opts: Options for the resource.
930
- :param pulumi.Input[builtins.str] access_key: The AWS Access Key ID this backend should use to
929
+ :param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
931
930
  issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
932
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
931
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
933
932
  issued by this backend.
934
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
935
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
936
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
933
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
934
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
935
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
937
936
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
938
- :param pulumi.Input[builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
939
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
940
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
941
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
942
- :param pulumi.Input[builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
943
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
937
+ :param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
938
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
939
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
940
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
941
+ :param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
942
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
944
943
  for credentials issued by this backend.
945
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
944
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
946
945
  The value should not contain leading or trailing forward slashes.
947
946
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
948
947
  *Available only for Vault Enterprise*.
949
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
948
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
950
949
  not begin or end with a `/`. Defaults to `aws`.
951
- :param pulumi.Input[builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
952
- :param pulumi.Input[builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
953
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
950
+ :param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
951
+ :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
952
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
954
953
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
955
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
954
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
956
955
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
957
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
956
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
958
957
  a rotation when a scheduled token rotation occurs. The default rotation window is
959
958
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
960
- :param pulumi.Input[builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
961
- :param pulumi.Input[builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
962
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
963
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
964
- :param pulumi.Input[builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
965
- :param pulumi.Input[builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
959
+ :param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
960
+ :param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
961
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
962
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
963
+ :param pulumi.Input[_builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
964
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
966
965
 
967
966
  ```
968
967
  {{ if (eq .Type "STS") }}
@@ -1003,30 +1002,30 @@ class SecretBackend(pulumi.CustomResource):
1003
1002
  def _internal_init(__self__,
1004
1003
  resource_name: str,
1005
1004
  opts: Optional[pulumi.ResourceOptions] = None,
1006
- access_key: Optional[pulumi.Input[builtins.str]] = None,
1007
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1008
- description: Optional[pulumi.Input[builtins.str]] = None,
1009
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1010
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1011
- iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
1012
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
1013
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1014
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1015
- local: Optional[pulumi.Input[builtins.bool]] = None,
1016
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1017
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1018
- path: Optional[pulumi.Input[builtins.str]] = None,
1019
- region: Optional[pulumi.Input[builtins.str]] = None,
1020
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
1021
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1022
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1023
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1024
- secret_key: Optional[pulumi.Input[builtins.str]] = None,
1025
- sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
1026
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1027
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1028
- sts_region: Optional[pulumi.Input[builtins.str]] = None,
1029
- username_template: Optional[pulumi.Input[builtins.str]] = None,
1005
+ access_key: Optional[pulumi.Input[_builtins.str]] = None,
1006
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1007
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1008
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1009
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1010
+ iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
1011
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1012
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1013
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1014
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1015
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1016
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1017
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1018
+ region: Optional[pulumi.Input[_builtins.str]] = None,
1019
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
1020
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1021
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1022
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1023
+ secret_key: Optional[pulumi.Input[_builtins.str]] = None,
1024
+ sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
1025
+ sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1026
+ sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1027
+ sts_region: Optional[pulumi.Input[_builtins.str]] = None,
1028
+ username_template: Optional[pulumi.Input[_builtins.str]] = None,
1030
1029
  __props__=None):
1031
1030
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1032
1031
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1072,30 +1071,30 @@ class SecretBackend(pulumi.CustomResource):
1072
1071
  def get(resource_name: str,
1073
1072
  id: pulumi.Input[str],
1074
1073
  opts: Optional[pulumi.ResourceOptions] = None,
1075
- access_key: Optional[pulumi.Input[builtins.str]] = None,
1076
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1077
- description: Optional[pulumi.Input[builtins.str]] = None,
1078
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
1079
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
1080
- iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
1081
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
1082
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
1083
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1084
- local: Optional[pulumi.Input[builtins.bool]] = None,
1085
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
1086
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1087
- path: Optional[pulumi.Input[builtins.str]] = None,
1088
- region: Optional[pulumi.Input[builtins.str]] = None,
1089
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
1090
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
1091
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
1092
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1093
- secret_key: Optional[pulumi.Input[builtins.str]] = None,
1094
- sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
1095
- sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1096
- sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1097
- sts_region: Optional[pulumi.Input[builtins.str]] = None,
1098
- username_template: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
1074
+ access_key: Optional[pulumi.Input[_builtins.str]] = None,
1075
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1076
+ description: Optional[pulumi.Input[_builtins.str]] = None,
1077
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
1078
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
1079
+ iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
1080
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
1081
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
1082
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1083
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
1084
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
1085
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1086
+ path: Optional[pulumi.Input[_builtins.str]] = None,
1087
+ region: Optional[pulumi.Input[_builtins.str]] = None,
1088
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
1089
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
1090
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
1091
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
1092
+ secret_key: Optional[pulumi.Input[_builtins.str]] = None,
1093
+ sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
1094
+ sts_fallback_endpoints: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1095
+ sts_fallback_regions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1096
+ sts_region: Optional[pulumi.Input[_builtins.str]] = None,
1097
+ username_template: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
1099
1098
  """
1100
1099
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
1101
1100
  properties used to qualify the lookup.
@@ -1103,42 +1102,42 @@ class SecretBackend(pulumi.CustomResource):
1103
1102
  :param str resource_name: The unique name of the resulting resource.
1104
1103
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1105
1104
  :param pulumi.ResourceOptions opts: Options for the resource.
1106
- :param pulumi.Input[builtins.str] access_key: The AWS Access Key ID this backend should use to
1105
+ :param pulumi.Input[_builtins.str] access_key: The AWS Access Key ID this backend should use to
1107
1106
  issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
1108
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
1107
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
1109
1108
  issued by this backend.
1110
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
1111
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1112
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1109
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
1110
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1111
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1113
1112
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1114
- :param pulumi.Input[builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
1115
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
1116
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
1117
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
1118
- :param pulumi.Input[builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
1119
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
1113
+ :param pulumi.Input[_builtins.str] iam_endpoint: Specifies a custom HTTP IAM endpoint to use.
1114
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.16+.
1115
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.16+.
1116
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
1117
+ :param pulumi.Input[_builtins.bool] local: Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
1118
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
1120
1119
  for credentials issued by this backend.
1121
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1120
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1122
1121
  The value should not contain leading or trailing forward slashes.
1123
1122
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1124
1123
  *Available only for Vault Enterprise*.
1125
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
1124
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
1126
1125
  not begin or end with a `/`. Defaults to `aws`.
1127
- :param pulumi.Input[builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
1128
- :param pulumi.Input[builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
1129
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1126
+ :param pulumi.Input[_builtins.str] region: The AWS region to make API calls against. Defaults to us-east-1.
1127
+ :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
1128
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1130
1129
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1131
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1130
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1132
1131
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1133
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1132
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1134
1133
  a rotation when a scheduled token rotation occurs. The default rotation window is
1135
1134
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1136
- :param pulumi.Input[builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
1137
- :param pulumi.Input[builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
1138
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
1139
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
1140
- :param pulumi.Input[builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
1141
- :param pulumi.Input[builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
1135
+ :param pulumi.Input[_builtins.str] secret_key: The AWS Secret Access Key to use when generating new credentials.
1136
+ :param pulumi.Input[_builtins.str] sts_endpoint: Specifies a custom HTTP STS endpoint to use.
1137
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_endpoints: Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
1138
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] sts_fallback_regions: Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
1139
+ :param pulumi.Input[_builtins.str] sts_region: Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
1140
+ :param pulumi.Input[_builtins.str] username_template: Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
1142
1141
 
1143
1142
  ```
1144
1143
  {{ if (eq .Type "STS") }}
@@ -1179,101 +1178,101 @@ class SecretBackend(pulumi.CustomResource):
1179
1178
  __props__.__dict__["username_template"] = username_template
1180
1179
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
1181
1180
 
1182
- @property
1181
+ @_builtins.property
1183
1182
  @pulumi.getter(name="accessKey")
1184
- def access_key(self) -> pulumi.Output[Optional[builtins.str]]:
1183
+ def access_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1185
1184
  """
1186
1185
  The AWS Access Key ID this backend should use to
1187
1186
  issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
1188
1187
  """
1189
1188
  return pulumi.get(self, "access_key")
1190
1189
 
1191
- @property
1190
+ @_builtins.property
1192
1191
  @pulumi.getter(name="defaultLeaseTtlSeconds")
1193
- def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1192
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1194
1193
  """
1195
1194
  The default TTL for credentials
1196
1195
  issued by this backend.
1197
1196
  """
1198
1197
  return pulumi.get(self, "default_lease_ttl_seconds")
1199
1198
 
1200
- @property
1199
+ @_builtins.property
1201
1200
  @pulumi.getter
1202
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1201
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1203
1202
  """
1204
1203
  A human-friendly description for this backend.
1205
1204
  """
1206
1205
  return pulumi.get(self, "description")
1207
1206
 
1208
- @property
1207
+ @_builtins.property
1209
1208
  @pulumi.getter(name="disableAutomatedRotation")
1210
- def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
1209
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
1211
1210
  """
1212
1211
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1213
1212
  """
1214
1213
  return pulumi.get(self, "disable_automated_rotation")
1215
1214
 
1216
- @property
1215
+ @_builtins.property
1217
1216
  @pulumi.getter(name="disableRemount")
1218
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1217
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1219
1218
  """
1220
1219
  If set, opts out of mount migration on path updates.
1221
1220
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1222
1221
  """
1223
1222
  return pulumi.get(self, "disable_remount")
1224
1223
 
1225
- @property
1224
+ @_builtins.property
1226
1225
  @pulumi.getter(name="iamEndpoint")
1227
- def iam_endpoint(self) -> pulumi.Output[Optional[builtins.str]]:
1226
+ def iam_endpoint(self) -> pulumi.Output[Optional[_builtins.str]]:
1228
1227
  """
1229
1228
  Specifies a custom HTTP IAM endpoint to use.
1230
1229
  """
1231
1230
  return pulumi.get(self, "iam_endpoint")
1232
1231
 
1233
- @property
1232
+ @_builtins.property
1234
1233
  @pulumi.getter(name="identityTokenAudience")
1235
- def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
1234
+ def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
1236
1235
  """
1237
1236
  The audience claim value. Requires Vault 1.16+.
1238
1237
  """
1239
1238
  return pulumi.get(self, "identity_token_audience")
1240
1239
 
1241
- @property
1240
+ @_builtins.property
1242
1241
  @pulumi.getter(name="identityTokenKey")
1243
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1242
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1244
1243
  """
1245
1244
  The key to use for signing identity tokens. Requires Vault 1.16+.
1246
1245
  """
1247
1246
  return pulumi.get(self, "identity_token_key")
1248
1247
 
1249
- @property
1248
+ @_builtins.property
1250
1249
  @pulumi.getter(name="identityTokenTtl")
1251
- def identity_token_ttl(self) -> pulumi.Output[builtins.int]:
1250
+ def identity_token_ttl(self) -> pulumi.Output[_builtins.int]:
1252
1251
  """
1253
1252
  The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
1254
1253
  """
1255
1254
  return pulumi.get(self, "identity_token_ttl")
1256
1255
 
1257
- @property
1256
+ @_builtins.property
1258
1257
  @pulumi.getter
1259
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1258
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1260
1259
  """
1261
1260
  Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
1262
1261
  """
1263
1262
  return pulumi.get(self, "local")
1264
1263
 
1265
- @property
1264
+ @_builtins.property
1266
1265
  @pulumi.getter(name="maxLeaseTtlSeconds")
1267
- def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
1266
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
1268
1267
  """
1269
1268
  The maximum TTL that can be requested
1270
1269
  for credentials issued by this backend.
1271
1270
  """
1272
1271
  return pulumi.get(self, "max_lease_ttl_seconds")
1273
1272
 
1274
- @property
1273
+ @_builtins.property
1275
1274
  @pulumi.getter
1276
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1275
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1277
1276
  """
1278
1277
  The namespace to provision the resource in.
1279
1278
  The value should not contain leading or trailing forward slashes.
@@ -1282,52 +1281,52 @@ class SecretBackend(pulumi.CustomResource):
1282
1281
  """
1283
1282
  return pulumi.get(self, "namespace")
1284
1283
 
1285
- @property
1284
+ @_builtins.property
1286
1285
  @pulumi.getter
1287
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
1286
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1288
1287
  """
1289
1288
  The unique path this backend should be mounted at. Must
1290
1289
  not begin or end with a `/`. Defaults to `aws`.
1291
1290
  """
1292
1291
  return pulumi.get(self, "path")
1293
1292
 
1294
- @property
1293
+ @_builtins.property
1295
1294
  @pulumi.getter
1296
- def region(self) -> pulumi.Output[builtins.str]:
1295
+ def region(self) -> pulumi.Output[_builtins.str]:
1297
1296
  """
1298
1297
  The AWS region to make API calls against. Defaults to us-east-1.
1299
1298
  """
1300
1299
  return pulumi.get(self, "region")
1301
1300
 
1302
- @property
1301
+ @_builtins.property
1303
1302
  @pulumi.getter(name="roleArn")
1304
- def role_arn(self) -> pulumi.Output[Optional[builtins.str]]:
1303
+ def role_arn(self) -> pulumi.Output[Optional[_builtins.str]]:
1305
1304
  """
1306
1305
  Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
1307
1306
  """
1308
1307
  return pulumi.get(self, "role_arn")
1309
1308
 
1310
- @property
1309
+ @_builtins.property
1311
1310
  @pulumi.getter(name="rotationPeriod")
1312
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
1311
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1313
1312
  """
1314
1313
  The amount of time in seconds Vault should wait before rotating the root credential.
1315
1314
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1316
1315
  """
1317
1316
  return pulumi.get(self, "rotation_period")
1318
1317
 
1319
- @property
1318
+ @_builtins.property
1320
1319
  @pulumi.getter(name="rotationSchedule")
1321
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
1320
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
1322
1321
  """
1323
1322
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1324
1323
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1325
1324
  """
1326
1325
  return pulumi.get(self, "rotation_schedule")
1327
1326
 
1328
- @property
1327
+ @_builtins.property
1329
1328
  @pulumi.getter(name="rotationWindow")
1330
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
1329
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
1331
1330
  """
1332
1331
  The maximum amount of time in seconds allowed to complete
1333
1332
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1335,49 +1334,49 @@ class SecretBackend(pulumi.CustomResource):
1335
1334
  """
1336
1335
  return pulumi.get(self, "rotation_window")
1337
1336
 
1338
- @property
1337
+ @_builtins.property
1339
1338
  @pulumi.getter(name="secretKey")
1340
- def secret_key(self) -> pulumi.Output[Optional[builtins.str]]:
1339
+ def secret_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1341
1340
  """
1342
1341
  The AWS Secret Access Key to use when generating new credentials.
1343
1342
  """
1344
1343
  return pulumi.get(self, "secret_key")
1345
1344
 
1346
- @property
1345
+ @_builtins.property
1347
1346
  @pulumi.getter(name="stsEndpoint")
1348
- def sts_endpoint(self) -> pulumi.Output[Optional[builtins.str]]:
1347
+ def sts_endpoint(self) -> pulumi.Output[Optional[_builtins.str]]:
1349
1348
  """
1350
1349
  Specifies a custom HTTP STS endpoint to use.
1351
1350
  """
1352
1351
  return pulumi.get(self, "sts_endpoint")
1353
1352
 
1354
- @property
1353
+ @_builtins.property
1355
1354
  @pulumi.getter(name="stsFallbackEndpoints")
1356
- def sts_fallback_endpoints(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1355
+ def sts_fallback_endpoints(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1357
1356
  """
1358
1357
  Ordered list of `sts_endpoint`s to try if the defined one fails. Requires Vault 1.19+
1359
1358
  """
1360
1359
  return pulumi.get(self, "sts_fallback_endpoints")
1361
1360
 
1362
- @property
1361
+ @_builtins.property
1363
1362
  @pulumi.getter(name="stsFallbackRegions")
1364
- def sts_fallback_regions(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1363
+ def sts_fallback_regions(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1365
1364
  """
1366
1365
  Ordered list of `sts_region`s matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
1367
1366
  """
1368
1367
  return pulumi.get(self, "sts_fallback_regions")
1369
1368
 
1370
- @property
1369
+ @_builtins.property
1371
1370
  @pulumi.getter(name="stsRegion")
1372
- def sts_region(self) -> pulumi.Output[Optional[builtins.str]]:
1371
+ def sts_region(self) -> pulumi.Output[Optional[_builtins.str]]:
1373
1372
  """
1374
1373
  Specifies the region of the STS endpoint. Should be included if `sts_endpoint` is supplied. Requires Vault 1.19+
1375
1374
  """
1376
1375
  return pulumi.get(self, "sts_region")
1377
1376
 
1378
- @property
1377
+ @_builtins.property
1379
1378
  @pulumi.getter(name="usernameTemplate")
1380
- def username_template(self) -> pulumi.Output[builtins.str]:
1379
+ def username_template(self) -> pulumi.Output[_builtins.str]:
1381
1380
  """
1382
1381
  Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:
1383
1382