pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,52 +19,52 @@ __all__ = ['BackendArgs', 'Backend']
20
19
  @pulumi.input_type
21
20
  class BackendArgs:
22
21
  def __init__(__self__, *,
23
- subscription_id: pulumi.Input[builtins.str],
24
- tenant_id: pulumi.Input[builtins.str],
25
- client_id: Optional[pulumi.Input[builtins.str]] = None,
26
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
27
- description: Optional[pulumi.Input[builtins.str]] = None,
28
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
29
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
30
- environment: Optional[pulumi.Input[builtins.str]] = None,
31
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
32
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
33
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
34
- namespace: Optional[pulumi.Input[builtins.str]] = None,
35
- path: Optional[pulumi.Input[builtins.str]] = None,
36
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
37
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
38
- rotation_window: Optional[pulumi.Input[builtins.int]] = None):
22
+ subscription_id: pulumi.Input[_builtins.str],
23
+ tenant_id: pulumi.Input[_builtins.str],
24
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
25
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
26
+ description: Optional[pulumi.Input[_builtins.str]] = None,
27
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
29
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
30
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
31
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
32
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
33
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
34
+ path: Optional[pulumi.Input[_builtins.str]] = None,
35
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
36
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
37
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None):
39
38
  """
40
39
  The set of arguments for constructing a Backend resource.
41
- :param pulumi.Input[builtins.str] subscription_id: The subscription id for the Azure Active Directory.
42
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory.
43
- :param pulumi.Input[builtins.str] client_id: The OAuth2 client id to connect to Azure.
44
- :param pulumi.Input[builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
45
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
46
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
40
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
41
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
42
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
43
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
44
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
45
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
47
46
  *Available only for Vault Enterprise*
48
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
47
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
49
48
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
50
- :param pulumi.Input[builtins.str] environment: The Azure environment.
51
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
49
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
50
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
52
51
  *Available only for Vault Enterprise*
53
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
52
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
54
53
  *Available only for Vault Enterprise*
55
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
54
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
56
55
  *Available only for Vault Enterprise*
57
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
56
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
58
57
  The value should not contain leading or trailing forward slashes.
59
58
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
60
59
  *Available only for Vault Enterprise*.
61
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
62
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
60
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
61
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
63
62
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
64
63
  *Available only for Vault Enterprise*
65
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
64
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
66
65
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
67
66
  *Available only for Vault Enterprise*
68
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
67
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
69
68
  a rotation when a scheduled token rotation occurs. The default rotation window is
70
69
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
71
70
  """
@@ -100,69 +99,69 @@ class BackendArgs:
100
99
  if rotation_window is not None:
101
100
  pulumi.set(__self__, "rotation_window", rotation_window)
102
101
 
103
- @property
102
+ @_builtins.property
104
103
  @pulumi.getter(name="subscriptionId")
105
- def subscription_id(self) -> pulumi.Input[builtins.str]:
104
+ def subscription_id(self) -> pulumi.Input[_builtins.str]:
106
105
  """
107
106
  The subscription id for the Azure Active Directory.
108
107
  """
109
108
  return pulumi.get(self, "subscription_id")
110
109
 
111
110
  @subscription_id.setter
112
- def subscription_id(self, value: pulumi.Input[builtins.str]):
111
+ def subscription_id(self, value: pulumi.Input[_builtins.str]):
113
112
  pulumi.set(self, "subscription_id", value)
114
113
 
115
- @property
114
+ @_builtins.property
116
115
  @pulumi.getter(name="tenantId")
117
- def tenant_id(self) -> pulumi.Input[builtins.str]:
116
+ def tenant_id(self) -> pulumi.Input[_builtins.str]:
118
117
  """
119
118
  The tenant id for the Azure Active Directory.
120
119
  """
121
120
  return pulumi.get(self, "tenant_id")
122
121
 
123
122
  @tenant_id.setter
124
- def tenant_id(self, value: pulumi.Input[builtins.str]):
123
+ def tenant_id(self, value: pulumi.Input[_builtins.str]):
125
124
  pulumi.set(self, "tenant_id", value)
126
125
 
127
- @property
126
+ @_builtins.property
128
127
  @pulumi.getter(name="clientId")
129
- def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
128
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
130
129
  """
131
130
  The OAuth2 client id to connect to Azure.
132
131
  """
133
132
  return pulumi.get(self, "client_id")
134
133
 
135
134
  @client_id.setter
136
- def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
135
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
137
136
  pulumi.set(self, "client_id", value)
138
137
 
139
- @property
138
+ @_builtins.property
140
139
  @pulumi.getter(name="clientSecret")
141
- def client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
140
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
142
141
  """
143
142
  The OAuth2 client secret to connect to Azure.
144
143
  """
145
144
  return pulumi.get(self, "client_secret")
146
145
 
147
146
  @client_secret.setter
148
- def client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
147
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
149
148
  pulumi.set(self, "client_secret", value)
150
149
 
151
- @property
150
+ @_builtins.property
152
151
  @pulumi.getter
153
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
152
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
154
153
  """
155
154
  Human-friendly description of the mount for the backend.
156
155
  """
157
156
  return pulumi.get(self, "description")
158
157
 
159
158
  @description.setter
160
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
159
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
161
160
  pulumi.set(self, "description", value)
162
161
 
163
- @property
162
+ @_builtins.property
164
163
  @pulumi.getter(name="disableAutomatedRotation")
165
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
164
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
166
165
  """
167
166
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
168
167
  *Available only for Vault Enterprise*
@@ -170,12 +169,12 @@ class BackendArgs:
170
169
  return pulumi.get(self, "disable_automated_rotation")
171
170
 
172
171
  @disable_automated_rotation.setter
173
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
172
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
174
173
  pulumi.set(self, "disable_automated_rotation", value)
175
174
 
176
- @property
175
+ @_builtins.property
177
176
  @pulumi.getter(name="disableRemount")
178
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
177
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
179
178
  """
180
179
  If set, opts out of mount migration on path updates.
181
180
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -183,24 +182,24 @@ class BackendArgs:
183
182
  return pulumi.get(self, "disable_remount")
184
183
 
185
184
  @disable_remount.setter
186
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
185
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
187
186
  pulumi.set(self, "disable_remount", value)
188
187
 
189
- @property
188
+ @_builtins.property
190
189
  @pulumi.getter
191
- def environment(self) -> Optional[pulumi.Input[builtins.str]]:
190
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
192
191
  """
193
192
  The Azure environment.
194
193
  """
195
194
  return pulumi.get(self, "environment")
196
195
 
197
196
  @environment.setter
198
- def environment(self, value: Optional[pulumi.Input[builtins.str]]):
197
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
199
198
  pulumi.set(self, "environment", value)
200
199
 
201
- @property
200
+ @_builtins.property
202
201
  @pulumi.getter(name="identityTokenAudience")
203
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
202
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
204
203
  """
205
204
  The audience claim value. Requires Vault 1.17+.
206
205
  *Available only for Vault Enterprise*
@@ -208,12 +207,12 @@ class BackendArgs:
208
207
  return pulumi.get(self, "identity_token_audience")
209
208
 
210
209
  @identity_token_audience.setter
211
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
210
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
212
211
  pulumi.set(self, "identity_token_audience", value)
213
212
 
214
- @property
213
+ @_builtins.property
215
214
  @pulumi.getter(name="identityTokenKey")
216
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
215
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
217
216
  """
218
217
  The key to use for signing identity tokens. Requires Vault 1.17+.
219
218
  *Available only for Vault Enterprise*
@@ -221,12 +220,12 @@ class BackendArgs:
221
220
  return pulumi.get(self, "identity_token_key")
222
221
 
223
222
  @identity_token_key.setter
224
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
223
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
225
224
  pulumi.set(self, "identity_token_key", value)
226
225
 
227
- @property
226
+ @_builtins.property
228
227
  @pulumi.getter(name="identityTokenTtl")
229
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
228
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
230
229
  """
231
230
  The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
232
231
  *Available only for Vault Enterprise*
@@ -234,12 +233,12 @@ class BackendArgs:
234
233
  return pulumi.get(self, "identity_token_ttl")
235
234
 
236
235
  @identity_token_ttl.setter
237
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
236
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
238
237
  pulumi.set(self, "identity_token_ttl", value)
239
238
 
240
- @property
239
+ @_builtins.property
241
240
  @pulumi.getter
242
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
241
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
243
242
  """
244
243
  The namespace to provision the resource in.
245
244
  The value should not contain leading or trailing forward slashes.
@@ -249,24 +248,24 @@ class BackendArgs:
249
248
  return pulumi.get(self, "namespace")
250
249
 
251
250
  @namespace.setter
252
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
251
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
253
252
  pulumi.set(self, "namespace", value)
254
253
 
255
- @property
254
+ @_builtins.property
256
255
  @pulumi.getter
257
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
256
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
258
257
  """
259
258
  The unique path this backend should be mounted at. Defaults to `azure`.
260
259
  """
261
260
  return pulumi.get(self, "path")
262
261
 
263
262
  @path.setter
264
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
263
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
265
264
  pulumi.set(self, "path", value)
266
265
 
267
- @property
266
+ @_builtins.property
268
267
  @pulumi.getter(name="rotationPeriod")
269
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
268
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
270
269
  """
271
270
  The amount of time in seconds Vault should wait before rotating the root credential.
272
271
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -275,12 +274,12 @@ class BackendArgs:
275
274
  return pulumi.get(self, "rotation_period")
276
275
 
277
276
  @rotation_period.setter
278
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
277
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
279
278
  pulumi.set(self, "rotation_period", value)
280
279
 
281
- @property
280
+ @_builtins.property
282
281
  @pulumi.getter(name="rotationSchedule")
283
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
282
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
284
283
  """
285
284
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
286
285
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -289,12 +288,12 @@ class BackendArgs:
289
288
  return pulumi.get(self, "rotation_schedule")
290
289
 
291
290
  @rotation_schedule.setter
292
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
291
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
293
292
  pulumi.set(self, "rotation_schedule", value)
294
293
 
295
- @property
294
+ @_builtins.property
296
295
  @pulumi.getter(name="rotationWindow")
297
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
296
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
298
297
  """
299
298
  The maximum amount of time in seconds allowed to complete
300
299
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -303,61 +302,61 @@ class BackendArgs:
303
302
  return pulumi.get(self, "rotation_window")
304
303
 
305
304
  @rotation_window.setter
306
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
305
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
307
306
  pulumi.set(self, "rotation_window", value)
308
307
 
309
308
 
310
309
  @pulumi.input_type
311
310
  class _BackendState:
312
311
  def __init__(__self__, *,
313
- client_id: Optional[pulumi.Input[builtins.str]] = None,
314
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
315
- description: Optional[pulumi.Input[builtins.str]] = None,
316
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
317
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
318
- environment: Optional[pulumi.Input[builtins.str]] = None,
319
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
320
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
321
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
322
- namespace: Optional[pulumi.Input[builtins.str]] = None,
323
- path: Optional[pulumi.Input[builtins.str]] = None,
324
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
325
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
326
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
327
- subscription_id: Optional[pulumi.Input[builtins.str]] = None,
328
- tenant_id: Optional[pulumi.Input[builtins.str]] = None):
312
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
313
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
314
+ description: Optional[pulumi.Input[_builtins.str]] = None,
315
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
316
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
317
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
318
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
319
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
320
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
321
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
322
+ path: Optional[pulumi.Input[_builtins.str]] = None,
323
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
324
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
325
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
326
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
327
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None):
329
328
  """
330
329
  Input properties used for looking up and filtering Backend resources.
331
- :param pulumi.Input[builtins.str] client_id: The OAuth2 client id to connect to Azure.
332
- :param pulumi.Input[builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
333
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
334
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
330
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
331
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
332
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
333
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
335
334
  *Available only for Vault Enterprise*
336
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
335
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
337
336
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
338
- :param pulumi.Input[builtins.str] environment: The Azure environment.
339
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
337
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
338
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
340
339
  *Available only for Vault Enterprise*
341
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
340
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
342
341
  *Available only for Vault Enterprise*
343
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
342
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
344
343
  *Available only for Vault Enterprise*
345
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
344
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
346
345
  The value should not contain leading or trailing forward slashes.
347
346
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
348
347
  *Available only for Vault Enterprise*.
349
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
350
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
348
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
349
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
351
350
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
352
351
  *Available only for Vault Enterprise*
353
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
352
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
354
353
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
355
354
  *Available only for Vault Enterprise*
356
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
355
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
357
356
  a rotation when a scheduled token rotation occurs. The default rotation window is
358
357
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
359
- :param pulumi.Input[builtins.str] subscription_id: The subscription id for the Azure Active Directory.
360
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory.
358
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
359
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
361
360
  """
362
361
  if client_id is not None:
363
362
  pulumi.set(__self__, "client_id", client_id)
@@ -392,45 +391,45 @@ class _BackendState:
392
391
  if tenant_id is not None:
393
392
  pulumi.set(__self__, "tenant_id", tenant_id)
394
393
 
395
- @property
394
+ @_builtins.property
396
395
  @pulumi.getter(name="clientId")
397
- def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
396
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
398
397
  """
399
398
  The OAuth2 client id to connect to Azure.
400
399
  """
401
400
  return pulumi.get(self, "client_id")
402
401
 
403
402
  @client_id.setter
404
- def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
403
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
405
404
  pulumi.set(self, "client_id", value)
406
405
 
407
- @property
406
+ @_builtins.property
408
407
  @pulumi.getter(name="clientSecret")
409
- def client_secret(self) -> Optional[pulumi.Input[builtins.str]]:
408
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
410
409
  """
411
410
  The OAuth2 client secret to connect to Azure.
412
411
  """
413
412
  return pulumi.get(self, "client_secret")
414
413
 
415
414
  @client_secret.setter
416
- def client_secret(self, value: Optional[pulumi.Input[builtins.str]]):
415
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
417
416
  pulumi.set(self, "client_secret", value)
418
417
 
419
- @property
418
+ @_builtins.property
420
419
  @pulumi.getter
421
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
420
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
422
421
  """
423
422
  Human-friendly description of the mount for the backend.
424
423
  """
425
424
  return pulumi.get(self, "description")
426
425
 
427
426
  @description.setter
428
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
427
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
429
428
  pulumi.set(self, "description", value)
430
429
 
431
- @property
430
+ @_builtins.property
432
431
  @pulumi.getter(name="disableAutomatedRotation")
433
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
432
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
434
433
  """
435
434
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
436
435
  *Available only for Vault Enterprise*
@@ -438,12 +437,12 @@ class _BackendState:
438
437
  return pulumi.get(self, "disable_automated_rotation")
439
438
 
440
439
  @disable_automated_rotation.setter
441
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
440
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
442
441
  pulumi.set(self, "disable_automated_rotation", value)
443
442
 
444
- @property
443
+ @_builtins.property
445
444
  @pulumi.getter(name="disableRemount")
446
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
445
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
447
446
  """
448
447
  If set, opts out of mount migration on path updates.
449
448
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -451,24 +450,24 @@ class _BackendState:
451
450
  return pulumi.get(self, "disable_remount")
452
451
 
453
452
  @disable_remount.setter
454
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
453
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
455
454
  pulumi.set(self, "disable_remount", value)
456
455
 
457
- @property
456
+ @_builtins.property
458
457
  @pulumi.getter
459
- def environment(self) -> Optional[pulumi.Input[builtins.str]]:
458
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
460
459
  """
461
460
  The Azure environment.
462
461
  """
463
462
  return pulumi.get(self, "environment")
464
463
 
465
464
  @environment.setter
466
- def environment(self, value: Optional[pulumi.Input[builtins.str]]):
465
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
467
466
  pulumi.set(self, "environment", value)
468
467
 
469
- @property
468
+ @_builtins.property
470
469
  @pulumi.getter(name="identityTokenAudience")
471
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
470
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
472
471
  """
473
472
  The audience claim value. Requires Vault 1.17+.
474
473
  *Available only for Vault Enterprise*
@@ -476,12 +475,12 @@ class _BackendState:
476
475
  return pulumi.get(self, "identity_token_audience")
477
476
 
478
477
  @identity_token_audience.setter
479
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
478
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
480
479
  pulumi.set(self, "identity_token_audience", value)
481
480
 
482
- @property
481
+ @_builtins.property
483
482
  @pulumi.getter(name="identityTokenKey")
484
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
483
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
485
484
  """
486
485
  The key to use for signing identity tokens. Requires Vault 1.17+.
487
486
  *Available only for Vault Enterprise*
@@ -489,12 +488,12 @@ class _BackendState:
489
488
  return pulumi.get(self, "identity_token_key")
490
489
 
491
490
  @identity_token_key.setter
492
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
491
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
493
492
  pulumi.set(self, "identity_token_key", value)
494
493
 
495
- @property
494
+ @_builtins.property
496
495
  @pulumi.getter(name="identityTokenTtl")
497
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
496
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
498
497
  """
499
498
  The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
500
499
  *Available only for Vault Enterprise*
@@ -502,12 +501,12 @@ class _BackendState:
502
501
  return pulumi.get(self, "identity_token_ttl")
503
502
 
504
503
  @identity_token_ttl.setter
505
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
504
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
506
505
  pulumi.set(self, "identity_token_ttl", value)
507
506
 
508
- @property
507
+ @_builtins.property
509
508
  @pulumi.getter
510
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
509
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
511
510
  """
512
511
  The namespace to provision the resource in.
513
512
  The value should not contain leading or trailing forward slashes.
@@ -517,24 +516,24 @@ class _BackendState:
517
516
  return pulumi.get(self, "namespace")
518
517
 
519
518
  @namespace.setter
520
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
519
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
521
520
  pulumi.set(self, "namespace", value)
522
521
 
523
- @property
522
+ @_builtins.property
524
523
  @pulumi.getter
525
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
524
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
526
525
  """
527
526
  The unique path this backend should be mounted at. Defaults to `azure`.
528
527
  """
529
528
  return pulumi.get(self, "path")
530
529
 
531
530
  @path.setter
532
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
531
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
533
532
  pulumi.set(self, "path", value)
534
533
 
535
- @property
534
+ @_builtins.property
536
535
  @pulumi.getter(name="rotationPeriod")
537
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
536
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
538
537
  """
539
538
  The amount of time in seconds Vault should wait before rotating the root credential.
540
539
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -543,12 +542,12 @@ class _BackendState:
543
542
  return pulumi.get(self, "rotation_period")
544
543
 
545
544
  @rotation_period.setter
546
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
545
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
547
546
  pulumi.set(self, "rotation_period", value)
548
547
 
549
- @property
548
+ @_builtins.property
550
549
  @pulumi.getter(name="rotationSchedule")
551
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
550
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
552
551
  """
553
552
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
554
553
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -557,12 +556,12 @@ class _BackendState:
557
556
  return pulumi.get(self, "rotation_schedule")
558
557
 
559
558
  @rotation_schedule.setter
560
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
559
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
561
560
  pulumi.set(self, "rotation_schedule", value)
562
561
 
563
- @property
562
+ @_builtins.property
564
563
  @pulumi.getter(name="rotationWindow")
565
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
564
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
566
565
  """
567
566
  The maximum amount of time in seconds allowed to complete
568
567
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -571,31 +570,31 @@ class _BackendState:
571
570
  return pulumi.get(self, "rotation_window")
572
571
 
573
572
  @rotation_window.setter
574
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
573
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
575
574
  pulumi.set(self, "rotation_window", value)
576
575
 
577
- @property
576
+ @_builtins.property
578
577
  @pulumi.getter(name="subscriptionId")
579
- def subscription_id(self) -> Optional[pulumi.Input[builtins.str]]:
578
+ def subscription_id(self) -> Optional[pulumi.Input[_builtins.str]]:
580
579
  """
581
580
  The subscription id for the Azure Active Directory.
582
581
  """
583
582
  return pulumi.get(self, "subscription_id")
584
583
 
585
584
  @subscription_id.setter
586
- def subscription_id(self, value: Optional[pulumi.Input[builtins.str]]):
585
+ def subscription_id(self, value: Optional[pulumi.Input[_builtins.str]]):
587
586
  pulumi.set(self, "subscription_id", value)
588
587
 
589
- @property
588
+ @_builtins.property
590
589
  @pulumi.getter(name="tenantId")
591
- def tenant_id(self) -> Optional[pulumi.Input[builtins.str]]:
590
+ def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
592
591
  """
593
592
  The tenant id for the Azure Active Directory.
594
593
  """
595
594
  return pulumi.get(self, "tenant_id")
596
595
 
597
596
  @tenant_id.setter
598
- def tenant_id(self, value: Optional[pulumi.Input[builtins.str]]):
597
+ def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
599
598
  pulumi.set(self, "tenant_id", value)
600
599
 
601
600
 
@@ -605,22 +604,22 @@ class Backend(pulumi.CustomResource):
605
604
  def __init__(__self__,
606
605
  resource_name: str,
607
606
  opts: Optional[pulumi.ResourceOptions] = None,
608
- client_id: Optional[pulumi.Input[builtins.str]] = None,
609
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
610
- description: Optional[pulumi.Input[builtins.str]] = None,
611
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
612
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
613
- environment: Optional[pulumi.Input[builtins.str]] = None,
614
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
615
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
616
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
617
- namespace: Optional[pulumi.Input[builtins.str]] = None,
618
- path: Optional[pulumi.Input[builtins.str]] = None,
619
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
620
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
621
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
622
- subscription_id: Optional[pulumi.Input[builtins.str]] = None,
623
- tenant_id: Optional[pulumi.Input[builtins.str]] = None,
607
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
608
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
609
+ description: Optional[pulumi.Input[_builtins.str]] = None,
610
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
611
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
612
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
613
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
614
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
615
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
616
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
617
+ path: Optional[pulumi.Input[_builtins.str]] = None,
618
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
619
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
620
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
621
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
622
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
624
623
  __props__=None):
625
624
  """
626
625
  ## Example Usage
@@ -658,36 +657,36 @@ class Backend(pulumi.CustomResource):
658
657
 
659
658
  :param str resource_name: The name of the resource.
660
659
  :param pulumi.ResourceOptions opts: Options for the resource.
661
- :param pulumi.Input[builtins.str] client_id: The OAuth2 client id to connect to Azure.
662
- :param pulumi.Input[builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
663
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
664
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
660
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
661
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
662
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
663
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
665
664
  *Available only for Vault Enterprise*
666
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
665
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
667
666
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
668
- :param pulumi.Input[builtins.str] environment: The Azure environment.
669
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
667
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
668
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
670
669
  *Available only for Vault Enterprise*
671
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
670
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
672
671
  *Available only for Vault Enterprise*
673
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
672
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
674
673
  *Available only for Vault Enterprise*
675
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
674
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
676
675
  The value should not contain leading or trailing forward slashes.
677
676
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
678
677
  *Available only for Vault Enterprise*.
679
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
680
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
678
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
679
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
681
680
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
682
681
  *Available only for Vault Enterprise*
683
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
682
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
684
683
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
685
684
  *Available only for Vault Enterprise*
686
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
685
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
687
686
  a rotation when a scheduled token rotation occurs. The default rotation window is
688
687
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
689
- :param pulumi.Input[builtins.str] subscription_id: The subscription id for the Azure Active Directory.
690
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory.
688
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
689
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
691
690
  """
692
691
  ...
693
692
  @overload
@@ -744,22 +743,22 @@ class Backend(pulumi.CustomResource):
744
743
  def _internal_init(__self__,
745
744
  resource_name: str,
746
745
  opts: Optional[pulumi.ResourceOptions] = None,
747
- client_id: Optional[pulumi.Input[builtins.str]] = None,
748
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
749
- description: Optional[pulumi.Input[builtins.str]] = None,
750
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
751
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
752
- environment: Optional[pulumi.Input[builtins.str]] = None,
753
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
754
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
755
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
756
- namespace: Optional[pulumi.Input[builtins.str]] = None,
757
- path: Optional[pulumi.Input[builtins.str]] = None,
758
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
759
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
760
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
761
- subscription_id: Optional[pulumi.Input[builtins.str]] = None,
762
- tenant_id: Optional[pulumi.Input[builtins.str]] = None,
746
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
747
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
748
+ description: Optional[pulumi.Input[_builtins.str]] = None,
749
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
750
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
751
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
752
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
753
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
754
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
755
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
756
+ path: Optional[pulumi.Input[_builtins.str]] = None,
757
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
758
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
759
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
760
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
761
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
763
762
  __props__=None):
764
763
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
765
764
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -801,22 +800,22 @@ class Backend(pulumi.CustomResource):
801
800
  def get(resource_name: str,
802
801
  id: pulumi.Input[str],
803
802
  opts: Optional[pulumi.ResourceOptions] = None,
804
- client_id: Optional[pulumi.Input[builtins.str]] = None,
805
- client_secret: Optional[pulumi.Input[builtins.str]] = None,
806
- description: Optional[pulumi.Input[builtins.str]] = None,
807
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
808
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
809
- environment: Optional[pulumi.Input[builtins.str]] = None,
810
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
811
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
812
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
813
- namespace: Optional[pulumi.Input[builtins.str]] = None,
814
- path: Optional[pulumi.Input[builtins.str]] = None,
815
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
816
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
817
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
818
- subscription_id: Optional[pulumi.Input[builtins.str]] = None,
819
- tenant_id: Optional[pulumi.Input[builtins.str]] = None) -> 'Backend':
803
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
804
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
805
+ description: Optional[pulumi.Input[_builtins.str]] = None,
806
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
807
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
808
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
809
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
810
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
811
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
812
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
813
+ path: Optional[pulumi.Input[_builtins.str]] = None,
814
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
815
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
816
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
817
+ subscription_id: Optional[pulumi.Input[_builtins.str]] = None,
818
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'Backend':
820
819
  """
821
820
  Get an existing Backend resource's state with the given name, id, and optional extra
822
821
  properties used to qualify the lookup.
@@ -824,36 +823,36 @@ class Backend(pulumi.CustomResource):
824
823
  :param str resource_name: The unique name of the resulting resource.
825
824
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
826
825
  :param pulumi.ResourceOptions opts: Options for the resource.
827
- :param pulumi.Input[builtins.str] client_id: The OAuth2 client id to connect to Azure.
828
- :param pulumi.Input[builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
829
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the backend.
830
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
826
+ :param pulumi.Input[_builtins.str] client_id: The OAuth2 client id to connect to Azure.
827
+ :param pulumi.Input[_builtins.str] client_secret: The OAuth2 client secret to connect to Azure.
828
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the backend.
829
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
831
830
  *Available only for Vault Enterprise*
832
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
831
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
833
832
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
834
- :param pulumi.Input[builtins.str] environment: The Azure environment.
835
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
833
+ :param pulumi.Input[_builtins.str] environment: The Azure environment.
834
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Requires Vault 1.17+.
836
835
  *Available only for Vault Enterprise*
837
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
836
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing identity tokens. Requires Vault 1.17+.
838
837
  *Available only for Vault Enterprise*
839
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
838
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
840
839
  *Available only for Vault Enterprise*
841
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
840
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
842
841
  The value should not contain leading or trailing forward slashes.
843
842
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
844
843
  *Available only for Vault Enterprise*.
845
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
846
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
844
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Defaults to `azure`.
845
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
847
846
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
848
847
  *Available only for Vault Enterprise*
849
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
848
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
850
849
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
851
850
  *Available only for Vault Enterprise*
852
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
851
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
853
852
  a rotation when a scheduled token rotation occurs. The default rotation window is
854
853
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*
855
- :param pulumi.Input[builtins.str] subscription_id: The subscription id for the Azure Active Directory.
856
- :param pulumi.Input[builtins.str] tenant_id: The tenant id for the Azure Active Directory.
854
+ :param pulumi.Input[_builtins.str] subscription_id: The subscription id for the Azure Active Directory.
855
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory.
857
856
  """
858
857
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
859
858
 
@@ -877,86 +876,86 @@ class Backend(pulumi.CustomResource):
877
876
  __props__.__dict__["tenant_id"] = tenant_id
878
877
  return Backend(resource_name, opts=opts, __props__=__props__)
879
878
 
880
- @property
879
+ @_builtins.property
881
880
  @pulumi.getter(name="clientId")
882
- def client_id(self) -> pulumi.Output[Optional[builtins.str]]:
881
+ def client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
883
882
  """
884
883
  The OAuth2 client id to connect to Azure.
885
884
  """
886
885
  return pulumi.get(self, "client_id")
887
886
 
888
- @property
887
+ @_builtins.property
889
888
  @pulumi.getter(name="clientSecret")
890
- def client_secret(self) -> pulumi.Output[Optional[builtins.str]]:
889
+ def client_secret(self) -> pulumi.Output[Optional[_builtins.str]]:
891
890
  """
892
891
  The OAuth2 client secret to connect to Azure.
893
892
  """
894
893
  return pulumi.get(self, "client_secret")
895
894
 
896
- @property
895
+ @_builtins.property
897
896
  @pulumi.getter
898
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
897
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
899
898
  """
900
899
  Human-friendly description of the mount for the backend.
901
900
  """
902
901
  return pulumi.get(self, "description")
903
902
 
904
- @property
903
+ @_builtins.property
905
904
  @pulumi.getter(name="disableAutomatedRotation")
906
- def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
905
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
907
906
  """
908
907
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
909
908
  *Available only for Vault Enterprise*
910
909
  """
911
910
  return pulumi.get(self, "disable_automated_rotation")
912
911
 
913
- @property
912
+ @_builtins.property
914
913
  @pulumi.getter(name="disableRemount")
915
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
914
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
916
915
  """
917
916
  If set, opts out of mount migration on path updates.
918
917
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
919
918
  """
920
919
  return pulumi.get(self, "disable_remount")
921
920
 
922
- @property
921
+ @_builtins.property
923
922
  @pulumi.getter
924
- def environment(self) -> pulumi.Output[Optional[builtins.str]]:
923
+ def environment(self) -> pulumi.Output[Optional[_builtins.str]]:
925
924
  """
926
925
  The Azure environment.
927
926
  """
928
927
  return pulumi.get(self, "environment")
929
928
 
930
- @property
929
+ @_builtins.property
931
930
  @pulumi.getter(name="identityTokenAudience")
932
- def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
931
+ def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
933
932
  """
934
933
  The audience claim value. Requires Vault 1.17+.
935
934
  *Available only for Vault Enterprise*
936
935
  """
937
936
  return pulumi.get(self, "identity_token_audience")
938
937
 
939
- @property
938
+ @_builtins.property
940
939
  @pulumi.getter(name="identityTokenKey")
941
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
940
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
942
941
  """
943
942
  The key to use for signing identity tokens. Requires Vault 1.17+.
944
943
  *Available only for Vault Enterprise*
945
944
  """
946
945
  return pulumi.get(self, "identity_token_key")
947
946
 
948
- @property
947
+ @_builtins.property
949
948
  @pulumi.getter(name="identityTokenTtl")
950
- def identity_token_ttl(self) -> pulumi.Output[builtins.int]:
949
+ def identity_token_ttl(self) -> pulumi.Output[_builtins.int]:
951
950
  """
952
951
  The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
953
952
  *Available only for Vault Enterprise*
954
953
  """
955
954
  return pulumi.get(self, "identity_token_ttl")
956
955
 
957
- @property
956
+ @_builtins.property
958
957
  @pulumi.getter
959
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
958
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
960
959
  """
961
960
  The namespace to provision the resource in.
962
961
  The value should not contain leading or trailing forward slashes.
@@ -965,17 +964,17 @@ class Backend(pulumi.CustomResource):
965
964
  """
966
965
  return pulumi.get(self, "namespace")
967
966
 
968
- @property
967
+ @_builtins.property
969
968
  @pulumi.getter
970
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
969
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
971
970
  """
972
971
  The unique path this backend should be mounted at. Defaults to `azure`.
973
972
  """
974
973
  return pulumi.get(self, "path")
975
974
 
976
- @property
975
+ @_builtins.property
977
976
  @pulumi.getter(name="rotationPeriod")
978
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
977
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
979
978
  """
980
979
  The amount of time in seconds Vault should wait before rotating the root credential.
981
980
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -983,9 +982,9 @@ class Backend(pulumi.CustomResource):
983
982
  """
984
983
  return pulumi.get(self, "rotation_period")
985
984
 
986
- @property
985
+ @_builtins.property
987
986
  @pulumi.getter(name="rotationSchedule")
988
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
987
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
989
988
  """
990
989
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
991
990
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -993,9 +992,9 @@ class Backend(pulumi.CustomResource):
993
992
  """
994
993
  return pulumi.get(self, "rotation_schedule")
995
994
 
996
- @property
995
+ @_builtins.property
997
996
  @pulumi.getter(name="rotationWindow")
998
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
997
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
999
998
  """
1000
999
  The maximum amount of time in seconds allowed to complete
1001
1000
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1003,17 +1002,17 @@ class Backend(pulumi.CustomResource):
1003
1002
  """
1004
1003
  return pulumi.get(self, "rotation_window")
1005
1004
 
1006
- @property
1005
+ @_builtins.property
1007
1006
  @pulumi.getter(name="subscriptionId")
1008
- def subscription_id(self) -> pulumi.Output[builtins.str]:
1007
+ def subscription_id(self) -> pulumi.Output[_builtins.str]:
1009
1008
  """
1010
1009
  The subscription id for the Azure Active Directory.
1011
1010
  """
1012
1011
  return pulumi.get(self, "subscription_id")
1013
1012
 
1014
- @property
1013
+ @_builtins.property
1015
1014
  @pulumi.getter(name="tenantId")
1016
- def tenant_id(self) -> pulumi.Output[builtins.str]:
1015
+ def tenant_id(self) -> pulumi.Output[_builtins.str]:
1017
1016
  """
1018
1017
  The tenant id for the Azure Active Directory.
1019
1018
  """