pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,20 +19,20 @@ __all__ = ['AuthBackendIdentityWhitelistArgs', 'AuthBackendIdentityWhitelist']
20
19
  @pulumi.input_type
21
20
  class AuthBackendIdentityWhitelistArgs:
22
21
  def __init__(__self__, *,
23
- backend: Optional[pulumi.Input[builtins.str]] = None,
24
- disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
25
- namespace: Optional[pulumi.Input[builtins.str]] = None,
26
- safety_buffer: Optional[pulumi.Input[builtins.int]] = None):
22
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
23
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
25
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None):
27
26
  """
28
27
  The set of arguments for constructing a AuthBackendIdentityWhitelist resource.
29
- :param pulumi.Input[builtins.str] backend: The path of the AWS backend being configured.
30
- :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
28
+ :param pulumi.Input[_builtins.str] backend: The path of the AWS backend being configured.
29
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
31
30
  tidying of the identity-whitelist entries.
32
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
31
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
33
32
  The value should not contain leading or trailing forward slashes.
34
33
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
34
  *Available only for Vault Enterprise*.
36
- :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time, in minutes, that must
35
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time, in minutes, that must
37
36
  have passed beyond the roletag expiration, before it is removed from the
38
37
  backend storage.
39
38
  """
@@ -46,21 +45,21 @@ class AuthBackendIdentityWhitelistArgs:
46
45
  if safety_buffer is not None:
47
46
  pulumi.set(__self__, "safety_buffer", safety_buffer)
48
47
 
49
- @property
48
+ @_builtins.property
50
49
  @pulumi.getter
51
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
50
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
52
51
  """
53
52
  The path of the AWS backend being configured.
54
53
  """
55
54
  return pulumi.get(self, "backend")
56
55
 
57
56
  @backend.setter
58
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
57
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
59
58
  pulumi.set(self, "backend", value)
60
59
 
61
- @property
60
+ @_builtins.property
62
61
  @pulumi.getter(name="disablePeriodicTidy")
63
- def disable_periodic_tidy(self) -> Optional[pulumi.Input[builtins.bool]]:
62
+ def disable_periodic_tidy(self) -> Optional[pulumi.Input[_builtins.bool]]:
64
63
  """
65
64
  If set to true, disables the periodic
66
65
  tidying of the identity-whitelist entries.
@@ -68,12 +67,12 @@ class AuthBackendIdentityWhitelistArgs:
68
67
  return pulumi.get(self, "disable_periodic_tidy")
69
68
 
70
69
  @disable_periodic_tidy.setter
71
- def disable_periodic_tidy(self, value: Optional[pulumi.Input[builtins.bool]]):
70
+ def disable_periodic_tidy(self, value: Optional[pulumi.Input[_builtins.bool]]):
72
71
  pulumi.set(self, "disable_periodic_tidy", value)
73
72
 
74
- @property
73
+ @_builtins.property
75
74
  @pulumi.getter
76
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
75
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
77
76
  """
78
77
  The namespace to provision the resource in.
79
78
  The value should not contain leading or trailing forward slashes.
@@ -83,12 +82,12 @@ class AuthBackendIdentityWhitelistArgs:
83
82
  return pulumi.get(self, "namespace")
84
83
 
85
84
  @namespace.setter
86
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
85
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
87
86
  pulumi.set(self, "namespace", value)
88
87
 
89
- @property
88
+ @_builtins.property
90
89
  @pulumi.getter(name="safetyBuffer")
91
- def safety_buffer(self) -> Optional[pulumi.Input[builtins.int]]:
90
+ def safety_buffer(self) -> Optional[pulumi.Input[_builtins.int]]:
92
91
  """
93
92
  The amount of extra time, in minutes, that must
94
93
  have passed beyond the roletag expiration, before it is removed from the
@@ -97,27 +96,27 @@ class AuthBackendIdentityWhitelistArgs:
97
96
  return pulumi.get(self, "safety_buffer")
98
97
 
99
98
  @safety_buffer.setter
100
- def safety_buffer(self, value: Optional[pulumi.Input[builtins.int]]):
99
+ def safety_buffer(self, value: Optional[pulumi.Input[_builtins.int]]):
101
100
  pulumi.set(self, "safety_buffer", value)
102
101
 
103
102
 
104
103
  @pulumi.input_type
105
104
  class _AuthBackendIdentityWhitelistState:
106
105
  def __init__(__self__, *,
107
- backend: Optional[pulumi.Input[builtins.str]] = None,
108
- disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
109
- namespace: Optional[pulumi.Input[builtins.str]] = None,
110
- safety_buffer: Optional[pulumi.Input[builtins.int]] = None):
106
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
107
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
108
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
109
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None):
111
110
  """
112
111
  Input properties used for looking up and filtering AuthBackendIdentityWhitelist resources.
113
- :param pulumi.Input[builtins.str] backend: The path of the AWS backend being configured.
114
- :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
112
+ :param pulumi.Input[_builtins.str] backend: The path of the AWS backend being configured.
113
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
115
114
  tidying of the identity-whitelist entries.
116
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
115
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
117
116
  The value should not contain leading or trailing forward slashes.
118
117
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
119
118
  *Available only for Vault Enterprise*.
120
- :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time, in minutes, that must
119
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time, in minutes, that must
121
120
  have passed beyond the roletag expiration, before it is removed from the
122
121
  backend storage.
123
122
  """
@@ -130,21 +129,21 @@ class _AuthBackendIdentityWhitelistState:
130
129
  if safety_buffer is not None:
131
130
  pulumi.set(__self__, "safety_buffer", safety_buffer)
132
131
 
133
- @property
132
+ @_builtins.property
134
133
  @pulumi.getter
135
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
134
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
136
135
  """
137
136
  The path of the AWS backend being configured.
138
137
  """
139
138
  return pulumi.get(self, "backend")
140
139
 
141
140
  @backend.setter
142
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
141
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
143
142
  pulumi.set(self, "backend", value)
144
143
 
145
- @property
144
+ @_builtins.property
146
145
  @pulumi.getter(name="disablePeriodicTidy")
147
- def disable_periodic_tidy(self) -> Optional[pulumi.Input[builtins.bool]]:
146
+ def disable_periodic_tidy(self) -> Optional[pulumi.Input[_builtins.bool]]:
148
147
  """
149
148
  If set to true, disables the periodic
150
149
  tidying of the identity-whitelist entries.
@@ -152,12 +151,12 @@ class _AuthBackendIdentityWhitelistState:
152
151
  return pulumi.get(self, "disable_periodic_tidy")
153
152
 
154
153
  @disable_periodic_tidy.setter
155
- def disable_periodic_tidy(self, value: Optional[pulumi.Input[builtins.bool]]):
154
+ def disable_periodic_tidy(self, value: Optional[pulumi.Input[_builtins.bool]]):
156
155
  pulumi.set(self, "disable_periodic_tidy", value)
157
156
 
158
- @property
157
+ @_builtins.property
159
158
  @pulumi.getter
160
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
159
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
161
160
  """
162
161
  The namespace to provision the resource in.
163
162
  The value should not contain leading or trailing forward slashes.
@@ -167,12 +166,12 @@ class _AuthBackendIdentityWhitelistState:
167
166
  return pulumi.get(self, "namespace")
168
167
 
169
168
  @namespace.setter
170
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
169
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
171
170
  pulumi.set(self, "namespace", value)
172
171
 
173
- @property
172
+ @_builtins.property
174
173
  @pulumi.getter(name="safetyBuffer")
175
- def safety_buffer(self) -> Optional[pulumi.Input[builtins.int]]:
174
+ def safety_buffer(self) -> Optional[pulumi.Input[_builtins.int]]:
176
175
  """
177
176
  The amount of extra time, in minutes, that must
178
177
  have passed beyond the roletag expiration, before it is removed from the
@@ -181,7 +180,7 @@ class _AuthBackendIdentityWhitelistState:
181
180
  return pulumi.get(self, "safety_buffer")
182
181
 
183
182
  @safety_buffer.setter
184
- def safety_buffer(self, value: Optional[pulumi.Input[builtins.int]]):
183
+ def safety_buffer(self, value: Optional[pulumi.Input[_builtins.int]]):
185
184
  pulumi.set(self, "safety_buffer", value)
186
185
 
187
186
 
@@ -191,10 +190,10 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
191
190
  def __init__(__self__,
192
191
  resource_name: str,
193
192
  opts: Optional[pulumi.ResourceOptions] = None,
194
- backend: Optional[pulumi.Input[builtins.str]] = None,
195
- disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
196
- namespace: Optional[pulumi.Input[builtins.str]] = None,
197
- safety_buffer: Optional[pulumi.Input[builtins.int]] = None,
193
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
194
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
195
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
196
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None,
198
197
  __props__=None):
199
198
  """
200
199
  Configures the periodic tidying operation of the whitelisted identity entries.
@@ -224,14 +223,14 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
224
223
 
225
224
  :param str resource_name: The name of the resource.
226
225
  :param pulumi.ResourceOptions opts: Options for the resource.
227
- :param pulumi.Input[builtins.str] backend: The path of the AWS backend being configured.
228
- :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
226
+ :param pulumi.Input[_builtins.str] backend: The path of the AWS backend being configured.
227
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
229
228
  tidying of the identity-whitelist entries.
230
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
229
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
231
230
  The value should not contain leading or trailing forward slashes.
232
231
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
233
232
  *Available only for Vault Enterprise*.
234
- :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time, in minutes, that must
233
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time, in minutes, that must
235
234
  have passed beyond the roletag expiration, before it is removed from the
236
235
  backend storage.
237
236
  """
@@ -282,10 +281,10 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
282
281
  def _internal_init(__self__,
283
282
  resource_name: str,
284
283
  opts: Optional[pulumi.ResourceOptions] = None,
285
- backend: Optional[pulumi.Input[builtins.str]] = None,
286
- disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
287
- namespace: Optional[pulumi.Input[builtins.str]] = None,
288
- safety_buffer: Optional[pulumi.Input[builtins.int]] = None,
284
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
285
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
286
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
287
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None,
289
288
  __props__=None):
290
289
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
291
290
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -309,10 +308,10 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
309
308
  def get(resource_name: str,
310
309
  id: pulumi.Input[str],
311
310
  opts: Optional[pulumi.ResourceOptions] = None,
312
- backend: Optional[pulumi.Input[builtins.str]] = None,
313
- disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
314
- namespace: Optional[pulumi.Input[builtins.str]] = None,
315
- safety_buffer: Optional[pulumi.Input[builtins.int]] = None) -> 'AuthBackendIdentityWhitelist':
311
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
312
+ disable_periodic_tidy: Optional[pulumi.Input[_builtins.bool]] = None,
313
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
314
+ safety_buffer: Optional[pulumi.Input[_builtins.int]] = None) -> 'AuthBackendIdentityWhitelist':
316
315
  """
317
316
  Get an existing AuthBackendIdentityWhitelist resource's state with the given name, id, and optional extra
318
317
  properties used to qualify the lookup.
@@ -320,14 +319,14 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
320
319
  :param str resource_name: The unique name of the resulting resource.
321
320
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
322
321
  :param pulumi.ResourceOptions opts: Options for the resource.
323
- :param pulumi.Input[builtins.str] backend: The path of the AWS backend being configured.
324
- :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
322
+ :param pulumi.Input[_builtins.str] backend: The path of the AWS backend being configured.
323
+ :param pulumi.Input[_builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
325
324
  tidying of the identity-whitelist entries.
326
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
325
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
327
326
  The value should not contain leading or trailing forward slashes.
328
327
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
329
328
  *Available only for Vault Enterprise*.
330
- :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time, in minutes, that must
329
+ :param pulumi.Input[_builtins.int] safety_buffer: The amount of extra time, in minutes, that must
331
330
  have passed beyond the roletag expiration, before it is removed from the
332
331
  backend storage.
333
332
  """
@@ -341,26 +340,26 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
341
340
  __props__.__dict__["safety_buffer"] = safety_buffer
342
341
  return AuthBackendIdentityWhitelist(resource_name, opts=opts, __props__=__props__)
343
342
 
344
- @property
343
+ @_builtins.property
345
344
  @pulumi.getter
346
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
345
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
347
346
  """
348
347
  The path of the AWS backend being configured.
349
348
  """
350
349
  return pulumi.get(self, "backend")
351
350
 
352
- @property
351
+ @_builtins.property
353
352
  @pulumi.getter(name="disablePeriodicTidy")
354
- def disable_periodic_tidy(self) -> pulumi.Output[Optional[builtins.bool]]:
353
+ def disable_periodic_tidy(self) -> pulumi.Output[Optional[_builtins.bool]]:
355
354
  """
356
355
  If set to true, disables the periodic
357
356
  tidying of the identity-whitelist entries.
358
357
  """
359
358
  return pulumi.get(self, "disable_periodic_tidy")
360
359
 
361
- @property
360
+ @_builtins.property
362
361
  @pulumi.getter
363
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
362
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
364
363
  """
365
364
  The namespace to provision the resource in.
366
365
  The value should not contain leading or trailing forward slashes.
@@ -369,9 +368,9 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
369
368
  """
370
369
  return pulumi.get(self, "namespace")
371
370
 
372
- @property
371
+ @_builtins.property
373
372
  @pulumi.getter(name="safetyBuffer")
374
- def safety_buffer(self) -> pulumi.Output[Optional[builtins.int]]:
373
+ def safety_buffer(self) -> pulumi.Output[Optional[_builtins.int]]:
375
374
  """
376
375
  The amount of extra time, in minutes, that must
377
376
  have passed beyond the roletag expiration, before it is removed from the