pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
pulumi_vault/outputs.py CHANGED
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -57,32 +56,32 @@ class AuthBackendTune(dict):
57
56
  return super().get(key, default)
58
57
 
59
58
  def __init__(__self__, *,
60
- allowed_response_headers: Optional[Sequence[builtins.str]] = None,
61
- audit_non_hmac_request_keys: Optional[Sequence[builtins.str]] = None,
62
- audit_non_hmac_response_keys: Optional[Sequence[builtins.str]] = None,
63
- default_lease_ttl: Optional[builtins.str] = None,
64
- listing_visibility: Optional[builtins.str] = None,
65
- max_lease_ttl: Optional[builtins.str] = None,
66
- passthrough_request_headers: Optional[Sequence[builtins.str]] = None,
67
- token_type: Optional[builtins.str] = None):
68
- """
69
- :param Sequence[builtins.str] allowed_response_headers: List of headers to whitelist and allowing
59
+ allowed_response_headers: Optional[Sequence[_builtins.str]] = None,
60
+ audit_non_hmac_request_keys: Optional[Sequence[_builtins.str]] = None,
61
+ audit_non_hmac_response_keys: Optional[Sequence[_builtins.str]] = None,
62
+ default_lease_ttl: Optional[_builtins.str] = None,
63
+ listing_visibility: Optional[_builtins.str] = None,
64
+ max_lease_ttl: Optional[_builtins.str] = None,
65
+ passthrough_request_headers: Optional[Sequence[_builtins.str]] = None,
66
+ token_type: Optional[_builtins.str] = None):
67
+ """
68
+ :param Sequence[_builtins.str] allowed_response_headers: List of headers to whitelist and allowing
70
69
  a plugin to include them in the response.
71
- :param Sequence[builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
70
+ :param Sequence[_builtins.str] audit_non_hmac_request_keys: Specifies the list of keys that will
72
71
  not be HMAC'd by audit devices in the request data object.
73
- :param Sequence[builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
72
+ :param Sequence[_builtins.str] audit_non_hmac_response_keys: Specifies the list of keys that will
74
73
  not be HMAC'd by audit devices in the response data object.
75
- :param builtins.str default_lease_ttl: Specifies the default time-to-live.
74
+ :param _builtins.str default_lease_ttl: Specifies the default time-to-live.
76
75
  If set, this overrides the global default.
77
76
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
78
- :param builtins.str listing_visibility: Specifies whether to show this mount in
77
+ :param _builtins.str listing_visibility: Specifies whether to show this mount in
79
78
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
80
- :param builtins.str max_lease_ttl: Specifies the maximum time-to-live.
79
+ :param _builtins.str max_lease_ttl: Specifies the maximum time-to-live.
81
80
  If set, this overrides the global default.
82
81
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
83
- :param Sequence[builtins.str] passthrough_request_headers: List of headers to whitelist and
82
+ :param Sequence[_builtins.str] passthrough_request_headers: List of headers to whitelist and
84
83
  pass from the request to the backend.
85
- :param builtins.str token_type: Specifies the type of tokens that should be returned by
84
+ :param _builtins.str token_type: Specifies the type of tokens that should be returned by
86
85
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
87
86
  """
88
87
  if allowed_response_headers is not None:
@@ -102,36 +101,36 @@ class AuthBackendTune(dict):
102
101
  if token_type is not None:
103
102
  pulumi.set(__self__, "token_type", token_type)
104
103
 
105
- @property
104
+ @_builtins.property
106
105
  @pulumi.getter(name="allowedResponseHeaders")
107
- def allowed_response_headers(self) -> Optional[Sequence[builtins.str]]:
106
+ def allowed_response_headers(self) -> Optional[Sequence[_builtins.str]]:
108
107
  """
109
108
  List of headers to whitelist and allowing
110
109
  a plugin to include them in the response.
111
110
  """
112
111
  return pulumi.get(self, "allowed_response_headers")
113
112
 
114
- @property
113
+ @_builtins.property
115
114
  @pulumi.getter(name="auditNonHmacRequestKeys")
116
- def audit_non_hmac_request_keys(self) -> Optional[Sequence[builtins.str]]:
115
+ def audit_non_hmac_request_keys(self) -> Optional[Sequence[_builtins.str]]:
117
116
  """
118
117
  Specifies the list of keys that will
119
118
  not be HMAC'd by audit devices in the request data object.
120
119
  """
121
120
  return pulumi.get(self, "audit_non_hmac_request_keys")
122
121
 
123
- @property
122
+ @_builtins.property
124
123
  @pulumi.getter(name="auditNonHmacResponseKeys")
125
- def audit_non_hmac_response_keys(self) -> Optional[Sequence[builtins.str]]:
124
+ def audit_non_hmac_response_keys(self) -> Optional[Sequence[_builtins.str]]:
126
125
  """
127
126
  Specifies the list of keys that will
128
127
  not be HMAC'd by audit devices in the response data object.
129
128
  """
130
129
  return pulumi.get(self, "audit_non_hmac_response_keys")
131
130
 
132
- @property
131
+ @_builtins.property
133
132
  @pulumi.getter(name="defaultLeaseTtl")
134
- def default_lease_ttl(self) -> Optional[builtins.str]:
133
+ def default_lease_ttl(self) -> Optional[_builtins.str]:
135
134
  """
136
135
  Specifies the default time-to-live.
137
136
  If set, this overrides the global default.
@@ -139,18 +138,18 @@ class AuthBackendTune(dict):
139
138
  """
140
139
  return pulumi.get(self, "default_lease_ttl")
141
140
 
142
- @property
141
+ @_builtins.property
143
142
  @pulumi.getter(name="listingVisibility")
144
- def listing_visibility(self) -> Optional[builtins.str]:
143
+ def listing_visibility(self) -> Optional[_builtins.str]:
145
144
  """
146
145
  Specifies whether to show this mount in
147
146
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
148
147
  """
149
148
  return pulumi.get(self, "listing_visibility")
150
149
 
151
- @property
150
+ @_builtins.property
152
151
  @pulumi.getter(name="maxLeaseTtl")
153
- def max_lease_ttl(self) -> Optional[builtins.str]:
152
+ def max_lease_ttl(self) -> Optional[_builtins.str]:
154
153
  """
155
154
  Specifies the maximum time-to-live.
156
155
  If set, this overrides the global default.
@@ -158,18 +157,18 @@ class AuthBackendTune(dict):
158
157
  """
159
158
  return pulumi.get(self, "max_lease_ttl")
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter(name="passthroughRequestHeaders")
163
- def passthrough_request_headers(self) -> Optional[Sequence[builtins.str]]:
162
+ def passthrough_request_headers(self) -> Optional[Sequence[_builtins.str]]:
164
163
  """
165
164
  List of headers to whitelist and
166
165
  pass from the request to the backend.
167
166
  """
168
167
  return pulumi.get(self, "passthrough_request_headers")
169
168
 
170
- @property
169
+ @_builtins.property
171
170
  @pulumi.getter(name="tokenType")
172
- def token_type(self) -> Optional[builtins.str]:
171
+ def token_type(self) -> Optional[_builtins.str]:
173
172
  """
174
173
  Specifies the type of tokens that should be returned by
175
174
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -180,25 +179,25 @@ class AuthBackendTune(dict):
180
179
  @pulumi.output_type
181
180
  class GetPolicyDocumentRuleResult(dict):
182
181
  def __init__(__self__, *,
183
- capabilities: Sequence[builtins.str],
184
- path: builtins.str,
182
+ capabilities: Sequence[_builtins.str],
183
+ path: _builtins.str,
185
184
  allowed_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleAllowedParameterResult']] = None,
186
185
  denied_parameters: Optional[Sequence['outputs.GetPolicyDocumentRuleDeniedParameterResult']] = None,
187
- description: Optional[builtins.str] = None,
188
- max_wrapping_ttl: Optional[builtins.str] = None,
189
- min_wrapping_ttl: Optional[builtins.str] = None,
190
- required_parameters: Optional[Sequence[builtins.str]] = None,
191
- subscribe_event_types: Optional[Sequence[builtins.str]] = None):
192
- """
193
- :param Sequence[builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
194
- :param builtins.str path: A path in Vault that this rule applies to.
186
+ description: Optional[_builtins.str] = None,
187
+ max_wrapping_ttl: Optional[_builtins.str] = None,
188
+ min_wrapping_ttl: Optional[_builtins.str] = None,
189
+ required_parameters: Optional[Sequence[_builtins.str]] = None,
190
+ subscribe_event_types: Optional[Sequence[_builtins.str]] = None):
191
+ """
192
+ :param Sequence[_builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
193
+ :param _builtins.str path: A path in Vault that this rule applies to.
195
194
  :param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
196
195
  :param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
197
- :param builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
198
- :param builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
199
- :param builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
200
- :param Sequence[builtins.str] required_parameters: A list of parameters that must be specified.
201
- :param Sequence[builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
196
+ :param _builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
197
+ :param _builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
198
+ :param _builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
199
+ :param Sequence[_builtins.str] required_parameters: A list of parameters that must be specified.
200
+ :param Sequence[_builtins.str] subscribe_event_types: A list of event types to subscribe to when using `subscribe` capability.
202
201
  """
203
202
  pulumi.set(__self__, "capabilities", capabilities)
204
203
  pulumi.set(__self__, "path", path)
@@ -217,23 +216,23 @@ class GetPolicyDocumentRuleResult(dict):
217
216
  if subscribe_event_types is not None:
218
217
  pulumi.set(__self__, "subscribe_event_types", subscribe_event_types)
219
218
 
220
- @property
219
+ @_builtins.property
221
220
  @pulumi.getter
222
- def capabilities(self) -> Sequence[builtins.str]:
221
+ def capabilities(self) -> Sequence[_builtins.str]:
223
222
  """
224
223
  A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
225
224
  """
226
225
  return pulumi.get(self, "capabilities")
227
226
 
228
- @property
227
+ @_builtins.property
229
228
  @pulumi.getter
230
- def path(self) -> builtins.str:
229
+ def path(self) -> _builtins.str:
231
230
  """
232
231
  A path in Vault that this rule applies to.
233
232
  """
234
233
  return pulumi.get(self, "path")
235
234
 
236
- @property
235
+ @_builtins.property
237
236
  @pulumi.getter(name="allowedParameters")
238
237
  def allowed_parameters(self) -> Optional[Sequence['outputs.GetPolicyDocumentRuleAllowedParameterResult']]:
239
238
  """
@@ -241,7 +240,7 @@ class GetPolicyDocumentRuleResult(dict):
241
240
  """
242
241
  return pulumi.get(self, "allowed_parameters")
243
242
 
244
- @property
243
+ @_builtins.property
245
244
  @pulumi.getter(name="deniedParameters")
246
245
  def denied_parameters(self) -> Optional[Sequence['outputs.GetPolicyDocumentRuleDeniedParameterResult']]:
247
246
  """
@@ -249,41 +248,41 @@ class GetPolicyDocumentRuleResult(dict):
249
248
  """
250
249
  return pulumi.get(self, "denied_parameters")
251
250
 
252
- @property
251
+ @_builtins.property
253
252
  @pulumi.getter
254
- def description(self) -> Optional[builtins.str]:
253
+ def description(self) -> Optional[_builtins.str]:
255
254
  """
256
255
  Description of the rule. Will be added as a comment to rendered rule.
257
256
  """
258
257
  return pulumi.get(self, "description")
259
258
 
260
- @property
259
+ @_builtins.property
261
260
  @pulumi.getter(name="maxWrappingTtl")
262
- def max_wrapping_ttl(self) -> Optional[builtins.str]:
261
+ def max_wrapping_ttl(self) -> Optional[_builtins.str]:
263
262
  """
264
263
  The maximum allowed TTL that clients can specify for a wrapped response.
265
264
  """
266
265
  return pulumi.get(self, "max_wrapping_ttl")
267
266
 
268
- @property
267
+ @_builtins.property
269
268
  @pulumi.getter(name="minWrappingTtl")
270
- def min_wrapping_ttl(self) -> Optional[builtins.str]:
269
+ def min_wrapping_ttl(self) -> Optional[_builtins.str]:
271
270
  """
272
271
  The minimum allowed TTL that clients can specify for a wrapped response.
273
272
  """
274
273
  return pulumi.get(self, "min_wrapping_ttl")
275
274
 
276
- @property
275
+ @_builtins.property
277
276
  @pulumi.getter(name="requiredParameters")
278
- def required_parameters(self) -> Optional[Sequence[builtins.str]]:
277
+ def required_parameters(self) -> Optional[Sequence[_builtins.str]]:
279
278
  """
280
279
  A list of parameters that must be specified.
281
280
  """
282
281
  return pulumi.get(self, "required_parameters")
283
282
 
284
- @property
283
+ @_builtins.property
285
284
  @pulumi.getter(name="subscribeEventTypes")
286
- def subscribe_event_types(self) -> Optional[Sequence[builtins.str]]:
285
+ def subscribe_event_types(self) -> Optional[Sequence[_builtins.str]]:
287
286
  """
288
287
  A list of event types to subscribe to when using `subscribe` capability.
289
288
  """
@@ -293,26 +292,26 @@ class GetPolicyDocumentRuleResult(dict):
293
292
  @pulumi.output_type
294
293
  class GetPolicyDocumentRuleAllowedParameterResult(dict):
295
294
  def __init__(__self__, *,
296
- key: builtins.str,
297
- values: Sequence[builtins.str]):
295
+ key: _builtins.str,
296
+ values: Sequence[_builtins.str]):
298
297
  """
299
- :param builtins.str key: Name of permitted key.
300
- :param Sequence[builtins.str] values: A list of values what are permitted by policy rule.
298
+ :param _builtins.str key: Name of permitted key.
299
+ :param Sequence[_builtins.str] values: A list of values what are permitted by policy rule.
301
300
  """
302
301
  pulumi.set(__self__, "key", key)
303
302
  pulumi.set(__self__, "values", values)
304
303
 
305
- @property
304
+ @_builtins.property
306
305
  @pulumi.getter
307
- def key(self) -> builtins.str:
306
+ def key(self) -> _builtins.str:
308
307
  """
309
308
  Name of permitted key.
310
309
  """
311
310
  return pulumi.get(self, "key")
312
311
 
313
- @property
312
+ @_builtins.property
314
313
  @pulumi.getter
315
- def values(self) -> Sequence[builtins.str]:
314
+ def values(self) -> Sequence[_builtins.str]:
316
315
  """
317
316
  A list of values what are permitted by policy rule.
318
317
  """
@@ -322,26 +321,26 @@ class GetPolicyDocumentRuleAllowedParameterResult(dict):
322
321
  @pulumi.output_type
323
322
  class GetPolicyDocumentRuleDeniedParameterResult(dict):
324
323
  def __init__(__self__, *,
325
- key: builtins.str,
326
- values: Sequence[builtins.str]):
324
+ key: _builtins.str,
325
+ values: Sequence[_builtins.str]):
327
326
  """
328
- :param builtins.str key: Name of denied key.
329
- :param Sequence[builtins.str] values: A list of values what are denied by policy rule.
327
+ :param _builtins.str key: Name of denied key.
328
+ :param Sequence[_builtins.str] values: A list of values what are denied by policy rule.
330
329
  """
331
330
  pulumi.set(__self__, "key", key)
332
331
  pulumi.set(__self__, "values", values)
333
332
 
334
- @property
333
+ @_builtins.property
335
334
  @pulumi.getter
336
- def key(self) -> builtins.str:
335
+ def key(self) -> _builtins.str:
337
336
  """
338
337
  Name of denied key.
339
338
  """
340
339
  return pulumi.get(self, "key")
341
340
 
342
- @property
341
+ @_builtins.property
343
342
  @pulumi.getter
344
- def values(self) -> Sequence[builtins.str]:
343
+ def values(self) -> Sequence[_builtins.str]:
345
344
  """
346
345
  A list of values what are denied by policy rule.
347
346
  """
@@ -2,7 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
5
+ import builtins as _builtins
6
6
  from .. import _utilities
7
7
  import typing
8
8
  # Export this package's modules as members:
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -32,7 +31,7 @@ MYPY = False
32
31
 
33
32
  if not MYPY:
34
33
  class BackendConfigCmpv2AuthenticatorsArgsDict(TypedDict):
35
- cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
34
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
36
35
  """
37
36
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
38
37
  """
@@ -42,33 +41,33 @@ elif False:
42
41
  @pulumi.input_type
43
42
  class BackendConfigCmpv2AuthenticatorsArgs:
44
43
  def __init__(__self__, *,
45
- cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
44
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
46
45
  """
47
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
46
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: "The accessor (required) and cert_role (optional) properties for cert auth backends".
48
47
  """
49
48
  if cert is not None:
50
49
  pulumi.set(__self__, "cert", cert)
51
50
 
52
- @property
51
+ @_builtins.property
53
52
  @pulumi.getter
54
- def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
53
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
55
54
  """
56
55
  "The accessor (required) and cert_role (optional) properties for cert auth backends".
57
56
  """
58
57
  return pulumi.get(self, "cert")
59
58
 
60
59
  @cert.setter
61
- def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
60
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
62
61
  pulumi.set(self, "cert", value)
63
62
 
64
63
 
65
64
  if not MYPY:
66
65
  class BackendConfigEstAuthenticatorsArgsDict(TypedDict):
67
- cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
66
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
68
67
  """
69
68
  The accessor (required) and cert_role (optional) properties for cert auth backends.
70
69
  """
71
- userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
70
+ userpass: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
72
71
  """
73
72
  The accessor (required) property for user pass auth backends.
74
73
  """
@@ -78,49 +77,49 @@ elif False:
78
77
  @pulumi.input_type
79
78
  class BackendConfigEstAuthenticatorsArgs:
80
79
  def __init__(__self__, *,
81
- cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
82
- userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
80
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
81
+ userpass: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
83
82
  """
84
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
85
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] userpass: The accessor (required) property for user pass auth backends.
83
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: The accessor (required) and cert_role (optional) properties for cert auth backends.
84
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] userpass: The accessor (required) property for user pass auth backends.
86
85
  """
87
86
  if cert is not None:
88
87
  pulumi.set(__self__, "cert", cert)
89
88
  if userpass is not None:
90
89
  pulumi.set(__self__, "userpass", userpass)
91
90
 
92
- @property
91
+ @_builtins.property
93
92
  @pulumi.getter
94
- def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
93
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
95
94
  """
96
95
  The accessor (required) and cert_role (optional) properties for cert auth backends.
97
96
  """
98
97
  return pulumi.get(self, "cert")
99
98
 
100
99
  @cert.setter
101
- def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
100
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
102
101
  pulumi.set(self, "cert", value)
103
102
 
104
- @property
103
+ @_builtins.property
105
104
  @pulumi.getter
106
- def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
105
+ def userpass(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
107
106
  """
108
107
  The accessor (required) property for user pass auth backends.
109
108
  """
110
109
  return pulumi.get(self, "userpass")
111
110
 
112
111
  @userpass.setter
113
- def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
112
+ def userpass(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
114
113
  pulumi.set(self, "userpass", value)
115
114
 
116
115
 
117
116
  if not MYPY:
118
117
  class BackendConfigScepAuthenticatorsArgsDict(TypedDict):
119
- cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
118
+ cert: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
120
119
  """
121
120
  The accessor and cert_role properties for cert auth backends
122
121
  """
123
- scep: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
122
+ scep: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
124
123
  """
125
124
  The accessor property for SCEP auth backends
126
125
  """
@@ -130,45 +129,45 @@ elif False:
130
129
  @pulumi.input_type
131
130
  class BackendConfigScepAuthenticatorsArgs:
132
131
  def __init__(__self__, *,
133
- cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
134
- scep: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
132
+ cert: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
133
+ scep: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
135
134
  """
136
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] cert: The accessor and cert_role properties for cert auth backends
137
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] scep: The accessor property for SCEP auth backends
135
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] cert: The accessor and cert_role properties for cert auth backends
136
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] scep: The accessor property for SCEP auth backends
138
137
  """
139
138
  if cert is not None:
140
139
  pulumi.set(__self__, "cert", cert)
141
140
  if scep is not None:
142
141
  pulumi.set(__self__, "scep", scep)
143
142
 
144
- @property
143
+ @_builtins.property
145
144
  @pulumi.getter
146
- def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
145
+ def cert(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
147
146
  """
148
147
  The accessor and cert_role properties for cert auth backends
149
148
  """
150
149
  return pulumi.get(self, "cert")
151
150
 
152
151
  @cert.setter
153
- def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
152
+ def cert(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
154
153
  pulumi.set(self, "cert", value)
155
154
 
156
- @property
155
+ @_builtins.property
157
156
  @pulumi.getter
158
- def scep(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
157
+ def scep(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
159
158
  """
160
159
  The accessor property for SCEP auth backends
161
160
  """
162
161
  return pulumi.get(self, "scep")
163
162
 
164
163
  @scep.setter
165
- def scep(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
164
+ def scep(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
166
165
  pulumi.set(self, "scep", value)
167
166
 
168
167
 
169
168
  if not MYPY:
170
169
  class BackendConfigScepExternalValidationArgsDict(TypedDict):
171
- intune: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
170
+ intune: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]
172
171
  """
173
172
  The credentials to enable Microsoft Intune validation of SCEP requests
174
173
  """
@@ -178,37 +177,37 @@ elif False:
178
177
  @pulumi.input_type
179
178
  class BackendConfigScepExternalValidationArgs:
180
179
  def __init__(__self__, *,
181
- intune: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None):
180
+ intune: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None):
182
181
  """
183
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] intune: The credentials to enable Microsoft Intune validation of SCEP requests
182
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] intune: The credentials to enable Microsoft Intune validation of SCEP requests
184
183
  """
185
184
  if intune is not None:
186
185
  pulumi.set(__self__, "intune", intune)
187
186
 
188
- @property
187
+ @_builtins.property
189
188
  @pulumi.getter
190
- def intune(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
189
+ def intune(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
191
190
  """
192
191
  The credentials to enable Microsoft Intune validation of SCEP requests
193
192
  """
194
193
  return pulumi.get(self, "intune")
195
194
 
196
195
  @intune.setter
197
- def intune(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
196
+ def intune(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
198
197
  pulumi.set(self, "intune", value)
199
198
 
200
199
 
201
200
  if not MYPY:
202
201
  class SecretBackendRolePolicyIdentifierArgsDict(TypedDict):
203
- oid: pulumi.Input[builtins.str]
202
+ oid: pulumi.Input[_builtins.str]
204
203
  """
205
204
  The OID for the policy identifier
206
205
  """
207
- cps: NotRequired[pulumi.Input[builtins.str]]
206
+ cps: NotRequired[pulumi.Input[_builtins.str]]
208
207
  """
209
208
  The URL of the CPS for the policy identifier
210
209
  """
211
- notice: NotRequired[pulumi.Input[builtins.str]]
210
+ notice: NotRequired[pulumi.Input[_builtins.str]]
212
211
  """
213
212
  A notice for the policy identifier
214
213
  """
@@ -218,13 +217,13 @@ elif False:
218
217
  @pulumi.input_type
219
218
  class SecretBackendRolePolicyIdentifierArgs:
220
219
  def __init__(__self__, *,
221
- oid: pulumi.Input[builtins.str],
222
- cps: Optional[pulumi.Input[builtins.str]] = None,
223
- notice: Optional[pulumi.Input[builtins.str]] = None):
220
+ oid: pulumi.Input[_builtins.str],
221
+ cps: Optional[pulumi.Input[_builtins.str]] = None,
222
+ notice: Optional[pulumi.Input[_builtins.str]] = None):
224
223
  """
225
- :param pulumi.Input[builtins.str] oid: The OID for the policy identifier
226
- :param pulumi.Input[builtins.str] cps: The URL of the CPS for the policy identifier
227
- :param pulumi.Input[builtins.str] notice: A notice for the policy identifier
224
+ :param pulumi.Input[_builtins.str] oid: The OID for the policy identifier
225
+ :param pulumi.Input[_builtins.str] cps: The URL of the CPS for the policy identifier
226
+ :param pulumi.Input[_builtins.str] notice: A notice for the policy identifier
228
227
  """
229
228
  pulumi.set(__self__, "oid", oid)
230
229
  if cps is not None:
@@ -232,40 +231,40 @@ class SecretBackendRolePolicyIdentifierArgs:
232
231
  if notice is not None:
233
232
  pulumi.set(__self__, "notice", notice)
234
233
 
235
- @property
234
+ @_builtins.property
236
235
  @pulumi.getter
237
- def oid(self) -> pulumi.Input[builtins.str]:
236
+ def oid(self) -> pulumi.Input[_builtins.str]:
238
237
  """
239
238
  The OID for the policy identifier
240
239
  """
241
240
  return pulumi.get(self, "oid")
242
241
 
243
242
  @oid.setter
244
- def oid(self, value: pulumi.Input[builtins.str]):
243
+ def oid(self, value: pulumi.Input[_builtins.str]):
245
244
  pulumi.set(self, "oid", value)
246
245
 
247
- @property
246
+ @_builtins.property
248
247
  @pulumi.getter
249
- def cps(self) -> Optional[pulumi.Input[builtins.str]]:
248
+ def cps(self) -> Optional[pulumi.Input[_builtins.str]]:
250
249
  """
251
250
  The URL of the CPS for the policy identifier
252
251
  """
253
252
  return pulumi.get(self, "cps")
254
253
 
255
254
  @cps.setter
256
- def cps(self, value: Optional[pulumi.Input[builtins.str]]):
255
+ def cps(self, value: Optional[pulumi.Input[_builtins.str]]):
257
256
  pulumi.set(self, "cps", value)
258
257
 
259
- @property
258
+ @_builtins.property
260
259
  @pulumi.getter
261
- def notice(self) -> Optional[pulumi.Input[builtins.str]]:
260
+ def notice(self) -> Optional[pulumi.Input[_builtins.str]]:
262
261
  """
263
262
  A notice for the policy identifier
264
263
  """
265
264
  return pulumi.get(self, "notice")
266
265
 
267
266
  @notice.setter
268
- def notice(self, value: Optional[pulumi.Input[builtins.str]]):
267
+ def notice(self, value: Optional[pulumi.Input[_builtins.str]]):
269
268
  pulumi.set(self, "notice", value)
270
269
 
271
270