pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -22,25 +21,25 @@ __all__ = ['SecretRolesetArgs', 'SecretRoleset']
22
21
  @pulumi.input_type
23
22
  class SecretRolesetArgs:
24
23
  def __init__(__self__, *,
25
- backend: pulumi.Input[builtins.str],
24
+ backend: pulumi.Input[_builtins.str],
26
25
  bindings: pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]],
27
- project: pulumi.Input[builtins.str],
28
- roleset: pulumi.Input[builtins.str],
29
- namespace: Optional[pulumi.Input[builtins.str]] = None,
30
- secret_type: Optional[pulumi.Input[builtins.str]] = None,
31
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
26
+ project: pulumi.Input[_builtins.str],
27
+ roleset: pulumi.Input[_builtins.str],
28
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
29
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
30
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
32
31
  """
33
32
  The set of arguments for constructing a SecretRoleset resource.
34
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
33
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
35
34
  :param pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
36
- :param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
37
- :param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
38
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
35
+ :param pulumi.Input[_builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
36
+ :param pulumi.Input[_builtins.str] roleset: Name of the Roleset to create
37
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
39
38
  The value should not contain leading or trailing forward slashes.
40
39
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
41
40
  *Available only for Vault Enterprise*.
42
- :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
43
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
41
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
42
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
44
43
  """
45
44
  pulumi.set(__self__, "backend", backend)
46
45
  pulumi.set(__self__, "bindings", bindings)
@@ -53,19 +52,19 @@ class SecretRolesetArgs:
53
52
  if token_scopes is not None:
54
53
  pulumi.set(__self__, "token_scopes", token_scopes)
55
54
 
56
- @property
55
+ @_builtins.property
57
56
  @pulumi.getter
58
- def backend(self) -> pulumi.Input[builtins.str]:
57
+ def backend(self) -> pulumi.Input[_builtins.str]:
59
58
  """
60
59
  Path where the GCP Secrets Engine is mounted
61
60
  """
62
61
  return pulumi.get(self, "backend")
63
62
 
64
63
  @backend.setter
65
- def backend(self, value: pulumi.Input[builtins.str]):
64
+ def backend(self, value: pulumi.Input[_builtins.str]):
66
65
  pulumi.set(self, "backend", value)
67
66
 
68
- @property
67
+ @_builtins.property
69
68
  @pulumi.getter
70
69
  def bindings(self) -> pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]:
71
70
  """
@@ -77,33 +76,33 @@ class SecretRolesetArgs:
77
76
  def bindings(self, value: pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]):
78
77
  pulumi.set(self, "bindings", value)
79
78
 
80
- @property
79
+ @_builtins.property
81
80
  @pulumi.getter
82
- def project(self) -> pulumi.Input[builtins.str]:
81
+ def project(self) -> pulumi.Input[_builtins.str]:
83
82
  """
84
83
  Name of the GCP project that this roleset's service account will belong to.
85
84
  """
86
85
  return pulumi.get(self, "project")
87
86
 
88
87
  @project.setter
89
- def project(self, value: pulumi.Input[builtins.str]):
88
+ def project(self, value: pulumi.Input[_builtins.str]):
90
89
  pulumi.set(self, "project", value)
91
90
 
92
- @property
91
+ @_builtins.property
93
92
  @pulumi.getter
94
- def roleset(self) -> pulumi.Input[builtins.str]:
93
+ def roleset(self) -> pulumi.Input[_builtins.str]:
95
94
  """
96
95
  Name of the Roleset to create
97
96
  """
98
97
  return pulumi.get(self, "roleset")
99
98
 
100
99
  @roleset.setter
101
- def roleset(self, value: pulumi.Input[builtins.str]):
100
+ def roleset(self, value: pulumi.Input[_builtins.str]):
102
101
  pulumi.set(self, "roleset", value)
103
102
 
104
- @property
103
+ @_builtins.property
105
104
  @pulumi.getter
106
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
105
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
107
106
  """
108
107
  The namespace to provision the resource in.
109
108
  The value should not contain leading or trailing forward slashes.
@@ -113,58 +112,58 @@ class SecretRolesetArgs:
113
112
  return pulumi.get(self, "namespace")
114
113
 
115
114
  @namespace.setter
116
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
115
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
117
116
  pulumi.set(self, "namespace", value)
118
117
 
119
- @property
118
+ @_builtins.property
120
119
  @pulumi.getter(name="secretType")
121
- def secret_type(self) -> Optional[pulumi.Input[builtins.str]]:
120
+ def secret_type(self) -> Optional[pulumi.Input[_builtins.str]]:
122
121
  """
123
122
  Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
124
123
  """
125
124
  return pulumi.get(self, "secret_type")
126
125
 
127
126
  @secret_type.setter
128
- def secret_type(self, value: Optional[pulumi.Input[builtins.str]]):
127
+ def secret_type(self, value: Optional[pulumi.Input[_builtins.str]]):
129
128
  pulumi.set(self, "secret_type", value)
130
129
 
131
- @property
130
+ @_builtins.property
132
131
  @pulumi.getter(name="tokenScopes")
133
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
132
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
134
133
  """
135
134
  List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
136
135
  """
137
136
  return pulumi.get(self, "token_scopes")
138
137
 
139
138
  @token_scopes.setter
140
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
139
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
141
140
  pulumi.set(self, "token_scopes", value)
142
141
 
143
142
 
144
143
  @pulumi.input_type
145
144
  class _SecretRolesetState:
146
145
  def __init__(__self__, *,
147
- backend: Optional[pulumi.Input[builtins.str]] = None,
146
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
148
147
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]] = None,
149
- namespace: Optional[pulumi.Input[builtins.str]] = None,
150
- project: Optional[pulumi.Input[builtins.str]] = None,
151
- roleset: Optional[pulumi.Input[builtins.str]] = None,
152
- secret_type: Optional[pulumi.Input[builtins.str]] = None,
153
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
154
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
148
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
149
+ project: Optional[pulumi.Input[_builtins.str]] = None,
150
+ roleset: Optional[pulumi.Input[_builtins.str]] = None,
151
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
152
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
153
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None):
155
154
  """
156
155
  Input properties used for looking up and filtering SecretRoleset resources.
157
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
156
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
158
157
  :param pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
159
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
158
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
160
159
  The value should not contain leading or trailing forward slashes.
161
160
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
162
161
  *Available only for Vault Enterprise*.
163
- :param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
164
- :param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
165
- :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
166
- :param pulumi.Input[builtins.str] service_account_email: Email of the service account created by Vault for this Roleset.
167
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
162
+ :param pulumi.Input[_builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
163
+ :param pulumi.Input[_builtins.str] roleset: Name of the Roleset to create
164
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
165
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the service account created by Vault for this Roleset.
166
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
168
167
  """
169
168
  if backend is not None:
170
169
  pulumi.set(__self__, "backend", backend)
@@ -183,19 +182,19 @@ class _SecretRolesetState:
183
182
  if token_scopes is not None:
184
183
  pulumi.set(__self__, "token_scopes", token_scopes)
185
184
 
186
- @property
185
+ @_builtins.property
187
186
  @pulumi.getter
188
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
187
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
189
188
  """
190
189
  Path where the GCP Secrets Engine is mounted
191
190
  """
192
191
  return pulumi.get(self, "backend")
193
192
 
194
193
  @backend.setter
195
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
194
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
196
195
  pulumi.set(self, "backend", value)
197
196
 
198
- @property
197
+ @_builtins.property
199
198
  @pulumi.getter
200
199
  def bindings(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]]:
201
200
  """
@@ -207,9 +206,9 @@ class _SecretRolesetState:
207
206
  def bindings(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['SecretRolesetBindingArgs']]]]):
208
207
  pulumi.set(self, "bindings", value)
209
208
 
210
- @property
209
+ @_builtins.property
211
210
  @pulumi.getter
212
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
211
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
213
212
  """
214
213
  The namespace to provision the resource in.
215
214
  The value should not contain leading or trailing forward slashes.
@@ -219,67 +218,67 @@ class _SecretRolesetState:
219
218
  return pulumi.get(self, "namespace")
220
219
 
221
220
  @namespace.setter
222
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
221
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
223
222
  pulumi.set(self, "namespace", value)
224
223
 
225
- @property
224
+ @_builtins.property
226
225
  @pulumi.getter
227
- def project(self) -> Optional[pulumi.Input[builtins.str]]:
226
+ def project(self) -> Optional[pulumi.Input[_builtins.str]]:
228
227
  """
229
228
  Name of the GCP project that this roleset's service account will belong to.
230
229
  """
231
230
  return pulumi.get(self, "project")
232
231
 
233
232
  @project.setter
234
- def project(self, value: Optional[pulumi.Input[builtins.str]]):
233
+ def project(self, value: Optional[pulumi.Input[_builtins.str]]):
235
234
  pulumi.set(self, "project", value)
236
235
 
237
- @property
236
+ @_builtins.property
238
237
  @pulumi.getter
239
- def roleset(self) -> Optional[pulumi.Input[builtins.str]]:
238
+ def roleset(self) -> Optional[pulumi.Input[_builtins.str]]:
240
239
  """
241
240
  Name of the Roleset to create
242
241
  """
243
242
  return pulumi.get(self, "roleset")
244
243
 
245
244
  @roleset.setter
246
- def roleset(self, value: Optional[pulumi.Input[builtins.str]]):
245
+ def roleset(self, value: Optional[pulumi.Input[_builtins.str]]):
247
246
  pulumi.set(self, "roleset", value)
248
247
 
249
- @property
248
+ @_builtins.property
250
249
  @pulumi.getter(name="secretType")
251
- def secret_type(self) -> Optional[pulumi.Input[builtins.str]]:
250
+ def secret_type(self) -> Optional[pulumi.Input[_builtins.str]]:
252
251
  """
253
252
  Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
254
253
  """
255
254
  return pulumi.get(self, "secret_type")
256
255
 
257
256
  @secret_type.setter
258
- def secret_type(self, value: Optional[pulumi.Input[builtins.str]]):
257
+ def secret_type(self, value: Optional[pulumi.Input[_builtins.str]]):
259
258
  pulumi.set(self, "secret_type", value)
260
259
 
261
- @property
260
+ @_builtins.property
262
261
  @pulumi.getter(name="serviceAccountEmail")
263
- def service_account_email(self) -> Optional[pulumi.Input[builtins.str]]:
262
+ def service_account_email(self) -> Optional[pulumi.Input[_builtins.str]]:
264
263
  """
265
264
  Email of the service account created by Vault for this Roleset.
266
265
  """
267
266
  return pulumi.get(self, "service_account_email")
268
267
 
269
268
  @service_account_email.setter
270
- def service_account_email(self, value: Optional[pulumi.Input[builtins.str]]):
269
+ def service_account_email(self, value: Optional[pulumi.Input[_builtins.str]]):
271
270
  pulumi.set(self, "service_account_email", value)
272
271
 
273
- @property
272
+ @_builtins.property
274
273
  @pulumi.getter(name="tokenScopes")
275
- def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
274
+ def token_scopes(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
276
275
  """
277
276
  List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
278
277
  """
279
278
  return pulumi.get(self, "token_scopes")
280
279
 
281
280
  @token_scopes.setter
282
- def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
281
+ def token_scopes(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
283
282
  pulumi.set(self, "token_scopes", value)
284
283
 
285
284
 
@@ -289,13 +288,13 @@ class SecretRoleset(pulumi.CustomResource):
289
288
  def __init__(__self__,
290
289
  resource_name: str,
291
290
  opts: Optional[pulumi.ResourceOptions] = None,
292
- backend: Optional[pulumi.Input[builtins.str]] = None,
291
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
293
292
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
294
- namespace: Optional[pulumi.Input[builtins.str]] = None,
295
- project: Optional[pulumi.Input[builtins.str]] = None,
296
- roleset: Optional[pulumi.Input[builtins.str]] = None,
297
- secret_type: Optional[pulumi.Input[builtins.str]] = None,
298
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
293
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
294
+ project: Optional[pulumi.Input[_builtins.str]] = None,
295
+ roleset: Optional[pulumi.Input[_builtins.str]] = None,
296
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
297
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
299
298
  __props__=None):
300
299
  """
301
300
  Creates a Roleset in the [GCP Secrets Engine](https://www.vaultproject.io/docs/secrets/gcp/index.html) for Vault.
@@ -335,16 +334,16 @@ class SecretRoleset(pulumi.CustomResource):
335
334
 
336
335
  :param str resource_name: The name of the resource.
337
336
  :param pulumi.ResourceOptions opts: Options for the resource.
338
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
337
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
339
338
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
340
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
339
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
341
340
  The value should not contain leading or trailing forward slashes.
342
341
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
343
342
  *Available only for Vault Enterprise*.
344
- :param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
345
- :param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
346
- :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
347
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
343
+ :param pulumi.Input[_builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
344
+ :param pulumi.Input[_builtins.str] roleset: Name of the Roleset to create
345
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
346
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
348
347
  """
349
348
  ...
350
349
  @overload
@@ -403,13 +402,13 @@ class SecretRoleset(pulumi.CustomResource):
403
402
  def _internal_init(__self__,
404
403
  resource_name: str,
405
404
  opts: Optional[pulumi.ResourceOptions] = None,
406
- backend: Optional[pulumi.Input[builtins.str]] = None,
405
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
407
406
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
408
- namespace: Optional[pulumi.Input[builtins.str]] = None,
409
- project: Optional[pulumi.Input[builtins.str]] = None,
410
- roleset: Optional[pulumi.Input[builtins.str]] = None,
411
- secret_type: Optional[pulumi.Input[builtins.str]] = None,
412
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
407
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
408
+ project: Optional[pulumi.Input[_builtins.str]] = None,
409
+ roleset: Optional[pulumi.Input[_builtins.str]] = None,
410
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
411
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
413
412
  __props__=None):
414
413
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
415
414
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -445,14 +444,14 @@ class SecretRoleset(pulumi.CustomResource):
445
444
  def get(resource_name: str,
446
445
  id: pulumi.Input[str],
447
446
  opts: Optional[pulumi.ResourceOptions] = None,
448
- backend: Optional[pulumi.Input[builtins.str]] = None,
447
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
449
448
  bindings: Optional[pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]]] = None,
450
- namespace: Optional[pulumi.Input[builtins.str]] = None,
451
- project: Optional[pulumi.Input[builtins.str]] = None,
452
- roleset: Optional[pulumi.Input[builtins.str]] = None,
453
- secret_type: Optional[pulumi.Input[builtins.str]] = None,
454
- service_account_email: Optional[pulumi.Input[builtins.str]] = None,
455
- token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None) -> 'SecretRoleset':
449
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
450
+ project: Optional[pulumi.Input[_builtins.str]] = None,
451
+ roleset: Optional[pulumi.Input[_builtins.str]] = None,
452
+ secret_type: Optional[pulumi.Input[_builtins.str]] = None,
453
+ service_account_email: Optional[pulumi.Input[_builtins.str]] = None,
454
+ token_scopes: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None) -> 'SecretRoleset':
456
455
  """
457
456
  Get an existing SecretRoleset resource's state with the given name, id, and optional extra
458
457
  properties used to qualify the lookup.
@@ -460,17 +459,17 @@ class SecretRoleset(pulumi.CustomResource):
460
459
  :param str resource_name: The unique name of the resulting resource.
461
460
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
462
461
  :param pulumi.ResourceOptions opts: Options for the resource.
463
- :param pulumi.Input[builtins.str] backend: Path where the GCP Secrets Engine is mounted
462
+ :param pulumi.Input[_builtins.str] backend: Path where the GCP Secrets Engine is mounted
464
463
  :param pulumi.Input[Sequence[pulumi.Input[Union['SecretRolesetBindingArgs', 'SecretRolesetBindingArgsDict']]]] bindings: Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
465
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
464
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
466
465
  The value should not contain leading or trailing forward slashes.
467
466
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
468
467
  *Available only for Vault Enterprise*.
469
- :param pulumi.Input[builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
470
- :param pulumi.Input[builtins.str] roleset: Name of the Roleset to create
471
- :param pulumi.Input[builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
472
- :param pulumi.Input[builtins.str] service_account_email: Email of the service account created by Vault for this Roleset.
473
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
468
+ :param pulumi.Input[_builtins.str] project: Name of the GCP project that this roleset's service account will belong to.
469
+ :param pulumi.Input[_builtins.str] roleset: Name of the Roleset to create
470
+ :param pulumi.Input[_builtins.str] secret_type: Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
471
+ :param pulumi.Input[_builtins.str] service_account_email: Email of the service account created by Vault for this Roleset.
472
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_scopes: List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
474
473
  """
475
474
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
476
475
 
@@ -486,15 +485,15 @@ class SecretRoleset(pulumi.CustomResource):
486
485
  __props__.__dict__["token_scopes"] = token_scopes
487
486
  return SecretRoleset(resource_name, opts=opts, __props__=__props__)
488
487
 
489
- @property
488
+ @_builtins.property
490
489
  @pulumi.getter
491
- def backend(self) -> pulumi.Output[builtins.str]:
490
+ def backend(self) -> pulumi.Output[_builtins.str]:
492
491
  """
493
492
  Path where the GCP Secrets Engine is mounted
494
493
  """
495
494
  return pulumi.get(self, "backend")
496
495
 
497
- @property
496
+ @_builtins.property
498
497
  @pulumi.getter
499
498
  def bindings(self) -> pulumi.Output[Sequence['outputs.SecretRolesetBinding']]:
500
499
  """
@@ -502,9 +501,9 @@ class SecretRoleset(pulumi.CustomResource):
502
501
  """
503
502
  return pulumi.get(self, "bindings")
504
503
 
505
- @property
504
+ @_builtins.property
506
505
  @pulumi.getter
507
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
506
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
508
507
  """
509
508
  The namespace to provision the resource in.
510
509
  The value should not contain leading or trailing forward slashes.
@@ -513,41 +512,41 @@ class SecretRoleset(pulumi.CustomResource):
513
512
  """
514
513
  return pulumi.get(self, "namespace")
515
514
 
516
- @property
515
+ @_builtins.property
517
516
  @pulumi.getter
518
- def project(self) -> pulumi.Output[builtins.str]:
517
+ def project(self) -> pulumi.Output[_builtins.str]:
519
518
  """
520
519
  Name of the GCP project that this roleset's service account will belong to.
521
520
  """
522
521
  return pulumi.get(self, "project")
523
522
 
524
- @property
523
+ @_builtins.property
525
524
  @pulumi.getter
526
- def roleset(self) -> pulumi.Output[builtins.str]:
525
+ def roleset(self) -> pulumi.Output[_builtins.str]:
527
526
  """
528
527
  Name of the Roleset to create
529
528
  """
530
529
  return pulumi.get(self, "roleset")
531
530
 
532
- @property
531
+ @_builtins.property
533
532
  @pulumi.getter(name="secretType")
534
- def secret_type(self) -> pulumi.Output[builtins.str]:
533
+ def secret_type(self) -> pulumi.Output[_builtins.str]:
535
534
  """
536
535
  Type of secret generated for this role set. Accepted values: `access_token`, `service_account_key`. Defaults to `access_token`.
537
536
  """
538
537
  return pulumi.get(self, "secret_type")
539
538
 
540
- @property
539
+ @_builtins.property
541
540
  @pulumi.getter(name="serviceAccountEmail")
542
- def service_account_email(self) -> pulumi.Output[builtins.str]:
541
+ def service_account_email(self) -> pulumi.Output[_builtins.str]:
543
542
  """
544
543
  Email of the service account created by Vault for this Roleset.
545
544
  """
546
545
  return pulumi.get(self, "service_account_email")
547
546
 
548
- @property
547
+ @_builtins.property
549
548
  @pulumi.getter(name="tokenScopes")
550
- def token_scopes(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
549
+ def token_scopes(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
551
550
  """
552
551
  List of OAuth scopes to assign to `access_token` secrets generated under this role set (`access_token` role sets only).
553
552
  """