pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,31 +21,31 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
22
21
  @pulumi.input_type
23
22
  class AuthBackendArgs:
24
23
  def __init__(__self__, *,
25
- client_email: Optional[pulumi.Input[builtins.str]] = None,
26
- client_id: Optional[pulumi.Input[builtins.str]] = None,
27
- credentials: Optional[pulumi.Input[builtins.str]] = None,
24
+ client_email: Optional[pulumi.Input[_builtins.str]] = None,
25
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
26
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
28
27
  custom_endpoint: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']] = None,
29
- description: Optional[pulumi.Input[builtins.str]] = None,
30
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
31
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
32
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
33
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
34
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
35
- local: Optional[pulumi.Input[builtins.bool]] = None,
36
- namespace: Optional[pulumi.Input[builtins.str]] = None,
37
- path: Optional[pulumi.Input[builtins.str]] = None,
38
- private_key_id: Optional[pulumi.Input[builtins.str]] = None,
39
- project_id: Optional[pulumi.Input[builtins.str]] = None,
40
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
41
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
42
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
43
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
28
+ description: Optional[pulumi.Input[_builtins.str]] = None,
29
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
32
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
33
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
34
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
36
+ path: Optional[pulumi.Input[_builtins.str]] = None,
37
+ private_key_id: Optional[pulumi.Input[_builtins.str]] = None,
38
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
39
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
40
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
41
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
42
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
44
43
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
45
44
  """
46
45
  The set of arguments for constructing a AuthBackend resource.
47
- :param pulumi.Input[builtins.str] client_email: The clients email associated with the credentials
48
- :param pulumi.Input[builtins.str] client_id: The Client ID of the credentials
49
- :param pulumi.Input[builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
46
+ :param pulumi.Input[_builtins.str] client_email: The clients email associated with the credentials
47
+ :param pulumi.Input[_builtins.str] client_id: The Client ID of the credentials
48
+ :param pulumi.Input[_builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
50
49
  :param pulumi.Input['AuthBackendCustomEndpointArgs'] custom_endpoint: Specifies overrides to
51
50
  [service endpoints](https://cloud.google.com/apis/design/glossary#api_service_endpoint)
52
51
  used when making API requests. This allows specific requests made during authentication
@@ -54,32 +53,32 @@ class AuthBackendArgs:
54
53
  environments. Requires Vault 1.11+.
55
54
 
56
55
  Overrides are set at the subdomain level using the following keys:
57
- :param pulumi.Input[builtins.str] description: A description of the auth method.
58
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
59
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
56
+ :param pulumi.Input[_builtins.str] description: A description of the auth method.
57
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
58
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
60
59
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
61
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
60
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
62
61
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
63
62
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
64
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
63
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
65
64
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
66
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
67
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
68
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
65
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
66
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
67
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
69
68
  The value should not contain leading or trailing forward slashes.
70
69
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
71
70
  *Available only for Vault Enterprise*.
72
- :param pulumi.Input[builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
73
- :param pulumi.Input[builtins.str] private_key_id: The ID of the private key from the credentials
74
- :param pulumi.Input[builtins.str] project_id: The GCP Project ID
75
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
71
+ :param pulumi.Input[_builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
72
+ :param pulumi.Input[_builtins.str] private_key_id: The ID of the private key from the credentials
73
+ :param pulumi.Input[_builtins.str] project_id: The GCP Project ID
74
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
76
75
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
77
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
76
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
78
77
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
79
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
78
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
80
79
  a rotation when a scheduled token rotation occurs. The default rotation window is
81
80
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
82
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
81
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
83
82
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
84
83
  :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
85
84
 
@@ -126,43 +125,43 @@ class AuthBackendArgs:
126
125
  if tune is not None:
127
126
  pulumi.set(__self__, "tune", tune)
128
127
 
129
- @property
128
+ @_builtins.property
130
129
  @pulumi.getter(name="clientEmail")
131
- def client_email(self) -> Optional[pulumi.Input[builtins.str]]:
130
+ def client_email(self) -> Optional[pulumi.Input[_builtins.str]]:
132
131
  """
133
132
  The clients email associated with the credentials
134
133
  """
135
134
  return pulumi.get(self, "client_email")
136
135
 
137
136
  @client_email.setter
138
- def client_email(self, value: Optional[pulumi.Input[builtins.str]]):
137
+ def client_email(self, value: Optional[pulumi.Input[_builtins.str]]):
139
138
  pulumi.set(self, "client_email", value)
140
139
 
141
- @property
140
+ @_builtins.property
142
141
  @pulumi.getter(name="clientId")
143
- def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
142
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
144
143
  """
145
144
  The Client ID of the credentials
146
145
  """
147
146
  return pulumi.get(self, "client_id")
148
147
 
149
148
  @client_id.setter
150
- def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
149
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
151
150
  pulumi.set(self, "client_id", value)
152
151
 
153
- @property
152
+ @_builtins.property
154
153
  @pulumi.getter
155
- def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
154
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
156
155
  """
157
156
  A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
158
157
  """
159
158
  return pulumi.get(self, "credentials")
160
159
 
161
160
  @credentials.setter
162
- def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
161
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
163
162
  pulumi.set(self, "credentials", value)
164
163
 
165
- @property
164
+ @_builtins.property
166
165
  @pulumi.getter(name="customEndpoint")
167
166
  def custom_endpoint(self) -> Optional[pulumi.Input['AuthBackendCustomEndpointArgs']]:
168
167
  """
@@ -180,33 +179,33 @@ class AuthBackendArgs:
180
179
  def custom_endpoint(self, value: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']]):
181
180
  pulumi.set(self, "custom_endpoint", value)
182
181
 
183
- @property
182
+ @_builtins.property
184
183
  @pulumi.getter
185
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
184
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
186
185
  """
187
186
  A description of the auth method.
188
187
  """
189
188
  return pulumi.get(self, "description")
190
189
 
191
190
  @description.setter
192
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
191
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
193
192
  pulumi.set(self, "description", value)
194
193
 
195
- @property
194
+ @_builtins.property
196
195
  @pulumi.getter(name="disableAutomatedRotation")
197
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
196
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
198
197
  """
199
198
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
200
199
  """
201
200
  return pulumi.get(self, "disable_automated_rotation")
202
201
 
203
202
  @disable_automated_rotation.setter
204
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
203
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
205
204
  pulumi.set(self, "disable_automated_rotation", value)
206
205
 
207
- @property
206
+ @_builtins.property
208
207
  @pulumi.getter(name="disableRemount")
209
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
208
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
210
209
  """
211
210
  If set, opts out of mount migration on path updates.
212
211
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -214,12 +213,12 @@ class AuthBackendArgs:
214
213
  return pulumi.get(self, "disable_remount")
215
214
 
216
215
  @disable_remount.setter
217
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
216
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
218
217
  pulumi.set(self, "disable_remount", value)
219
218
 
220
- @property
219
+ @_builtins.property
221
220
  @pulumi.getter(name="identityTokenAudience")
222
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
221
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
223
222
  """
224
223
  The audience claim value for plugin identity
225
224
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -228,12 +227,12 @@ class AuthBackendArgs:
228
227
  return pulumi.get(self, "identity_token_audience")
229
228
 
230
229
  @identity_token_audience.setter
231
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
230
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
232
231
  pulumi.set(self, "identity_token_audience", value)
233
232
 
234
- @property
233
+ @_builtins.property
235
234
  @pulumi.getter(name="identityTokenKey")
236
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
235
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
237
236
  """
238
237
  The key to use for signing plugin identity
239
238
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -241,36 +240,36 @@ class AuthBackendArgs:
241
240
  return pulumi.get(self, "identity_token_key")
242
241
 
243
242
  @identity_token_key.setter
244
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
243
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
245
244
  pulumi.set(self, "identity_token_key", value)
246
245
 
247
- @property
246
+ @_builtins.property
248
247
  @pulumi.getter(name="identityTokenTtl")
249
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
248
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
250
249
  """
251
250
  The TTL of generated tokens.
252
251
  """
253
252
  return pulumi.get(self, "identity_token_ttl")
254
253
 
255
254
  @identity_token_ttl.setter
256
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
255
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
257
256
  pulumi.set(self, "identity_token_ttl", value)
258
257
 
259
- @property
258
+ @_builtins.property
260
259
  @pulumi.getter
261
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
260
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
262
261
  """
263
262
  Specifies if the auth method is local only.
264
263
  """
265
264
  return pulumi.get(self, "local")
266
265
 
267
266
  @local.setter
268
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
267
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
269
268
  pulumi.set(self, "local", value)
270
269
 
271
- @property
270
+ @_builtins.property
272
271
  @pulumi.getter
273
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
272
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
274
273
  """
275
274
  The namespace to provision the resource in.
276
275
  The value should not contain leading or trailing forward slashes.
@@ -280,48 +279,48 @@ class AuthBackendArgs:
280
279
  return pulumi.get(self, "namespace")
281
280
 
282
281
  @namespace.setter
283
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
282
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
284
283
  pulumi.set(self, "namespace", value)
285
284
 
286
- @property
285
+ @_builtins.property
287
286
  @pulumi.getter
288
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
287
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
289
288
  """
290
289
  The path to mount the auth method — this defaults to 'gcp'.
291
290
  """
292
291
  return pulumi.get(self, "path")
293
292
 
294
293
  @path.setter
295
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
294
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
296
295
  pulumi.set(self, "path", value)
297
296
 
298
- @property
297
+ @_builtins.property
299
298
  @pulumi.getter(name="privateKeyId")
300
- def private_key_id(self) -> Optional[pulumi.Input[builtins.str]]:
299
+ def private_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
301
300
  """
302
301
  The ID of the private key from the credentials
303
302
  """
304
303
  return pulumi.get(self, "private_key_id")
305
304
 
306
305
  @private_key_id.setter
307
- def private_key_id(self, value: Optional[pulumi.Input[builtins.str]]):
306
+ def private_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
308
307
  pulumi.set(self, "private_key_id", value)
309
308
 
310
- @property
309
+ @_builtins.property
311
310
  @pulumi.getter(name="projectId")
312
- def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
311
+ def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
313
312
  """
314
313
  The GCP Project ID
315
314
  """
316
315
  return pulumi.get(self, "project_id")
317
316
 
318
317
  @project_id.setter
319
- def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
318
+ def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
320
319
  pulumi.set(self, "project_id", value)
321
320
 
322
- @property
321
+ @_builtins.property
323
322
  @pulumi.getter(name="rotationPeriod")
324
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
323
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
325
324
  """
326
325
  The amount of time in seconds Vault should wait before rotating the root credential.
327
326
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -329,12 +328,12 @@ class AuthBackendArgs:
329
328
  return pulumi.get(self, "rotation_period")
330
329
 
331
330
  @rotation_period.setter
332
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
331
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
333
332
  pulumi.set(self, "rotation_period", value)
334
333
 
335
- @property
334
+ @_builtins.property
336
335
  @pulumi.getter(name="rotationSchedule")
337
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
336
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
338
337
  """
339
338
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
340
339
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -342,12 +341,12 @@ class AuthBackendArgs:
342
341
  return pulumi.get(self, "rotation_schedule")
343
342
 
344
343
  @rotation_schedule.setter
345
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
344
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
346
345
  pulumi.set(self, "rotation_schedule", value)
347
346
 
348
- @property
347
+ @_builtins.property
349
348
  @pulumi.getter(name="rotationWindow")
350
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
349
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
351
350
  """
352
351
  The maximum amount of time in seconds allowed to complete
353
352
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -356,12 +355,12 @@ class AuthBackendArgs:
356
355
  return pulumi.get(self, "rotation_window")
357
356
 
358
357
  @rotation_window.setter
359
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
358
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
360
359
  pulumi.set(self, "rotation_window", value)
361
360
 
362
- @property
361
+ @_builtins.property
363
362
  @pulumi.getter(name="serviceAccountEmail")
364
- def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
363
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
365
364
  """
366
365
  Service Account to impersonate for plugin workload identity federation.
367
366
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -369,10 +368,10 @@ class AuthBackendArgs:
369
368
  return pulumi.get(self, "service_account_email")
370
369
 
371
370
  @service_account_email.setter
372
- def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
371
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
373
372
  pulumi.set(self, "service_account_email", value)
374
373
 
375
- @property
374
+ @_builtins.property
376
375
  @pulumi.getter
377
376
  def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
378
377
  """
@@ -390,33 +389,33 @@ class AuthBackendArgs:
390
389
  @pulumi.input_type
391
390
  class _AuthBackendState:
392
391
  def __init__(__self__, *,
393
- accessor: Optional[pulumi.Input[builtins.str]] = None,
394
- client_email: Optional[pulumi.Input[builtins.str]] = None,
395
- client_id: Optional[pulumi.Input[builtins.str]] = None,
396
- credentials: Optional[pulumi.Input[builtins.str]] = None,
392
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
393
+ client_email: Optional[pulumi.Input[_builtins.str]] = None,
394
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
395
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
397
396
  custom_endpoint: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']] = None,
398
- description: Optional[pulumi.Input[builtins.str]] = None,
399
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
400
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
401
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
402
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
403
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
404
- local: Optional[pulumi.Input[builtins.bool]] = None,
405
- namespace: Optional[pulumi.Input[builtins.str]] = None,
406
- path: Optional[pulumi.Input[builtins.str]] = None,
407
- private_key_id: Optional[pulumi.Input[builtins.str]] = None,
408
- project_id: Optional[pulumi.Input[builtins.str]] = None,
409
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
410
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
411
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
412
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
397
+ description: Optional[pulumi.Input[_builtins.str]] = None,
398
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
399
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
400
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
401
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
402
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
403
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
404
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
405
+ path: Optional[pulumi.Input[_builtins.str]] = None,
406
+ private_key_id: Optional[pulumi.Input[_builtins.str]] = None,
407
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
408
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
409
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
410
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
411
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
413
412
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
414
413
  """
415
414
  Input properties used for looking up and filtering AuthBackend resources.
416
- :param pulumi.Input[builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
417
- :param pulumi.Input[builtins.str] client_email: The clients email associated with the credentials
418
- :param pulumi.Input[builtins.str] client_id: The Client ID of the credentials
419
- :param pulumi.Input[builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
415
+ :param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
416
+ :param pulumi.Input[_builtins.str] client_email: The clients email associated with the credentials
417
+ :param pulumi.Input[_builtins.str] client_id: The Client ID of the credentials
418
+ :param pulumi.Input[_builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
420
419
  :param pulumi.Input['AuthBackendCustomEndpointArgs'] custom_endpoint: Specifies overrides to
421
420
  [service endpoints](https://cloud.google.com/apis/design/glossary#api_service_endpoint)
422
421
  used when making API requests. This allows specific requests made during authentication
@@ -424,32 +423,32 @@ class _AuthBackendState:
424
423
  environments. Requires Vault 1.11+.
425
424
 
426
425
  Overrides are set at the subdomain level using the following keys:
427
- :param pulumi.Input[builtins.str] description: A description of the auth method.
428
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
429
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
426
+ :param pulumi.Input[_builtins.str] description: A description of the auth method.
427
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
428
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
430
429
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
431
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
430
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
432
431
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
433
432
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
434
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
433
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
435
434
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
436
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
437
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
438
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
435
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
436
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
437
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
439
438
  The value should not contain leading or trailing forward slashes.
440
439
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
441
440
  *Available only for Vault Enterprise*.
442
- :param pulumi.Input[builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
443
- :param pulumi.Input[builtins.str] private_key_id: The ID of the private key from the credentials
444
- :param pulumi.Input[builtins.str] project_id: The GCP Project ID
445
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
441
+ :param pulumi.Input[_builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
442
+ :param pulumi.Input[_builtins.str] private_key_id: The ID of the private key from the credentials
443
+ :param pulumi.Input[_builtins.str] project_id: The GCP Project ID
444
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
446
445
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
447
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
446
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
448
447
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
449
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
448
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
450
449
  a rotation when a scheduled token rotation occurs. The default rotation window is
451
450
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
452
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
451
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
453
452
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
454
453
  :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
455
454
 
@@ -498,55 +497,55 @@ class _AuthBackendState:
498
497
  if tune is not None:
499
498
  pulumi.set(__self__, "tune", tune)
500
499
 
501
- @property
500
+ @_builtins.property
502
501
  @pulumi.getter
503
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
502
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
504
503
  """
505
504
  The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
506
505
  """
507
506
  return pulumi.get(self, "accessor")
508
507
 
509
508
  @accessor.setter
510
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
509
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
511
510
  pulumi.set(self, "accessor", value)
512
511
 
513
- @property
512
+ @_builtins.property
514
513
  @pulumi.getter(name="clientEmail")
515
- def client_email(self) -> Optional[pulumi.Input[builtins.str]]:
514
+ def client_email(self) -> Optional[pulumi.Input[_builtins.str]]:
516
515
  """
517
516
  The clients email associated with the credentials
518
517
  """
519
518
  return pulumi.get(self, "client_email")
520
519
 
521
520
  @client_email.setter
522
- def client_email(self, value: Optional[pulumi.Input[builtins.str]]):
521
+ def client_email(self, value: Optional[pulumi.Input[_builtins.str]]):
523
522
  pulumi.set(self, "client_email", value)
524
523
 
525
- @property
524
+ @_builtins.property
526
525
  @pulumi.getter(name="clientId")
527
- def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
526
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
528
527
  """
529
528
  The Client ID of the credentials
530
529
  """
531
530
  return pulumi.get(self, "client_id")
532
531
 
533
532
  @client_id.setter
534
- def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
533
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
535
534
  pulumi.set(self, "client_id", value)
536
535
 
537
- @property
536
+ @_builtins.property
538
537
  @pulumi.getter
539
- def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
538
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
540
539
  """
541
540
  A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
542
541
  """
543
542
  return pulumi.get(self, "credentials")
544
543
 
545
544
  @credentials.setter
546
- def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
545
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
547
546
  pulumi.set(self, "credentials", value)
548
547
 
549
- @property
548
+ @_builtins.property
550
549
  @pulumi.getter(name="customEndpoint")
551
550
  def custom_endpoint(self) -> Optional[pulumi.Input['AuthBackendCustomEndpointArgs']]:
552
551
  """
@@ -564,33 +563,33 @@ class _AuthBackendState:
564
563
  def custom_endpoint(self, value: Optional[pulumi.Input['AuthBackendCustomEndpointArgs']]):
565
564
  pulumi.set(self, "custom_endpoint", value)
566
565
 
567
- @property
566
+ @_builtins.property
568
567
  @pulumi.getter
569
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
568
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
570
569
  """
571
570
  A description of the auth method.
572
571
  """
573
572
  return pulumi.get(self, "description")
574
573
 
575
574
  @description.setter
576
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
575
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
577
576
  pulumi.set(self, "description", value)
578
577
 
579
- @property
578
+ @_builtins.property
580
579
  @pulumi.getter(name="disableAutomatedRotation")
581
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
580
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
582
581
  """
583
582
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
584
583
  """
585
584
  return pulumi.get(self, "disable_automated_rotation")
586
585
 
587
586
  @disable_automated_rotation.setter
588
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
587
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
589
588
  pulumi.set(self, "disable_automated_rotation", value)
590
589
 
591
- @property
590
+ @_builtins.property
592
591
  @pulumi.getter(name="disableRemount")
593
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
592
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
594
593
  """
595
594
  If set, opts out of mount migration on path updates.
596
595
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -598,12 +597,12 @@ class _AuthBackendState:
598
597
  return pulumi.get(self, "disable_remount")
599
598
 
600
599
  @disable_remount.setter
601
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
600
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
602
601
  pulumi.set(self, "disable_remount", value)
603
602
 
604
- @property
603
+ @_builtins.property
605
604
  @pulumi.getter(name="identityTokenAudience")
606
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
605
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
607
606
  """
608
607
  The audience claim value for plugin identity
609
608
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -612,12 +611,12 @@ class _AuthBackendState:
612
611
  return pulumi.get(self, "identity_token_audience")
613
612
 
614
613
  @identity_token_audience.setter
615
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
614
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
616
615
  pulumi.set(self, "identity_token_audience", value)
617
616
 
618
- @property
617
+ @_builtins.property
619
618
  @pulumi.getter(name="identityTokenKey")
620
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
619
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
621
620
  """
622
621
  The key to use for signing plugin identity
623
622
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -625,36 +624,36 @@ class _AuthBackendState:
625
624
  return pulumi.get(self, "identity_token_key")
626
625
 
627
626
  @identity_token_key.setter
628
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
627
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
629
628
  pulumi.set(self, "identity_token_key", value)
630
629
 
631
- @property
630
+ @_builtins.property
632
631
  @pulumi.getter(name="identityTokenTtl")
633
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
632
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
634
633
  """
635
634
  The TTL of generated tokens.
636
635
  """
637
636
  return pulumi.get(self, "identity_token_ttl")
638
637
 
639
638
  @identity_token_ttl.setter
640
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
639
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
641
640
  pulumi.set(self, "identity_token_ttl", value)
642
641
 
643
- @property
642
+ @_builtins.property
644
643
  @pulumi.getter
645
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
644
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
646
645
  """
647
646
  Specifies if the auth method is local only.
648
647
  """
649
648
  return pulumi.get(self, "local")
650
649
 
651
650
  @local.setter
652
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
651
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
653
652
  pulumi.set(self, "local", value)
654
653
 
655
- @property
654
+ @_builtins.property
656
655
  @pulumi.getter
657
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
656
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
658
657
  """
659
658
  The namespace to provision the resource in.
660
659
  The value should not contain leading or trailing forward slashes.
@@ -664,48 +663,48 @@ class _AuthBackendState:
664
663
  return pulumi.get(self, "namespace")
665
664
 
666
665
  @namespace.setter
667
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
666
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
668
667
  pulumi.set(self, "namespace", value)
669
668
 
670
- @property
669
+ @_builtins.property
671
670
  @pulumi.getter
672
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
671
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
673
672
  """
674
673
  The path to mount the auth method — this defaults to 'gcp'.
675
674
  """
676
675
  return pulumi.get(self, "path")
677
676
 
678
677
  @path.setter
679
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
678
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
680
679
  pulumi.set(self, "path", value)
681
680
 
682
- @property
681
+ @_builtins.property
683
682
  @pulumi.getter(name="privateKeyId")
684
- def private_key_id(self) -> Optional[pulumi.Input[builtins.str]]:
683
+ def private_key_id(self) -> Optional[pulumi.Input[_builtins.str]]:
685
684
  """
686
685
  The ID of the private key from the credentials
687
686
  """
688
687
  return pulumi.get(self, "private_key_id")
689
688
 
690
689
  @private_key_id.setter
691
- def private_key_id(self, value: Optional[pulumi.Input[builtins.str]]):
690
+ def private_key_id(self, value: Optional[pulumi.Input[_builtins.str]]):
692
691
  pulumi.set(self, "private_key_id", value)
693
692
 
694
- @property
693
+ @_builtins.property
695
694
  @pulumi.getter(name="projectId")
696
- def project_id(self) -> Optional[pulumi.Input[builtins.str]]:
695
+ def project_id(self) -> Optional[pulumi.Input[_builtins.str]]:
697
696
  """
698
697
  The GCP Project ID
699
698
  """
700
699
  return pulumi.get(self, "project_id")
701
700
 
702
701
  @project_id.setter
703
- def project_id(self, value: Optional[pulumi.Input[builtins.str]]):
702
+ def project_id(self, value: Optional[pulumi.Input[_builtins.str]]):
704
703
  pulumi.set(self, "project_id", value)
705
704
 
706
- @property
705
+ @_builtins.property
707
706
  @pulumi.getter(name="rotationPeriod")
708
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
707
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
709
708
  """
710
709
  The amount of time in seconds Vault should wait before rotating the root credential.
711
710
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -713,12 +712,12 @@ class _AuthBackendState:
713
712
  return pulumi.get(self, "rotation_period")
714
713
 
715
714
  @rotation_period.setter
716
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
715
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
717
716
  pulumi.set(self, "rotation_period", value)
718
717
 
719
- @property
718
+ @_builtins.property
720
719
  @pulumi.getter(name="rotationSchedule")
721
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
720
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
722
721
  """
723
722
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
724
723
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -726,12 +725,12 @@ class _AuthBackendState:
726
725
  return pulumi.get(self, "rotation_schedule")
727
726
 
728
727
  @rotation_schedule.setter
729
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
728
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
730
729
  pulumi.set(self, "rotation_schedule", value)
731
730
 
732
- @property
731
+ @_builtins.property
733
732
  @pulumi.getter(name="rotationWindow")
734
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
733
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
735
734
  """
736
735
  The maximum amount of time in seconds allowed to complete
737
736
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -740,12 +739,12 @@ class _AuthBackendState:
740
739
  return pulumi.get(self, "rotation_window")
741
740
 
742
741
  @rotation_window.setter
743
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
742
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
744
743
  pulumi.set(self, "rotation_window", value)
745
744
 
746
- @property
745
+ @_builtins.property
747
746
  @pulumi.getter(name="serviceAccountEmail")
748
- def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
747
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
749
748
  """
750
749
  Service Account to impersonate for plugin workload identity federation.
751
750
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -753,10 +752,10 @@ class _AuthBackendState:
753
752
  return pulumi.get(self, "service_account_email")
754
753
 
755
754
  @service_account_email.setter
756
- def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
755
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
757
756
  pulumi.set(self, "service_account_email", value)
758
757
 
759
- @property
758
+ @_builtins.property
760
759
  @pulumi.getter
761
760
  def tune(self) -> Optional[pulumi.Input['AuthBackendTuneArgs']]:
762
761
  """
@@ -777,25 +776,25 @@ class AuthBackend(pulumi.CustomResource):
777
776
  def __init__(__self__,
778
777
  resource_name: str,
779
778
  opts: Optional[pulumi.ResourceOptions] = None,
780
- client_email: Optional[pulumi.Input[builtins.str]] = None,
781
- client_id: Optional[pulumi.Input[builtins.str]] = None,
782
- credentials: Optional[pulumi.Input[builtins.str]] = None,
779
+ client_email: Optional[pulumi.Input[_builtins.str]] = None,
780
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
781
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
783
782
  custom_endpoint: Optional[pulumi.Input[Union['AuthBackendCustomEndpointArgs', 'AuthBackendCustomEndpointArgsDict']]] = None,
784
- description: Optional[pulumi.Input[builtins.str]] = None,
785
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
786
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
787
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
788
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
789
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
790
- local: Optional[pulumi.Input[builtins.bool]] = None,
791
- namespace: Optional[pulumi.Input[builtins.str]] = None,
792
- path: Optional[pulumi.Input[builtins.str]] = None,
793
- private_key_id: Optional[pulumi.Input[builtins.str]] = None,
794
- project_id: Optional[pulumi.Input[builtins.str]] = None,
795
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
796
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
797
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
798
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
783
+ description: Optional[pulumi.Input[_builtins.str]] = None,
784
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
785
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
786
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
787
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
788
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
789
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
790
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
791
+ path: Optional[pulumi.Input[_builtins.str]] = None,
792
+ private_key_id: Optional[pulumi.Input[_builtins.str]] = None,
793
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
794
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
795
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
796
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
797
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
799
798
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
800
799
  __props__=None):
801
800
  """
@@ -827,9 +826,9 @@ class AuthBackend(pulumi.CustomResource):
827
826
 
828
827
  :param str resource_name: The name of the resource.
829
828
  :param pulumi.ResourceOptions opts: Options for the resource.
830
- :param pulumi.Input[builtins.str] client_email: The clients email associated with the credentials
831
- :param pulumi.Input[builtins.str] client_id: The Client ID of the credentials
832
- :param pulumi.Input[builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
829
+ :param pulumi.Input[_builtins.str] client_email: The clients email associated with the credentials
830
+ :param pulumi.Input[_builtins.str] client_id: The Client ID of the credentials
831
+ :param pulumi.Input[_builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
833
832
  :param pulumi.Input[Union['AuthBackendCustomEndpointArgs', 'AuthBackendCustomEndpointArgsDict']] custom_endpoint: Specifies overrides to
834
833
  [service endpoints](https://cloud.google.com/apis/design/glossary#api_service_endpoint)
835
834
  used when making API requests. This allows specific requests made during authentication
@@ -837,32 +836,32 @@ class AuthBackend(pulumi.CustomResource):
837
836
  environments. Requires Vault 1.11+.
838
837
 
839
838
  Overrides are set at the subdomain level using the following keys:
840
- :param pulumi.Input[builtins.str] description: A description of the auth method.
841
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
842
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
839
+ :param pulumi.Input[_builtins.str] description: A description of the auth method.
840
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
841
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
843
842
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
844
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
843
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
845
844
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
846
845
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
847
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
846
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
848
847
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
849
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
850
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
851
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
848
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
849
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
850
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
852
851
  The value should not contain leading or trailing forward slashes.
853
852
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
854
853
  *Available only for Vault Enterprise*.
855
- :param pulumi.Input[builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
856
- :param pulumi.Input[builtins.str] private_key_id: The ID of the private key from the credentials
857
- :param pulumi.Input[builtins.str] project_id: The GCP Project ID
858
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
854
+ :param pulumi.Input[_builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
855
+ :param pulumi.Input[_builtins.str] private_key_id: The ID of the private key from the credentials
856
+ :param pulumi.Input[_builtins.str] project_id: The GCP Project ID
857
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
859
858
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
860
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
859
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
861
860
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
862
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
861
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
863
862
  a rotation when a scheduled token rotation occurs. The default rotation window is
864
863
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
865
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
864
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
866
865
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
867
866
  :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
868
867
 
@@ -916,25 +915,25 @@ class AuthBackend(pulumi.CustomResource):
916
915
  def _internal_init(__self__,
917
916
  resource_name: str,
918
917
  opts: Optional[pulumi.ResourceOptions] = None,
919
- client_email: Optional[pulumi.Input[builtins.str]] = None,
920
- client_id: Optional[pulumi.Input[builtins.str]] = None,
921
- credentials: Optional[pulumi.Input[builtins.str]] = None,
918
+ client_email: Optional[pulumi.Input[_builtins.str]] = None,
919
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
920
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
922
921
  custom_endpoint: Optional[pulumi.Input[Union['AuthBackendCustomEndpointArgs', 'AuthBackendCustomEndpointArgsDict']]] = None,
923
- description: Optional[pulumi.Input[builtins.str]] = None,
924
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
925
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
926
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
927
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
928
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
929
- local: Optional[pulumi.Input[builtins.bool]] = None,
930
- namespace: Optional[pulumi.Input[builtins.str]] = None,
931
- path: Optional[pulumi.Input[builtins.str]] = None,
932
- private_key_id: Optional[pulumi.Input[builtins.str]] = None,
933
- project_id: Optional[pulumi.Input[builtins.str]] = None,
934
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
935
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
936
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
937
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
922
+ description: Optional[pulumi.Input[_builtins.str]] = None,
923
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
924
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
925
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
926
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
927
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
928
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
929
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
930
+ path: Optional[pulumi.Input[_builtins.str]] = None,
931
+ private_key_id: Optional[pulumi.Input[_builtins.str]] = None,
932
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
933
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
934
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
935
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
936
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
938
937
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
939
938
  __props__=None):
940
939
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -978,26 +977,26 @@ class AuthBackend(pulumi.CustomResource):
978
977
  def get(resource_name: str,
979
978
  id: pulumi.Input[str],
980
979
  opts: Optional[pulumi.ResourceOptions] = None,
981
- accessor: Optional[pulumi.Input[builtins.str]] = None,
982
- client_email: Optional[pulumi.Input[builtins.str]] = None,
983
- client_id: Optional[pulumi.Input[builtins.str]] = None,
984
- credentials: Optional[pulumi.Input[builtins.str]] = None,
980
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
981
+ client_email: Optional[pulumi.Input[_builtins.str]] = None,
982
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
983
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
985
984
  custom_endpoint: Optional[pulumi.Input[Union['AuthBackendCustomEndpointArgs', 'AuthBackendCustomEndpointArgsDict']]] = None,
986
- description: Optional[pulumi.Input[builtins.str]] = None,
987
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
988
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
989
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
990
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
991
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
992
- local: Optional[pulumi.Input[builtins.bool]] = None,
993
- namespace: Optional[pulumi.Input[builtins.str]] = None,
994
- path: Optional[pulumi.Input[builtins.str]] = None,
995
- private_key_id: Optional[pulumi.Input[builtins.str]] = None,
996
- project_id: Optional[pulumi.Input[builtins.str]] = None,
997
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
998
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
999
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
1000
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
985
+ description: Optional[pulumi.Input[_builtins.str]] = None,
986
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
987
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
988
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
989
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
990
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
991
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
992
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
993
+ path: Optional[pulumi.Input[_builtins.str]] = None,
994
+ private_key_id: Optional[pulumi.Input[_builtins.str]] = None,
995
+ project_id: Optional[pulumi.Input[_builtins.str]] = None,
996
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
997
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
998
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
999
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
1001
1000
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
1002
1001
  """
1003
1002
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
@@ -1006,10 +1005,10 @@ class AuthBackend(pulumi.CustomResource):
1006
1005
  :param str resource_name: The unique name of the resulting resource.
1007
1006
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1008
1007
  :param pulumi.ResourceOptions opts: Options for the resource.
1009
- :param pulumi.Input[builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
1010
- :param pulumi.Input[builtins.str] client_email: The clients email associated with the credentials
1011
- :param pulumi.Input[builtins.str] client_id: The Client ID of the credentials
1012
- :param pulumi.Input[builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
1008
+ :param pulumi.Input[_builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
1009
+ :param pulumi.Input[_builtins.str] client_email: The clients email associated with the credentials
1010
+ :param pulumi.Input[_builtins.str] client_id: The Client ID of the credentials
1011
+ :param pulumi.Input[_builtins.str] credentials: A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
1013
1012
  :param pulumi.Input[Union['AuthBackendCustomEndpointArgs', 'AuthBackendCustomEndpointArgsDict']] custom_endpoint: Specifies overrides to
1014
1013
  [service endpoints](https://cloud.google.com/apis/design/glossary#api_service_endpoint)
1015
1014
  used when making API requests. This allows specific requests made during authentication
@@ -1017,32 +1016,32 @@ class AuthBackend(pulumi.CustomResource):
1017
1016
  environments. Requires Vault 1.11+.
1018
1017
 
1019
1018
  Overrides are set at the subdomain level using the following keys:
1020
- :param pulumi.Input[builtins.str] description: A description of the auth method.
1021
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1022
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1019
+ :param pulumi.Input[_builtins.str] description: A description of the auth method.
1020
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1021
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
1023
1022
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1024
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
1023
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
1025
1024
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
1026
1025
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1027
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
1026
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
1028
1027
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1029
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
1030
- :param pulumi.Input[builtins.bool] local: Specifies if the auth method is local only.
1031
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1028
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
1029
+ :param pulumi.Input[_builtins.bool] local: Specifies if the auth method is local only.
1030
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1032
1031
  The value should not contain leading or trailing forward slashes.
1033
1032
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1034
1033
  *Available only for Vault Enterprise*.
1035
- :param pulumi.Input[builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
1036
- :param pulumi.Input[builtins.str] private_key_id: The ID of the private key from the credentials
1037
- :param pulumi.Input[builtins.str] project_id: The GCP Project ID
1038
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1034
+ :param pulumi.Input[_builtins.str] path: The path to mount the auth method — this defaults to 'gcp'.
1035
+ :param pulumi.Input[_builtins.str] private_key_id: The ID of the private key from the credentials
1036
+ :param pulumi.Input[_builtins.str] project_id: The GCP Project ID
1037
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
1039
1038
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1040
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1039
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1041
1040
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1042
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1041
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
1043
1042
  a rotation when a scheduled token rotation occurs. The default rotation window is
1044
1043
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1045
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
1044
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
1046
1045
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1047
1046
  :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
1048
1047
 
@@ -1075,39 +1074,39 @@ class AuthBackend(pulumi.CustomResource):
1075
1074
  __props__.__dict__["tune"] = tune
1076
1075
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
1077
1076
 
1078
- @property
1077
+ @_builtins.property
1079
1078
  @pulumi.getter
1080
- def accessor(self) -> pulumi.Output[builtins.str]:
1079
+ def accessor(self) -> pulumi.Output[_builtins.str]:
1081
1080
  """
1082
1081
  The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
1083
1082
  """
1084
1083
  return pulumi.get(self, "accessor")
1085
1084
 
1086
- @property
1085
+ @_builtins.property
1087
1086
  @pulumi.getter(name="clientEmail")
1088
- def client_email(self) -> pulumi.Output[builtins.str]:
1087
+ def client_email(self) -> pulumi.Output[_builtins.str]:
1089
1088
  """
1090
1089
  The clients email associated with the credentials
1091
1090
  """
1092
1091
  return pulumi.get(self, "client_email")
1093
1092
 
1094
- @property
1093
+ @_builtins.property
1095
1094
  @pulumi.getter(name="clientId")
1096
- def client_id(self) -> pulumi.Output[builtins.str]:
1095
+ def client_id(self) -> pulumi.Output[_builtins.str]:
1097
1096
  """
1098
1097
  The Client ID of the credentials
1099
1098
  """
1100
1099
  return pulumi.get(self, "client_id")
1101
1100
 
1102
- @property
1101
+ @_builtins.property
1103
1102
  @pulumi.getter
1104
- def credentials(self) -> pulumi.Output[Optional[builtins.str]]:
1103
+ def credentials(self) -> pulumi.Output[Optional[_builtins.str]]:
1105
1104
  """
1106
1105
  A JSON string containing the contents of a GCP credentials file. If this value is empty, Vault will try to use Application Default Credentials from the machine on which the Vault server is running.
1107
1106
  """
1108
1107
  return pulumi.get(self, "credentials")
1109
1108
 
1110
- @property
1109
+ @_builtins.property
1111
1110
  @pulumi.getter(name="customEndpoint")
1112
1111
  def custom_endpoint(self) -> pulumi.Output[Optional['outputs.AuthBackendCustomEndpoint']]:
1113
1112
  """
@@ -1121,34 +1120,34 @@ class AuthBackend(pulumi.CustomResource):
1121
1120
  """
1122
1121
  return pulumi.get(self, "custom_endpoint")
1123
1122
 
1124
- @property
1123
+ @_builtins.property
1125
1124
  @pulumi.getter
1126
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
1125
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
1127
1126
  """
1128
1127
  A description of the auth method.
1129
1128
  """
1130
1129
  return pulumi.get(self, "description")
1131
1130
 
1132
- @property
1131
+ @_builtins.property
1133
1132
  @pulumi.getter(name="disableAutomatedRotation")
1134
- def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
1133
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
1135
1134
  """
1136
1135
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1137
1136
  """
1138
1137
  return pulumi.get(self, "disable_automated_rotation")
1139
1138
 
1140
- @property
1139
+ @_builtins.property
1141
1140
  @pulumi.getter(name="disableRemount")
1142
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1141
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1143
1142
  """
1144
1143
  If set, opts out of mount migration on path updates.
1145
1144
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1146
1145
  """
1147
1146
  return pulumi.get(self, "disable_remount")
1148
1147
 
1149
- @property
1148
+ @_builtins.property
1150
1149
  @pulumi.getter(name="identityTokenAudience")
1151
- def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
1150
+ def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
1152
1151
  """
1153
1152
  The audience claim value for plugin identity
1154
1153
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -1156,34 +1155,34 @@ class AuthBackend(pulumi.CustomResource):
1156
1155
  """
1157
1156
  return pulumi.get(self, "identity_token_audience")
1158
1157
 
1159
- @property
1158
+ @_builtins.property
1160
1159
  @pulumi.getter(name="identityTokenKey")
1161
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1160
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1162
1161
  """
1163
1162
  The key to use for signing plugin identity
1164
1163
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1165
1164
  """
1166
1165
  return pulumi.get(self, "identity_token_key")
1167
1166
 
1168
- @property
1167
+ @_builtins.property
1169
1168
  @pulumi.getter(name="identityTokenTtl")
1170
- def identity_token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1169
+ def identity_token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1171
1170
  """
1172
1171
  The TTL of generated tokens.
1173
1172
  """
1174
1173
  return pulumi.get(self, "identity_token_ttl")
1175
1174
 
1176
- @property
1175
+ @_builtins.property
1177
1176
  @pulumi.getter
1178
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1177
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1179
1178
  """
1180
1179
  Specifies if the auth method is local only.
1181
1180
  """
1182
1181
  return pulumi.get(self, "local")
1183
1182
 
1184
- @property
1183
+ @_builtins.property
1185
1184
  @pulumi.getter
1186
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1185
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1187
1186
  """
1188
1187
  The namespace to provision the resource in.
1189
1188
  The value should not contain leading or trailing forward slashes.
@@ -1192,51 +1191,51 @@ class AuthBackend(pulumi.CustomResource):
1192
1191
  """
1193
1192
  return pulumi.get(self, "namespace")
1194
1193
 
1195
- @property
1194
+ @_builtins.property
1196
1195
  @pulumi.getter
1197
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
1196
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1198
1197
  """
1199
1198
  The path to mount the auth method — this defaults to 'gcp'.
1200
1199
  """
1201
1200
  return pulumi.get(self, "path")
1202
1201
 
1203
- @property
1202
+ @_builtins.property
1204
1203
  @pulumi.getter(name="privateKeyId")
1205
- def private_key_id(self) -> pulumi.Output[builtins.str]:
1204
+ def private_key_id(self) -> pulumi.Output[_builtins.str]:
1206
1205
  """
1207
1206
  The ID of the private key from the credentials
1208
1207
  """
1209
1208
  return pulumi.get(self, "private_key_id")
1210
1209
 
1211
- @property
1210
+ @_builtins.property
1212
1211
  @pulumi.getter(name="projectId")
1213
- def project_id(self) -> pulumi.Output[builtins.str]:
1212
+ def project_id(self) -> pulumi.Output[_builtins.str]:
1214
1213
  """
1215
1214
  The GCP Project ID
1216
1215
  """
1217
1216
  return pulumi.get(self, "project_id")
1218
1217
 
1219
- @property
1218
+ @_builtins.property
1220
1219
  @pulumi.getter(name="rotationPeriod")
1221
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
1220
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1222
1221
  """
1223
1222
  The amount of time in seconds Vault should wait before rotating the root credential.
1224
1223
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1225
1224
  """
1226
1225
  return pulumi.get(self, "rotation_period")
1227
1226
 
1228
- @property
1227
+ @_builtins.property
1229
1228
  @pulumi.getter(name="rotationSchedule")
1230
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
1229
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
1231
1230
  """
1232
1231
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1233
1232
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1234
1233
  """
1235
1234
  return pulumi.get(self, "rotation_schedule")
1236
1235
 
1237
- @property
1236
+ @_builtins.property
1238
1237
  @pulumi.getter(name="rotationWindow")
1239
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
1238
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
1240
1239
  """
1241
1240
  The maximum amount of time in seconds allowed to complete
1242
1241
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1244,16 +1243,16 @@ class AuthBackend(pulumi.CustomResource):
1244
1243
  """
1245
1244
  return pulumi.get(self, "rotation_window")
1246
1245
 
1247
- @property
1246
+ @_builtins.property
1248
1247
  @pulumi.getter(name="serviceAccountEmail")
1249
- def service_account_email(self) -> pulumi.Output[Optional[builtins.str]]:
1248
+ def service_account_email(self) -> pulumi.Output[Optional[_builtins.str]]:
1250
1249
  """
1251
1250
  Service Account to impersonate for plugin workload identity federation.
1252
1251
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1253
1252
  """
1254
1253
  return pulumi.get(self, "service_account_email")
1255
1254
 
1256
- @property
1255
+ @_builtins.property
1257
1256
  @pulumi.getter
1258
1257
  def tune(self) -> pulumi.Output['outputs.AuthBackendTune']:
1259
1258
  """