pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,58 +19,58 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- credentials: Optional[pulumi.Input[builtins.str]] = None,
24
- credentials_wo_version: Optional[pulumi.Input[builtins.int]] = None,
25
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
26
- description: Optional[pulumi.Input[builtins.str]] = None,
27
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
28
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
29
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
30
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
31
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
32
- local: Optional[pulumi.Input[builtins.bool]] = None,
33
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
34
- namespace: Optional[pulumi.Input[builtins.str]] = None,
35
- path: Optional[pulumi.Input[builtins.str]] = None,
36
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
37
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
38
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
39
- service_account_email: Optional[pulumi.Input[builtins.str]] = None):
22
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
23
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
24
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
25
+ description: Optional[pulumi.Input[_builtins.str]] = None,
26
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
27
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
29
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
30
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
32
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
33
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
34
+ path: Optional[pulumi.Input[_builtins.str]] = None,
35
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
36
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
37
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
38
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None):
40
39
  """
41
40
  The set of arguments for constructing a SecretBackend resource.
42
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
43
- :param pulumi.Input[builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
44
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
41
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
42
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
43
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
45
44
  issued by this backend. Defaults to '0'.
46
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
47
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
45
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
46
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
48
47
  *Available only for Vault Enterprise*.
49
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
48
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
50
49
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
51
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
50
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
52
51
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
53
52
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
54
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
53
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
55
54
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
56
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
57
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
58
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
55
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
56
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
57
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
59
58
  for credentials issued by this backend. Defaults to '0'.
60
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
59
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
61
60
  The value should not contain leading or trailing forward slashes.
62
61
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
63
62
  *Available only for Vault Enterprise*.
64
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
63
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
65
64
  not begin or end with a `/`. Defaults to `gcp`.
66
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
65
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
67
66
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
68
67
  *Available only for Vault Enterprise*.
69
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
68
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
70
69
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
71
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
70
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
72
71
  a rotation when a scheduled token rotation occurs. The default rotation window is
73
72
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
74
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
73
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
75
74
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
76
75
  """
77
76
  if credentials is not None:
@@ -109,33 +108,33 @@ class SecretBackendArgs:
109
108
  if service_account_email is not None:
110
109
  pulumi.set(__self__, "service_account_email", service_account_email)
111
110
 
112
- @property
111
+ @_builtins.property
113
112
  @pulumi.getter
114
- def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
113
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
115
114
  """
116
115
  JSON-encoded credentials to use to connect to GCP
117
116
  """
118
117
  return pulumi.get(self, "credentials")
119
118
 
120
119
  @credentials.setter
121
- def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
120
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
122
121
  pulumi.set(self, "credentials", value)
123
122
 
124
- @property
123
+ @_builtins.property
125
124
  @pulumi.getter(name="credentialsWoVersion")
126
- def credentials_wo_version(self) -> Optional[pulumi.Input[builtins.int]]:
125
+ def credentials_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
127
126
  """
128
127
  The version of the `credentials_wo`. For more info see updating write-only attributes.
129
128
  """
130
129
  return pulumi.get(self, "credentials_wo_version")
131
130
 
132
131
  @credentials_wo_version.setter
133
- def credentials_wo_version(self, value: Optional[pulumi.Input[builtins.int]]):
132
+ def credentials_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
134
133
  pulumi.set(self, "credentials_wo_version", value)
135
134
 
136
- @property
135
+ @_builtins.property
137
136
  @pulumi.getter(name="defaultLeaseTtlSeconds")
138
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
137
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
139
138
  """
140
139
  The default TTL for credentials
141
140
  issued by this backend. Defaults to '0'.
@@ -143,24 +142,24 @@ class SecretBackendArgs:
143
142
  return pulumi.get(self, "default_lease_ttl_seconds")
144
143
 
145
144
  @default_lease_ttl_seconds.setter
146
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
145
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
147
146
  pulumi.set(self, "default_lease_ttl_seconds", value)
148
147
 
149
- @property
148
+ @_builtins.property
150
149
  @pulumi.getter
151
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
150
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
152
151
  """
153
152
  A human-friendly description for this backend.
154
153
  """
155
154
  return pulumi.get(self, "description")
156
155
 
157
156
  @description.setter
158
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
157
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
159
158
  pulumi.set(self, "description", value)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter(name="disableAutomatedRotation")
163
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
162
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
164
163
  """
165
164
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
166
165
  *Available only for Vault Enterprise*.
@@ -168,12 +167,12 @@ class SecretBackendArgs:
168
167
  return pulumi.get(self, "disable_automated_rotation")
169
168
 
170
169
  @disable_automated_rotation.setter
171
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
170
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
172
171
  pulumi.set(self, "disable_automated_rotation", value)
173
172
 
174
- @property
173
+ @_builtins.property
175
174
  @pulumi.getter(name="disableRemount")
176
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
175
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
177
176
  """
178
177
  If set, opts out of mount migration on path updates.
179
178
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -181,12 +180,12 @@ class SecretBackendArgs:
181
180
  return pulumi.get(self, "disable_remount")
182
181
 
183
182
  @disable_remount.setter
184
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
183
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
185
184
  pulumi.set(self, "disable_remount", value)
186
185
 
187
- @property
186
+ @_builtins.property
188
187
  @pulumi.getter(name="identityTokenAudience")
189
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
188
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
190
189
  """
191
190
  The audience claim value for plugin identity
192
191
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -195,12 +194,12 @@ class SecretBackendArgs:
195
194
  return pulumi.get(self, "identity_token_audience")
196
195
 
197
196
  @identity_token_audience.setter
198
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
197
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
199
198
  pulumi.set(self, "identity_token_audience", value)
200
199
 
201
- @property
200
+ @_builtins.property
202
201
  @pulumi.getter(name="identityTokenKey")
203
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
202
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
204
203
  """
205
204
  The key to use for signing plugin identity
206
205
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -208,36 +207,36 @@ class SecretBackendArgs:
208
207
  return pulumi.get(self, "identity_token_key")
209
208
 
210
209
  @identity_token_key.setter
211
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
210
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
212
211
  pulumi.set(self, "identity_token_key", value)
213
212
 
214
- @property
213
+ @_builtins.property
215
214
  @pulumi.getter(name="identityTokenTtl")
216
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
215
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
217
216
  """
218
217
  The TTL of generated tokens.
219
218
  """
220
219
  return pulumi.get(self, "identity_token_ttl")
221
220
 
222
221
  @identity_token_ttl.setter
223
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
222
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
224
223
  pulumi.set(self, "identity_token_ttl", value)
225
224
 
226
- @property
225
+ @_builtins.property
227
226
  @pulumi.getter
228
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
227
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
229
228
  """
230
229
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
231
230
  """
232
231
  return pulumi.get(self, "local")
233
232
 
234
233
  @local.setter
235
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
234
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
236
235
  pulumi.set(self, "local", value)
237
236
 
238
- @property
237
+ @_builtins.property
239
238
  @pulumi.getter(name="maxLeaseTtlSeconds")
240
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
239
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
241
240
  """
242
241
  The maximum TTL that can be requested
243
242
  for credentials issued by this backend. Defaults to '0'.
@@ -245,12 +244,12 @@ class SecretBackendArgs:
245
244
  return pulumi.get(self, "max_lease_ttl_seconds")
246
245
 
247
246
  @max_lease_ttl_seconds.setter
248
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
247
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
249
248
  pulumi.set(self, "max_lease_ttl_seconds", value)
250
249
 
251
- @property
250
+ @_builtins.property
252
251
  @pulumi.getter
253
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
252
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
254
253
  """
255
254
  The namespace to provision the resource in.
256
255
  The value should not contain leading or trailing forward slashes.
@@ -260,12 +259,12 @@ class SecretBackendArgs:
260
259
  return pulumi.get(self, "namespace")
261
260
 
262
261
  @namespace.setter
263
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
262
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
264
263
  pulumi.set(self, "namespace", value)
265
264
 
266
- @property
265
+ @_builtins.property
267
266
  @pulumi.getter
268
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
267
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
269
268
  """
270
269
  The unique path this backend should be mounted at. Must
271
270
  not begin or end with a `/`. Defaults to `gcp`.
@@ -273,12 +272,12 @@ class SecretBackendArgs:
273
272
  return pulumi.get(self, "path")
274
273
 
275
274
  @path.setter
276
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
275
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
277
276
  pulumi.set(self, "path", value)
278
277
 
279
- @property
278
+ @_builtins.property
280
279
  @pulumi.getter(name="rotationPeriod")
281
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
280
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
282
281
  """
283
282
  The amount of time in seconds Vault should wait before rotating the root credential.
284
283
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -287,12 +286,12 @@ class SecretBackendArgs:
287
286
  return pulumi.get(self, "rotation_period")
288
287
 
289
288
  @rotation_period.setter
290
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
289
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
291
290
  pulumi.set(self, "rotation_period", value)
292
291
 
293
- @property
292
+ @_builtins.property
294
293
  @pulumi.getter(name="rotationSchedule")
295
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
294
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
296
295
  """
297
296
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
298
297
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
@@ -300,12 +299,12 @@ class SecretBackendArgs:
300
299
  return pulumi.get(self, "rotation_schedule")
301
300
 
302
301
  @rotation_schedule.setter
303
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
302
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
304
303
  pulumi.set(self, "rotation_schedule", value)
305
304
 
306
- @property
305
+ @_builtins.property
307
306
  @pulumi.getter(name="rotationWindow")
308
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
307
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
309
308
  """
310
309
  The maximum amount of time in seconds allowed to complete
311
310
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -314,12 +313,12 @@ class SecretBackendArgs:
314
313
  return pulumi.get(self, "rotation_window")
315
314
 
316
315
  @rotation_window.setter
317
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
316
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
318
317
  pulumi.set(self, "rotation_window", value)
319
318
 
320
- @property
319
+ @_builtins.property
321
320
  @pulumi.getter(name="serviceAccountEmail")
322
- def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
321
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
323
322
  """
324
323
  Service Account to impersonate for plugin workload identity federation.
325
324
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -327,67 +326,67 @@ class SecretBackendArgs:
327
326
  return pulumi.get(self, "service_account_email")
328
327
 
329
328
  @service_account_email.setter
330
- def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
329
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
331
330
  pulumi.set(self, "service_account_email", value)
332
331
 
333
332
 
334
333
  @pulumi.input_type
335
334
  class _SecretBackendState:
336
335
  def __init__(__self__, *,
337
- accessor: Optional[pulumi.Input[builtins.str]] = None,
338
- credentials: Optional[pulumi.Input[builtins.str]] = None,
339
- credentials_wo_version: Optional[pulumi.Input[builtins.int]] = None,
340
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
341
- description: Optional[pulumi.Input[builtins.str]] = None,
342
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
343
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
344
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
345
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
346
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
347
- local: Optional[pulumi.Input[builtins.bool]] = None,
348
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
349
- namespace: Optional[pulumi.Input[builtins.str]] = None,
350
- path: Optional[pulumi.Input[builtins.str]] = None,
351
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
352
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
353
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
354
- service_account_email: Optional[pulumi.Input[builtins.str]] = None):
336
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
337
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
338
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
339
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
340
+ description: Optional[pulumi.Input[_builtins.str]] = None,
341
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
342
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
343
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
344
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
345
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
346
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
347
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
348
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
349
+ path: Optional[pulumi.Input[_builtins.str]] = None,
350
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
351
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
352
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
353
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None):
355
354
  """
356
355
  Input properties used for looking up and filtering SecretBackend resources.
357
- :param pulumi.Input[builtins.str] accessor: The accessor of the created GCP mount.
358
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
359
- :param pulumi.Input[builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
360
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
356
+ :param pulumi.Input[_builtins.str] accessor: The accessor of the created GCP mount.
357
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
358
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
359
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
361
360
  issued by this backend. Defaults to '0'.
362
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
363
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
361
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
362
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
364
363
  *Available only for Vault Enterprise*.
365
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
364
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
366
365
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
367
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
366
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
368
367
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
369
368
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
370
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
369
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
371
370
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
372
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
373
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
374
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
371
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
372
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
373
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
375
374
  for credentials issued by this backend. Defaults to '0'.
376
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
375
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
377
376
  The value should not contain leading or trailing forward slashes.
378
377
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
379
378
  *Available only for Vault Enterprise*.
380
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
379
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
381
380
  not begin or end with a `/`. Defaults to `gcp`.
382
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
381
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
383
382
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
384
383
  *Available only for Vault Enterprise*.
385
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
384
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
386
385
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
387
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
386
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
388
387
  a rotation when a scheduled token rotation occurs. The default rotation window is
389
388
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
390
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
389
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
391
390
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
392
391
  """
393
392
  if accessor is not None:
@@ -427,45 +426,45 @@ class _SecretBackendState:
427
426
  if service_account_email is not None:
428
427
  pulumi.set(__self__, "service_account_email", service_account_email)
429
428
 
430
- @property
429
+ @_builtins.property
431
430
  @pulumi.getter
432
- def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
431
+ def accessor(self) -> Optional[pulumi.Input[_builtins.str]]:
433
432
  """
434
433
  The accessor of the created GCP mount.
435
434
  """
436
435
  return pulumi.get(self, "accessor")
437
436
 
438
437
  @accessor.setter
439
- def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
438
+ def accessor(self, value: Optional[pulumi.Input[_builtins.str]]):
440
439
  pulumi.set(self, "accessor", value)
441
440
 
442
- @property
441
+ @_builtins.property
443
442
  @pulumi.getter
444
- def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
443
+ def credentials(self) -> Optional[pulumi.Input[_builtins.str]]:
445
444
  """
446
445
  JSON-encoded credentials to use to connect to GCP
447
446
  """
448
447
  return pulumi.get(self, "credentials")
449
448
 
450
449
  @credentials.setter
451
- def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
450
+ def credentials(self, value: Optional[pulumi.Input[_builtins.str]]):
452
451
  pulumi.set(self, "credentials", value)
453
452
 
454
- @property
453
+ @_builtins.property
455
454
  @pulumi.getter(name="credentialsWoVersion")
456
- def credentials_wo_version(self) -> Optional[pulumi.Input[builtins.int]]:
455
+ def credentials_wo_version(self) -> Optional[pulumi.Input[_builtins.int]]:
457
456
  """
458
457
  The version of the `credentials_wo`. For more info see updating write-only attributes.
459
458
  """
460
459
  return pulumi.get(self, "credentials_wo_version")
461
460
 
462
461
  @credentials_wo_version.setter
463
- def credentials_wo_version(self, value: Optional[pulumi.Input[builtins.int]]):
462
+ def credentials_wo_version(self, value: Optional[pulumi.Input[_builtins.int]]):
464
463
  pulumi.set(self, "credentials_wo_version", value)
465
464
 
466
- @property
465
+ @_builtins.property
467
466
  @pulumi.getter(name="defaultLeaseTtlSeconds")
468
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
467
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
469
468
  """
470
469
  The default TTL for credentials
471
470
  issued by this backend. Defaults to '0'.
@@ -473,24 +472,24 @@ class _SecretBackendState:
473
472
  return pulumi.get(self, "default_lease_ttl_seconds")
474
473
 
475
474
  @default_lease_ttl_seconds.setter
476
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
475
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
477
476
  pulumi.set(self, "default_lease_ttl_seconds", value)
478
477
 
479
- @property
478
+ @_builtins.property
480
479
  @pulumi.getter
481
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
480
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
482
481
  """
483
482
  A human-friendly description for this backend.
484
483
  """
485
484
  return pulumi.get(self, "description")
486
485
 
487
486
  @description.setter
488
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
487
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
489
488
  pulumi.set(self, "description", value)
490
489
 
491
- @property
490
+ @_builtins.property
492
491
  @pulumi.getter(name="disableAutomatedRotation")
493
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
492
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
494
493
  """
495
494
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
496
495
  *Available only for Vault Enterprise*.
@@ -498,12 +497,12 @@ class _SecretBackendState:
498
497
  return pulumi.get(self, "disable_automated_rotation")
499
498
 
500
499
  @disable_automated_rotation.setter
501
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
500
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
502
501
  pulumi.set(self, "disable_automated_rotation", value)
503
502
 
504
- @property
503
+ @_builtins.property
505
504
  @pulumi.getter(name="disableRemount")
506
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
505
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
507
506
  """
508
507
  If set, opts out of mount migration on path updates.
509
508
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -511,12 +510,12 @@ class _SecretBackendState:
511
510
  return pulumi.get(self, "disable_remount")
512
511
 
513
512
  @disable_remount.setter
514
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
513
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
515
514
  pulumi.set(self, "disable_remount", value)
516
515
 
517
- @property
516
+ @_builtins.property
518
517
  @pulumi.getter(name="identityTokenAudience")
519
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
518
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
520
519
  """
521
520
  The audience claim value for plugin identity
522
521
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -525,12 +524,12 @@ class _SecretBackendState:
525
524
  return pulumi.get(self, "identity_token_audience")
526
525
 
527
526
  @identity_token_audience.setter
528
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
527
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
529
528
  pulumi.set(self, "identity_token_audience", value)
530
529
 
531
- @property
530
+ @_builtins.property
532
531
  @pulumi.getter(name="identityTokenKey")
533
- def identity_token_key(self) -> Optional[pulumi.Input[builtins.str]]:
532
+ def identity_token_key(self) -> Optional[pulumi.Input[_builtins.str]]:
534
533
  """
535
534
  The key to use for signing plugin identity
536
535
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -538,36 +537,36 @@ class _SecretBackendState:
538
537
  return pulumi.get(self, "identity_token_key")
539
538
 
540
539
  @identity_token_key.setter
541
- def identity_token_key(self, value: Optional[pulumi.Input[builtins.str]]):
540
+ def identity_token_key(self, value: Optional[pulumi.Input[_builtins.str]]):
542
541
  pulumi.set(self, "identity_token_key", value)
543
542
 
544
- @property
543
+ @_builtins.property
545
544
  @pulumi.getter(name="identityTokenTtl")
546
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
545
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
547
546
  """
548
547
  The TTL of generated tokens.
549
548
  """
550
549
  return pulumi.get(self, "identity_token_ttl")
551
550
 
552
551
  @identity_token_ttl.setter
553
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
552
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
554
553
  pulumi.set(self, "identity_token_ttl", value)
555
554
 
556
- @property
555
+ @_builtins.property
557
556
  @pulumi.getter
558
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
557
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
559
558
  """
560
559
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
561
560
  """
562
561
  return pulumi.get(self, "local")
563
562
 
564
563
  @local.setter
565
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
564
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
566
565
  pulumi.set(self, "local", value)
567
566
 
568
- @property
567
+ @_builtins.property
569
568
  @pulumi.getter(name="maxLeaseTtlSeconds")
570
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
569
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
571
570
  """
572
571
  The maximum TTL that can be requested
573
572
  for credentials issued by this backend. Defaults to '0'.
@@ -575,12 +574,12 @@ class _SecretBackendState:
575
574
  return pulumi.get(self, "max_lease_ttl_seconds")
576
575
 
577
576
  @max_lease_ttl_seconds.setter
578
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
577
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
579
578
  pulumi.set(self, "max_lease_ttl_seconds", value)
580
579
 
581
- @property
580
+ @_builtins.property
582
581
  @pulumi.getter
583
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
582
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
584
583
  """
585
584
  The namespace to provision the resource in.
586
585
  The value should not contain leading or trailing forward slashes.
@@ -590,12 +589,12 @@ class _SecretBackendState:
590
589
  return pulumi.get(self, "namespace")
591
590
 
592
591
  @namespace.setter
593
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
592
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
594
593
  pulumi.set(self, "namespace", value)
595
594
 
596
- @property
595
+ @_builtins.property
597
596
  @pulumi.getter
598
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
597
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
599
598
  """
600
599
  The unique path this backend should be mounted at. Must
601
600
  not begin or end with a `/`. Defaults to `gcp`.
@@ -603,12 +602,12 @@ class _SecretBackendState:
603
602
  return pulumi.get(self, "path")
604
603
 
605
604
  @path.setter
606
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
605
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
607
606
  pulumi.set(self, "path", value)
608
607
 
609
- @property
608
+ @_builtins.property
610
609
  @pulumi.getter(name="rotationPeriod")
611
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
610
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
612
611
  """
613
612
  The amount of time in seconds Vault should wait before rotating the root credential.
614
613
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -617,12 +616,12 @@ class _SecretBackendState:
617
616
  return pulumi.get(self, "rotation_period")
618
617
 
619
618
  @rotation_period.setter
620
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
619
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
621
620
  pulumi.set(self, "rotation_period", value)
622
621
 
623
- @property
622
+ @_builtins.property
624
623
  @pulumi.getter(name="rotationSchedule")
625
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
624
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
626
625
  """
627
626
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
628
627
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
@@ -630,12 +629,12 @@ class _SecretBackendState:
630
629
  return pulumi.get(self, "rotation_schedule")
631
630
 
632
631
  @rotation_schedule.setter
633
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
632
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
634
633
  pulumi.set(self, "rotation_schedule", value)
635
634
 
636
- @property
635
+ @_builtins.property
637
636
  @pulumi.getter(name="rotationWindow")
638
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
637
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
639
638
  """
640
639
  The maximum amount of time in seconds allowed to complete
641
640
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -644,12 +643,12 @@ class _SecretBackendState:
644
643
  return pulumi.get(self, "rotation_window")
645
644
 
646
645
  @rotation_window.setter
647
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
646
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
648
647
  pulumi.set(self, "rotation_window", value)
649
648
 
650
- @property
649
+ @_builtins.property
651
650
  @pulumi.getter(name="serviceAccountEmail")
652
- def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
651
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
653
652
  """
654
653
  Service Account to impersonate for plugin workload identity federation.
655
654
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
@@ -657,7 +656,7 @@ class _SecretBackendState:
657
656
  return pulumi.get(self, "service_account_email")
658
657
 
659
658
  @service_account_email.setter
660
- def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
659
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
661
660
  pulumi.set(self, "service_account_email", value)
662
661
 
663
662
 
@@ -667,23 +666,23 @@ class SecretBackend(pulumi.CustomResource):
667
666
  def __init__(__self__,
668
667
  resource_name: str,
669
668
  opts: Optional[pulumi.ResourceOptions] = None,
670
- credentials: Optional[pulumi.Input[builtins.str]] = None,
671
- credentials_wo_version: Optional[pulumi.Input[builtins.int]] = None,
672
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
673
- description: Optional[pulumi.Input[builtins.str]] = None,
674
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
675
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
676
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
677
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
678
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
679
- local: Optional[pulumi.Input[builtins.bool]] = None,
680
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
681
- namespace: Optional[pulumi.Input[builtins.str]] = None,
682
- path: Optional[pulumi.Input[builtins.str]] = None,
683
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
684
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
685
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
686
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
669
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
670
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
671
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
672
+ description: Optional[pulumi.Input[_builtins.str]] = None,
673
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
674
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
675
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
676
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
677
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
678
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
679
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
680
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
681
+ path: Optional[pulumi.Input[_builtins.str]] = None,
682
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
683
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
684
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
685
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
687
686
  __props__=None):
688
687
  """
689
688
  ## Example Usage
@@ -722,39 +721,39 @@ class SecretBackend(pulumi.CustomResource):
722
721
 
723
722
  :param str resource_name: The name of the resource.
724
723
  :param pulumi.ResourceOptions opts: Options for the resource.
725
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
726
- :param pulumi.Input[builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
727
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
724
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
725
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
726
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
728
727
  issued by this backend. Defaults to '0'.
729
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
730
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
728
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
729
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
731
730
  *Available only for Vault Enterprise*.
732
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
731
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
733
732
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
734
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
733
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
735
734
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
736
735
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
737
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
736
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
738
737
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
739
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
740
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
741
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
738
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
739
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
740
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
742
741
  for credentials issued by this backend. Defaults to '0'.
743
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
742
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
744
743
  The value should not contain leading or trailing forward slashes.
745
744
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
746
745
  *Available only for Vault Enterprise*.
747
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
746
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
748
747
  not begin or end with a `/`. Defaults to `gcp`.
749
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
748
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
750
749
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
751
750
  *Available only for Vault Enterprise*.
752
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
751
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
753
752
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
754
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
753
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
755
754
  a rotation when a scheduled token rotation occurs. The default rotation window is
756
755
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
757
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
756
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
758
757
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
759
758
  """
760
759
  ...
@@ -813,23 +812,23 @@ class SecretBackend(pulumi.CustomResource):
813
812
  def _internal_init(__self__,
814
813
  resource_name: str,
815
814
  opts: Optional[pulumi.ResourceOptions] = None,
816
- credentials: Optional[pulumi.Input[builtins.str]] = None,
817
- credentials_wo_version: Optional[pulumi.Input[builtins.int]] = None,
818
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
819
- description: Optional[pulumi.Input[builtins.str]] = None,
820
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
821
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
822
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
823
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
824
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
825
- local: Optional[pulumi.Input[builtins.bool]] = None,
826
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
827
- namespace: Optional[pulumi.Input[builtins.str]] = None,
828
- path: Optional[pulumi.Input[builtins.str]] = None,
829
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
830
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
831
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
832
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
815
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
816
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
817
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
818
+ description: Optional[pulumi.Input[_builtins.str]] = None,
819
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
820
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
821
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
822
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
823
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
824
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
825
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
826
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
827
+ path: Optional[pulumi.Input[_builtins.str]] = None,
828
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
829
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
830
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
831
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
833
832
  __props__=None):
834
833
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
835
834
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -869,24 +868,24 @@ class SecretBackend(pulumi.CustomResource):
869
868
  def get(resource_name: str,
870
869
  id: pulumi.Input[str],
871
870
  opts: Optional[pulumi.ResourceOptions] = None,
872
- accessor: Optional[pulumi.Input[builtins.str]] = None,
873
- credentials: Optional[pulumi.Input[builtins.str]] = None,
874
- credentials_wo_version: Optional[pulumi.Input[builtins.int]] = None,
875
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
876
- description: Optional[pulumi.Input[builtins.str]] = None,
877
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
878
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
879
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
880
- identity_token_key: Optional[pulumi.Input[builtins.str]] = None,
881
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
882
- local: Optional[pulumi.Input[builtins.bool]] = None,
883
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
884
- namespace: Optional[pulumi.Input[builtins.str]] = None,
885
- path: Optional[pulumi.Input[builtins.str]] = None,
886
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
887
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
888
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
889
- service_account_email: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
871
+ accessor: Optional[pulumi.Input[_builtins.str]] = None,
872
+ credentials: Optional[pulumi.Input[_builtins.str]] = None,
873
+ credentials_wo_version: Optional[pulumi.Input[_builtins.int]] = None,
874
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
875
+ description: Optional[pulumi.Input[_builtins.str]] = None,
876
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
877
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
878
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
879
+ identity_token_key: Optional[pulumi.Input[_builtins.str]] = None,
880
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
881
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
882
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
883
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
884
+ path: Optional[pulumi.Input[_builtins.str]] = None,
885
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
886
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
887
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
888
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
890
889
  """
891
890
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
892
891
  properties used to qualify the lookup.
@@ -894,40 +893,40 @@ class SecretBackend(pulumi.CustomResource):
894
893
  :param str resource_name: The unique name of the resulting resource.
895
894
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
896
895
  :param pulumi.ResourceOptions opts: Options for the resource.
897
- :param pulumi.Input[builtins.str] accessor: The accessor of the created GCP mount.
898
- :param pulumi.Input[builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
899
- :param pulumi.Input[builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
900
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials
896
+ :param pulumi.Input[_builtins.str] accessor: The accessor of the created GCP mount.
897
+ :param pulumi.Input[_builtins.str] credentials: JSON-encoded credentials to use to connect to GCP
898
+ :param pulumi.Input[_builtins.int] credentials_wo_version: The version of the `credentials_wo`. For more info see updating write-only attributes.
899
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials
901
900
  issued by this backend. Defaults to '0'.
902
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
903
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
901
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
902
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
904
903
  *Available only for Vault Enterprise*.
905
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
904
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
906
905
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
907
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value for plugin identity
906
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity
908
907
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
909
908
  Mutually exclusive with `credentials`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
910
- :param pulumi.Input[builtins.str] identity_token_key: The key to use for signing plugin identity
909
+ :param pulumi.Input[_builtins.str] identity_token_key: The key to use for signing plugin identity
911
910
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
912
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated tokens.
913
- :param pulumi.Input[builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
914
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
911
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated tokens.
912
+ :param pulumi.Input[_builtins.bool] local: Boolean flag that can be explicitly set to true to enforce local mount in HA environment
913
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
915
914
  for credentials issued by this backend. Defaults to '0'.
916
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
915
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
917
916
  The value should not contain leading or trailing forward slashes.
918
917
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
919
918
  *Available only for Vault Enterprise*.
920
- :param pulumi.Input[builtins.str] path: The unique path this backend should be mounted at. Must
919
+ :param pulumi.Input[_builtins.str] path: The unique path this backend should be mounted at. Must
921
920
  not begin or end with a `/`. Defaults to `gcp`.
922
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
921
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
923
922
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
924
923
  *Available only for Vault Enterprise*.
925
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
924
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
926
925
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
927
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
926
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
928
927
  a rotation when a scheduled token rotation occurs. The default rotation window is
929
928
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
930
- :param pulumi.Input[builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
929
+ :param pulumi.Input[_builtins.str] service_account_email: Service Account to impersonate for plugin workload identity federation.
931
930
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.
932
931
  """
933
932
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -954,68 +953,68 @@ class SecretBackend(pulumi.CustomResource):
954
953
  __props__.__dict__["service_account_email"] = service_account_email
955
954
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
956
955
 
957
- @property
956
+ @_builtins.property
958
957
  @pulumi.getter
959
- def accessor(self) -> pulumi.Output[builtins.str]:
958
+ def accessor(self) -> pulumi.Output[_builtins.str]:
960
959
  """
961
960
  The accessor of the created GCP mount.
962
961
  """
963
962
  return pulumi.get(self, "accessor")
964
963
 
965
- @property
964
+ @_builtins.property
966
965
  @pulumi.getter
967
- def credentials(self) -> pulumi.Output[Optional[builtins.str]]:
966
+ def credentials(self) -> pulumi.Output[Optional[_builtins.str]]:
968
967
  """
969
968
  JSON-encoded credentials to use to connect to GCP
970
969
  """
971
970
  return pulumi.get(self, "credentials")
972
971
 
973
- @property
972
+ @_builtins.property
974
973
  @pulumi.getter(name="credentialsWoVersion")
975
- def credentials_wo_version(self) -> pulumi.Output[Optional[builtins.int]]:
974
+ def credentials_wo_version(self) -> pulumi.Output[Optional[_builtins.int]]:
976
975
  """
977
976
  The version of the `credentials_wo`. For more info see updating write-only attributes.
978
977
  """
979
978
  return pulumi.get(self, "credentials_wo_version")
980
979
 
981
- @property
980
+ @_builtins.property
982
981
  @pulumi.getter(name="defaultLeaseTtlSeconds")
983
- def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
982
+ def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
984
983
  """
985
984
  The default TTL for credentials
986
985
  issued by this backend. Defaults to '0'.
987
986
  """
988
987
  return pulumi.get(self, "default_lease_ttl_seconds")
989
988
 
990
- @property
989
+ @_builtins.property
991
990
  @pulumi.getter
992
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
991
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
993
992
  """
994
993
  A human-friendly description for this backend.
995
994
  """
996
995
  return pulumi.get(self, "description")
997
996
 
998
- @property
997
+ @_builtins.property
999
998
  @pulumi.getter(name="disableAutomatedRotation")
1000
- def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
999
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
1001
1000
  """
1002
1001
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1003
1002
  *Available only for Vault Enterprise*.
1004
1003
  """
1005
1004
  return pulumi.get(self, "disable_automated_rotation")
1006
1005
 
1007
- @property
1006
+ @_builtins.property
1008
1007
  @pulumi.getter(name="disableRemount")
1009
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1008
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
1010
1009
  """
1011
1010
  If set, opts out of mount migration on path updates.
1012
1011
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
1013
1012
  """
1014
1013
  return pulumi.get(self, "disable_remount")
1015
1014
 
1016
- @property
1015
+ @_builtins.property
1017
1016
  @pulumi.getter(name="identityTokenAudience")
1018
- def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
1017
+ def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
1019
1018
  """
1020
1019
  The audience claim value for plugin identity
1021
1020
  tokens. Must match an allowed audience configured for the target [Workload Identity Pool](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#prepare).
@@ -1023,43 +1022,43 @@ class SecretBackend(pulumi.CustomResource):
1023
1022
  """
1024
1023
  return pulumi.get(self, "identity_token_audience")
1025
1024
 
1026
- @property
1025
+ @_builtins.property
1027
1026
  @pulumi.getter(name="identityTokenKey")
1028
- def identity_token_key(self) -> pulumi.Output[Optional[builtins.str]]:
1027
+ def identity_token_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1029
1028
  """
1030
1029
  The key to use for signing plugin identity
1031
1030
  tokens. Requires Vault 1.17+. *Available only for Vault Enterprise*.
1032
1031
  """
1033
1032
  return pulumi.get(self, "identity_token_key")
1034
1033
 
1035
- @property
1034
+ @_builtins.property
1036
1035
  @pulumi.getter(name="identityTokenTtl")
1037
- def identity_token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1036
+ def identity_token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1038
1037
  """
1039
1038
  The TTL of generated tokens.
1040
1039
  """
1041
1040
  return pulumi.get(self, "identity_token_ttl")
1042
1041
 
1043
- @property
1042
+ @_builtins.property
1044
1043
  @pulumi.getter
1045
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
1044
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
1046
1045
  """
1047
1046
  Boolean flag that can be explicitly set to true to enforce local mount in HA environment
1048
1047
  """
1049
1048
  return pulumi.get(self, "local")
1050
1049
 
1051
- @property
1050
+ @_builtins.property
1052
1051
  @pulumi.getter(name="maxLeaseTtlSeconds")
1053
- def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
1052
+ def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
1054
1053
  """
1055
1054
  The maximum TTL that can be requested
1056
1055
  for credentials issued by this backend. Defaults to '0'.
1057
1056
  """
1058
1057
  return pulumi.get(self, "max_lease_ttl_seconds")
1059
1058
 
1060
- @property
1059
+ @_builtins.property
1061
1060
  @pulumi.getter
1062
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1061
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1063
1062
  """
1064
1063
  The namespace to provision the resource in.
1065
1064
  The value should not contain leading or trailing forward slashes.
@@ -1068,18 +1067,18 @@ class SecretBackend(pulumi.CustomResource):
1068
1067
  """
1069
1068
  return pulumi.get(self, "namespace")
1070
1069
 
1071
- @property
1070
+ @_builtins.property
1072
1071
  @pulumi.getter
1073
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
1072
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
1074
1073
  """
1075
1074
  The unique path this backend should be mounted at. Must
1076
1075
  not begin or end with a `/`. Defaults to `gcp`.
1077
1076
  """
1078
1077
  return pulumi.get(self, "path")
1079
1078
 
1080
- @property
1079
+ @_builtins.property
1081
1080
  @pulumi.getter(name="rotationPeriod")
1082
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
1081
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1083
1082
  """
1084
1083
  The amount of time in seconds Vault should wait before rotating the root credential.
1085
1084
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -1087,18 +1086,18 @@ class SecretBackend(pulumi.CustomResource):
1087
1086
  """
1088
1087
  return pulumi.get(self, "rotation_period")
1089
1088
 
1090
- @property
1089
+ @_builtins.property
1091
1090
  @pulumi.getter(name="rotationSchedule")
1092
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
1091
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
1093
1092
  """
1094
1093
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1095
1094
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. *Available only for Vault Enterprise*.
1096
1095
  """
1097
1096
  return pulumi.get(self, "rotation_schedule")
1098
1097
 
1099
- @property
1098
+ @_builtins.property
1100
1099
  @pulumi.getter(name="rotationWindow")
1101
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
1100
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
1102
1101
  """
1103
1102
  The maximum amount of time in seconds allowed to complete
1104
1103
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1106,9 +1105,9 @@ class SecretBackend(pulumi.CustomResource):
1106
1105
  """
1107
1106
  return pulumi.get(self, "rotation_window")
1108
1107
 
1109
- @property
1108
+ @_builtins.property
1110
1109
  @pulumi.getter(name="serviceAccountEmail")
1111
- def service_account_email(self) -> pulumi.Output[Optional[builtins.str]]:
1110
+ def service_account_email(self) -> pulumi.Output[Optional[_builtins.str]]:
1112
1111
  """
1113
1112
  Service Account to impersonate for plugin workload identity federation.
1114
1113
  Required with `identity_token_audience`. Requires Vault 1.17+. *Available only for Vault Enterprise*.