pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,44 +19,44 @@ __all__ = ['SecretBackendArgs', 'SecretBackend']
20
19
  @pulumi.input_type
21
20
  class SecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- address: pulumi.Input[builtins.str],
24
- bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
25
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
26
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
27
- client_key: Optional[pulumi.Input[builtins.str]] = None,
28
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
29
- description: Optional[pulumi.Input[builtins.str]] = None,
30
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
31
- local: Optional[pulumi.Input[builtins.bool]] = None,
32
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
33
- namespace: Optional[pulumi.Input[builtins.str]] = None,
34
- path: Optional[pulumi.Input[builtins.str]] = None,
35
- scheme: Optional[pulumi.Input[builtins.str]] = None,
36
- token: Optional[pulumi.Input[builtins.str]] = None):
22
+ address: pulumi.Input[_builtins.str],
23
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
24
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
25
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
26
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
27
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
28
+ description: Optional[pulumi.Input[_builtins.str]] = None,
29
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
33
+ path: Optional[pulumi.Input[_builtins.str]] = None,
34
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
35
+ token: Optional[pulumi.Input[_builtins.str]] = None):
37
36
  """
38
37
  The set of arguments for constructing a SecretBackend resource.
39
- :param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
40
- :param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
41
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
42
- :param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
38
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
39
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
40
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
41
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
43
42
  this is set you need to also set client_key.
44
- :param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
43
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
45
44
  you need to also set client_cert.
46
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
47
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
48
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
45
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
46
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
47
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
49
48
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
50
- :param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
51
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
49
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
50
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
52
51
  for credentials issued by this backend.
53
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
52
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
54
53
  The value should not contain leading or trailing forward slashes.
55
54
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
56
55
  *Available only for Vault Enterprise*.
57
- :param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
56
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
58
57
  to `consul`.
59
- :param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
60
- :param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
58
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
59
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
61
60
  """
62
61
  pulumi.set(__self__, "address", address)
63
62
  if bootstrap is not None:
@@ -87,45 +86,45 @@ class SecretBackendArgs:
87
86
  if token is not None:
88
87
  pulumi.set(__self__, "token", token)
89
88
 
90
- @property
89
+ @_builtins.property
91
90
  @pulumi.getter
92
- def address(self) -> pulumi.Input[builtins.str]:
91
+ def address(self) -> pulumi.Input[_builtins.str]:
93
92
  """
94
93
  Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
95
94
  """
96
95
  return pulumi.get(self, "address")
97
96
 
98
97
  @address.setter
99
- def address(self, value: pulumi.Input[builtins.str]):
98
+ def address(self, value: pulumi.Input[_builtins.str]):
100
99
  pulumi.set(self, "address", value)
101
100
 
102
- @property
101
+ @_builtins.property
103
102
  @pulumi.getter
104
- def bootstrap(self) -> Optional[pulumi.Input[builtins.bool]]:
103
+ def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
105
104
  """
106
105
  Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
107
106
  """
108
107
  return pulumi.get(self, "bootstrap")
109
108
 
110
109
  @bootstrap.setter
111
- def bootstrap(self, value: Optional[pulumi.Input[builtins.bool]]):
110
+ def bootstrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
112
111
  pulumi.set(self, "bootstrap", value)
113
112
 
114
- @property
113
+ @_builtins.property
115
114
  @pulumi.getter(name="caCert")
116
- def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
115
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
117
116
  """
118
117
  CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
119
118
  """
120
119
  return pulumi.get(self, "ca_cert")
121
120
 
122
121
  @ca_cert.setter
123
- def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
122
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
124
123
  pulumi.set(self, "ca_cert", value)
125
124
 
126
- @property
125
+ @_builtins.property
127
126
  @pulumi.getter(name="clientCert")
128
- def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
127
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
129
128
  """
130
129
  Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
131
130
  this is set you need to also set client_key.
@@ -133,12 +132,12 @@ class SecretBackendArgs:
133
132
  return pulumi.get(self, "client_cert")
134
133
 
135
134
  @client_cert.setter
136
- def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
135
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
137
136
  pulumi.set(self, "client_cert", value)
138
137
 
139
- @property
138
+ @_builtins.property
140
139
  @pulumi.getter(name="clientKey")
141
- def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
140
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
142
141
  """
143
142
  Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
144
143
  you need to also set client_cert.
@@ -146,36 +145,36 @@ class SecretBackendArgs:
146
145
  return pulumi.get(self, "client_key")
147
146
 
148
147
  @client_key.setter
149
- def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
148
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
150
149
  pulumi.set(self, "client_key", value)
151
150
 
152
- @property
151
+ @_builtins.property
153
152
  @pulumi.getter(name="defaultLeaseTtlSeconds")
154
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
153
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
155
154
  """
156
155
  The default TTL for credentials issued by this backend.
157
156
  """
158
157
  return pulumi.get(self, "default_lease_ttl_seconds")
159
158
 
160
159
  @default_lease_ttl_seconds.setter
161
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
160
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
162
161
  pulumi.set(self, "default_lease_ttl_seconds", value)
163
162
 
164
- @property
163
+ @_builtins.property
165
164
  @pulumi.getter
166
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
165
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
167
166
  """
168
167
  A human-friendly description for this backend.
169
168
  """
170
169
  return pulumi.get(self, "description")
171
170
 
172
171
  @description.setter
173
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
172
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
174
173
  pulumi.set(self, "description", value)
175
174
 
176
- @property
175
+ @_builtins.property
177
176
  @pulumi.getter(name="disableRemount")
178
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
177
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
179
178
  """
180
179
  If set, opts out of mount migration on path updates.
181
180
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -183,24 +182,24 @@ class SecretBackendArgs:
183
182
  return pulumi.get(self, "disable_remount")
184
183
 
185
184
  @disable_remount.setter
186
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
185
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
187
186
  pulumi.set(self, "disable_remount", value)
188
187
 
189
- @property
188
+ @_builtins.property
190
189
  @pulumi.getter
191
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
190
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
192
191
  """
193
192
  Specifies if the secret backend is local only.
194
193
  """
195
194
  return pulumi.get(self, "local")
196
195
 
197
196
  @local.setter
198
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
197
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
199
198
  pulumi.set(self, "local", value)
200
199
 
201
- @property
200
+ @_builtins.property
202
201
  @pulumi.getter(name="maxLeaseTtlSeconds")
203
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
202
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
204
203
  """
205
204
  The maximum TTL that can be requested
206
205
  for credentials issued by this backend.
@@ -208,12 +207,12 @@ class SecretBackendArgs:
208
207
  return pulumi.get(self, "max_lease_ttl_seconds")
209
208
 
210
209
  @max_lease_ttl_seconds.setter
211
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
210
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
212
211
  pulumi.set(self, "max_lease_ttl_seconds", value)
213
212
 
214
- @property
213
+ @_builtins.property
215
214
  @pulumi.getter
216
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
215
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
217
216
  """
218
217
  The namespace to provision the resource in.
219
218
  The value should not contain leading or trailing forward slashes.
@@ -223,12 +222,12 @@ class SecretBackendArgs:
223
222
  return pulumi.get(self, "namespace")
224
223
 
225
224
  @namespace.setter
226
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
225
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
227
226
  pulumi.set(self, "namespace", value)
228
227
 
229
- @property
228
+ @_builtins.property
230
229
  @pulumi.getter
231
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
230
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
232
231
  """
233
232
  The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
234
233
  to `consul`.
@@ -236,75 +235,75 @@ class SecretBackendArgs:
236
235
  return pulumi.get(self, "path")
237
236
 
238
237
  @path.setter
239
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
238
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
240
239
  pulumi.set(self, "path", value)
241
240
 
242
- @property
241
+ @_builtins.property
243
242
  @pulumi.getter
244
- def scheme(self) -> Optional[pulumi.Input[builtins.str]]:
243
+ def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
245
244
  """
246
245
  Specifies the URL scheme to use. Defaults to `http`.
247
246
  """
248
247
  return pulumi.get(self, "scheme")
249
248
 
250
249
  @scheme.setter
251
- def scheme(self, value: Optional[pulumi.Input[builtins.str]]):
250
+ def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
252
251
  pulumi.set(self, "scheme", value)
253
252
 
254
- @property
253
+ @_builtins.property
255
254
  @pulumi.getter
256
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
255
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
257
256
  """
258
257
  Specifies the Consul token to use when managing or issuing new tokens.
259
258
  """
260
259
  return pulumi.get(self, "token")
261
260
 
262
261
  @token.setter
263
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
262
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
264
263
  pulumi.set(self, "token", value)
265
264
 
266
265
 
267
266
  @pulumi.input_type
268
267
  class _SecretBackendState:
269
268
  def __init__(__self__, *,
270
- address: Optional[pulumi.Input[builtins.str]] = None,
271
- bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
272
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
273
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
274
- client_key: Optional[pulumi.Input[builtins.str]] = None,
275
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
276
- description: Optional[pulumi.Input[builtins.str]] = None,
277
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
278
- local: Optional[pulumi.Input[builtins.bool]] = None,
279
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
280
- namespace: Optional[pulumi.Input[builtins.str]] = None,
281
- path: Optional[pulumi.Input[builtins.str]] = None,
282
- scheme: Optional[pulumi.Input[builtins.str]] = None,
283
- token: Optional[pulumi.Input[builtins.str]] = None):
269
+ address: Optional[pulumi.Input[_builtins.str]] = None,
270
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
271
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
272
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
273
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
274
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
275
+ description: Optional[pulumi.Input[_builtins.str]] = None,
276
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
277
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
278
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
279
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
280
+ path: Optional[pulumi.Input[_builtins.str]] = None,
281
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
282
+ token: Optional[pulumi.Input[_builtins.str]] = None):
284
283
  """
285
284
  Input properties used for looking up and filtering SecretBackend resources.
286
- :param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
287
- :param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
288
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
289
- :param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
285
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
286
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
287
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
288
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
290
289
  this is set you need to also set client_key.
291
- :param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
290
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
292
291
  you need to also set client_cert.
293
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
294
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
295
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
292
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
293
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
294
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
296
295
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
297
- :param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
298
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
296
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
297
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
299
298
  for credentials issued by this backend.
300
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
299
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
301
300
  The value should not contain leading or trailing forward slashes.
302
301
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
303
302
  *Available only for Vault Enterprise*.
304
- :param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
303
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
305
304
  to `consul`.
306
- :param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
307
- :param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
305
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
306
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
308
307
  """
309
308
  if address is not None:
310
309
  pulumi.set(__self__, "address", address)
@@ -335,45 +334,45 @@ class _SecretBackendState:
335
334
  if token is not None:
336
335
  pulumi.set(__self__, "token", token)
337
336
 
338
- @property
337
+ @_builtins.property
339
338
  @pulumi.getter
340
- def address(self) -> Optional[pulumi.Input[builtins.str]]:
339
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
341
340
  """
342
341
  Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
343
342
  """
344
343
  return pulumi.get(self, "address")
345
344
 
346
345
  @address.setter
347
- def address(self, value: Optional[pulumi.Input[builtins.str]]):
346
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
348
347
  pulumi.set(self, "address", value)
349
348
 
350
- @property
349
+ @_builtins.property
351
350
  @pulumi.getter
352
- def bootstrap(self) -> Optional[pulumi.Input[builtins.bool]]:
351
+ def bootstrap(self) -> Optional[pulumi.Input[_builtins.bool]]:
353
352
  """
354
353
  Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
355
354
  """
356
355
  return pulumi.get(self, "bootstrap")
357
356
 
358
357
  @bootstrap.setter
359
- def bootstrap(self, value: Optional[pulumi.Input[builtins.bool]]):
358
+ def bootstrap(self, value: Optional[pulumi.Input[_builtins.bool]]):
360
359
  pulumi.set(self, "bootstrap", value)
361
360
 
362
- @property
361
+ @_builtins.property
363
362
  @pulumi.getter(name="caCert")
364
- def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
363
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
365
364
  """
366
365
  CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
367
366
  """
368
367
  return pulumi.get(self, "ca_cert")
369
368
 
370
369
  @ca_cert.setter
371
- def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
370
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
372
371
  pulumi.set(self, "ca_cert", value)
373
372
 
374
- @property
373
+ @_builtins.property
375
374
  @pulumi.getter(name="clientCert")
376
- def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
375
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
377
376
  """
378
377
  Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
379
378
  this is set you need to also set client_key.
@@ -381,12 +380,12 @@ class _SecretBackendState:
381
380
  return pulumi.get(self, "client_cert")
382
381
 
383
382
  @client_cert.setter
384
- def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
383
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
385
384
  pulumi.set(self, "client_cert", value)
386
385
 
387
- @property
386
+ @_builtins.property
388
387
  @pulumi.getter(name="clientKey")
389
- def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
388
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
390
389
  """
391
390
  Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
392
391
  you need to also set client_cert.
@@ -394,36 +393,36 @@ class _SecretBackendState:
394
393
  return pulumi.get(self, "client_key")
395
394
 
396
395
  @client_key.setter
397
- def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
396
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
398
397
  pulumi.set(self, "client_key", value)
399
398
 
400
- @property
399
+ @_builtins.property
401
400
  @pulumi.getter(name="defaultLeaseTtlSeconds")
402
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
401
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
403
402
  """
404
403
  The default TTL for credentials issued by this backend.
405
404
  """
406
405
  return pulumi.get(self, "default_lease_ttl_seconds")
407
406
 
408
407
  @default_lease_ttl_seconds.setter
409
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
408
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
410
409
  pulumi.set(self, "default_lease_ttl_seconds", value)
411
410
 
412
- @property
411
+ @_builtins.property
413
412
  @pulumi.getter
414
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
413
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
415
414
  """
416
415
  A human-friendly description for this backend.
417
416
  """
418
417
  return pulumi.get(self, "description")
419
418
 
420
419
  @description.setter
421
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
420
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
422
421
  pulumi.set(self, "description", value)
423
422
 
424
- @property
423
+ @_builtins.property
425
424
  @pulumi.getter(name="disableRemount")
426
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
425
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
427
426
  """
428
427
  If set, opts out of mount migration on path updates.
429
428
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -431,24 +430,24 @@ class _SecretBackendState:
431
430
  return pulumi.get(self, "disable_remount")
432
431
 
433
432
  @disable_remount.setter
434
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
433
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
435
434
  pulumi.set(self, "disable_remount", value)
436
435
 
437
- @property
436
+ @_builtins.property
438
437
  @pulumi.getter
439
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
438
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
440
439
  """
441
440
  Specifies if the secret backend is local only.
442
441
  """
443
442
  return pulumi.get(self, "local")
444
443
 
445
444
  @local.setter
446
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
445
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
447
446
  pulumi.set(self, "local", value)
448
447
 
449
- @property
448
+ @_builtins.property
450
449
  @pulumi.getter(name="maxLeaseTtlSeconds")
451
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
450
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
452
451
  """
453
452
  The maximum TTL that can be requested
454
453
  for credentials issued by this backend.
@@ -456,12 +455,12 @@ class _SecretBackendState:
456
455
  return pulumi.get(self, "max_lease_ttl_seconds")
457
456
 
458
457
  @max_lease_ttl_seconds.setter
459
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
458
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
460
459
  pulumi.set(self, "max_lease_ttl_seconds", value)
461
460
 
462
- @property
461
+ @_builtins.property
463
462
  @pulumi.getter
464
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
463
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
465
464
  """
466
465
  The namespace to provision the resource in.
467
466
  The value should not contain leading or trailing forward slashes.
@@ -471,12 +470,12 @@ class _SecretBackendState:
471
470
  return pulumi.get(self, "namespace")
472
471
 
473
472
  @namespace.setter
474
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
473
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
475
474
  pulumi.set(self, "namespace", value)
476
475
 
477
- @property
476
+ @_builtins.property
478
477
  @pulumi.getter
479
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
478
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
480
479
  """
481
480
  The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
482
481
  to `consul`.
@@ -484,31 +483,31 @@ class _SecretBackendState:
484
483
  return pulumi.get(self, "path")
485
484
 
486
485
  @path.setter
487
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
486
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
488
487
  pulumi.set(self, "path", value)
489
488
 
490
- @property
489
+ @_builtins.property
491
490
  @pulumi.getter
492
- def scheme(self) -> Optional[pulumi.Input[builtins.str]]:
491
+ def scheme(self) -> Optional[pulumi.Input[_builtins.str]]:
493
492
  """
494
493
  Specifies the URL scheme to use. Defaults to `http`.
495
494
  """
496
495
  return pulumi.get(self, "scheme")
497
496
 
498
497
  @scheme.setter
499
- def scheme(self, value: Optional[pulumi.Input[builtins.str]]):
498
+ def scheme(self, value: Optional[pulumi.Input[_builtins.str]]):
500
499
  pulumi.set(self, "scheme", value)
501
500
 
502
- @property
501
+ @_builtins.property
503
502
  @pulumi.getter
504
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
503
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
505
504
  """
506
505
  Specifies the Consul token to use when managing or issuing new tokens.
507
506
  """
508
507
  return pulumi.get(self, "token")
509
508
 
510
509
  @token.setter
511
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
510
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
512
511
  pulumi.set(self, "token", value)
513
512
 
514
513
 
@@ -518,20 +517,20 @@ class SecretBackend(pulumi.CustomResource):
518
517
  def __init__(__self__,
519
518
  resource_name: str,
520
519
  opts: Optional[pulumi.ResourceOptions] = None,
521
- address: Optional[pulumi.Input[builtins.str]] = None,
522
- bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
523
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
524
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
525
- client_key: Optional[pulumi.Input[builtins.str]] = None,
526
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
527
- description: Optional[pulumi.Input[builtins.str]] = None,
528
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
529
- local: Optional[pulumi.Input[builtins.bool]] = None,
530
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
531
- namespace: Optional[pulumi.Input[builtins.str]] = None,
532
- path: Optional[pulumi.Input[builtins.str]] = None,
533
- scheme: Optional[pulumi.Input[builtins.str]] = None,
534
- token: Optional[pulumi.Input[builtins.str]] = None,
520
+ address: Optional[pulumi.Input[_builtins.str]] = None,
521
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
522
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
523
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
524
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
525
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
526
+ description: Optional[pulumi.Input[_builtins.str]] = None,
527
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
528
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
529
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
530
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
531
+ path: Optional[pulumi.Input[_builtins.str]] = None,
532
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
533
+ token: Optional[pulumi.Input[_builtins.str]] = None,
535
534
  __props__=None):
536
535
  """
537
536
  ## Example Usage
@@ -570,28 +569,28 @@ class SecretBackend(pulumi.CustomResource):
570
569
 
571
570
  :param str resource_name: The name of the resource.
572
571
  :param pulumi.ResourceOptions opts: Options for the resource.
573
- :param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
574
- :param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
575
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
576
- :param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
572
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
573
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
574
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
575
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
577
576
  this is set you need to also set client_key.
578
- :param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
577
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
579
578
  you need to also set client_cert.
580
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
581
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
582
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
579
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
580
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
581
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
583
582
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
584
- :param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
585
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
583
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
584
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
586
585
  for credentials issued by this backend.
587
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
586
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
588
587
  The value should not contain leading or trailing forward slashes.
589
588
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
590
589
  *Available only for Vault Enterprise*.
591
- :param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
590
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
592
591
  to `consul`.
593
- :param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
594
- :param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
592
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
593
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
595
594
  """
596
595
  ...
597
596
  @overload
@@ -649,20 +648,20 @@ class SecretBackend(pulumi.CustomResource):
649
648
  def _internal_init(__self__,
650
649
  resource_name: str,
651
650
  opts: Optional[pulumi.ResourceOptions] = None,
652
- address: Optional[pulumi.Input[builtins.str]] = None,
653
- bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
654
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
655
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
656
- client_key: Optional[pulumi.Input[builtins.str]] = None,
657
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
658
- description: Optional[pulumi.Input[builtins.str]] = None,
659
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
660
- local: Optional[pulumi.Input[builtins.bool]] = None,
661
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
662
- namespace: Optional[pulumi.Input[builtins.str]] = None,
663
- path: Optional[pulumi.Input[builtins.str]] = None,
664
- scheme: Optional[pulumi.Input[builtins.str]] = None,
665
- token: Optional[pulumi.Input[builtins.str]] = None,
651
+ address: Optional[pulumi.Input[_builtins.str]] = None,
652
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
653
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
654
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
655
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
656
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
657
+ description: Optional[pulumi.Input[_builtins.str]] = None,
658
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
659
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
660
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
661
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
662
+ path: Optional[pulumi.Input[_builtins.str]] = None,
663
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
664
+ token: Optional[pulumi.Input[_builtins.str]] = None,
666
665
  __props__=None):
667
666
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
668
667
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -700,20 +699,20 @@ class SecretBackend(pulumi.CustomResource):
700
699
  def get(resource_name: str,
701
700
  id: pulumi.Input[str],
702
701
  opts: Optional[pulumi.ResourceOptions] = None,
703
- address: Optional[pulumi.Input[builtins.str]] = None,
704
- bootstrap: Optional[pulumi.Input[builtins.bool]] = None,
705
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
706
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
707
- client_key: Optional[pulumi.Input[builtins.str]] = None,
708
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
709
- description: Optional[pulumi.Input[builtins.str]] = None,
710
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
711
- local: Optional[pulumi.Input[builtins.bool]] = None,
712
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
713
- namespace: Optional[pulumi.Input[builtins.str]] = None,
714
- path: Optional[pulumi.Input[builtins.str]] = None,
715
- scheme: Optional[pulumi.Input[builtins.str]] = None,
716
- token: Optional[pulumi.Input[builtins.str]] = None) -> 'SecretBackend':
702
+ address: Optional[pulumi.Input[_builtins.str]] = None,
703
+ bootstrap: Optional[pulumi.Input[_builtins.bool]] = None,
704
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
705
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
706
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
707
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
708
+ description: Optional[pulumi.Input[_builtins.str]] = None,
709
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
710
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
711
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
712
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
713
+ path: Optional[pulumi.Input[_builtins.str]] = None,
714
+ scheme: Optional[pulumi.Input[_builtins.str]] = None,
715
+ token: Optional[pulumi.Input[_builtins.str]] = None) -> 'SecretBackend':
717
716
  """
718
717
  Get an existing SecretBackend resource's state with the given name, id, and optional extra
719
718
  properties used to qualify the lookup.
@@ -721,28 +720,28 @@ class SecretBackend(pulumi.CustomResource):
721
720
  :param str resource_name: The unique name of the resulting resource.
722
721
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
723
722
  :param pulumi.ResourceOptions opts: Options for the resource.
724
- :param pulumi.Input[builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
725
- :param pulumi.Input[builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
726
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
727
- :param pulumi.Input[builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
723
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
724
+ :param pulumi.Input[_builtins.bool] bootstrap: Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
725
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
726
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
728
727
  this is set you need to also set client_key.
729
- :param pulumi.Input[builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
728
+ :param pulumi.Input[_builtins.str] client_key: Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
730
729
  you need to also set client_cert.
731
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
732
- :param pulumi.Input[builtins.str] description: A human-friendly description for this backend.
733
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
730
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: The default TTL for credentials issued by this backend.
731
+ :param pulumi.Input[_builtins.str] description: A human-friendly description for this backend.
732
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
734
733
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
735
- :param pulumi.Input[builtins.bool] local: Specifies if the secret backend is local only.
736
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
734
+ :param pulumi.Input[_builtins.bool] local: Specifies if the secret backend is local only.
735
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: The maximum TTL that can be requested
737
736
  for credentials issued by this backend.
738
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
737
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
739
738
  The value should not contain leading or trailing forward slashes.
740
739
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
741
740
  *Available only for Vault Enterprise*.
742
- :param pulumi.Input[builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
741
+ :param pulumi.Input[_builtins.str] path: The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
743
742
  to `consul`.
744
- :param pulumi.Input[builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
745
- :param pulumi.Input[builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
743
+ :param pulumi.Input[_builtins.str] scheme: Specifies the URL scheme to use. Defaults to `http`.
744
+ :param pulumi.Input[_builtins.str] token: Specifies the Consul token to use when managing or issuing new tokens.
746
745
  """
747
746
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
748
747
 
@@ -764,93 +763,93 @@ class SecretBackend(pulumi.CustomResource):
764
763
  __props__.__dict__["token"] = token
765
764
  return SecretBackend(resource_name, opts=opts, __props__=__props__)
766
765
 
767
- @property
766
+ @_builtins.property
768
767
  @pulumi.getter
769
- def address(self) -> pulumi.Output[builtins.str]:
768
+ def address(self) -> pulumi.Output[_builtins.str]:
770
769
  """
771
770
  Specifies the address of the Consul instance, provided as "host:port" like "127.0.0.1:8500".
772
771
  """
773
772
  return pulumi.get(self, "address")
774
773
 
775
- @property
774
+ @_builtins.property
776
775
  @pulumi.getter
777
- def bootstrap(self) -> pulumi.Output[Optional[builtins.bool]]:
776
+ def bootstrap(self) -> pulumi.Output[Optional[_builtins.bool]]:
778
777
  """
779
778
  Denotes a backend resource that is used to bootstrap the Consul ACL system. Only one resource may be used to bootstrap.
780
779
  """
781
780
  return pulumi.get(self, "bootstrap")
782
781
 
783
- @property
782
+ @_builtins.property
784
783
  @pulumi.getter(name="caCert")
785
- def ca_cert(self) -> pulumi.Output[Optional[builtins.str]]:
784
+ def ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
786
785
  """
787
786
  CA certificate to use when verifying Consul server certificate, must be x509 PEM encoded.
788
787
  """
789
788
  return pulumi.get(self, "ca_cert")
790
789
 
791
- @property
790
+ @_builtins.property
792
791
  @pulumi.getter(name="clientCert")
793
- def client_cert(self) -> pulumi.Output[Optional[builtins.str]]:
792
+ def client_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
794
793
  """
795
794
  Client certificate used for Consul's TLS communication, must be x509 PEM encoded and if
796
795
  this is set you need to also set client_key.
797
796
  """
798
797
  return pulumi.get(self, "client_cert")
799
798
 
800
- @property
799
+ @_builtins.property
801
800
  @pulumi.getter(name="clientKey")
802
- def client_key(self) -> pulumi.Output[Optional[builtins.str]]:
801
+ def client_key(self) -> pulumi.Output[Optional[_builtins.str]]:
803
802
  """
804
803
  Client key used for Consul's TLS communication, must be x509 PEM encoded and if this is set
805
804
  you need to also set client_cert.
806
805
  """
807
806
  return pulumi.get(self, "client_key")
808
807
 
809
- @property
808
+ @_builtins.property
810
809
  @pulumi.getter(name="defaultLeaseTtlSeconds")
811
- def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
810
+ def default_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
812
811
  """
813
812
  The default TTL for credentials issued by this backend.
814
813
  """
815
814
  return pulumi.get(self, "default_lease_ttl_seconds")
816
815
 
817
- @property
816
+ @_builtins.property
818
817
  @pulumi.getter
819
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
818
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
820
819
  """
821
820
  A human-friendly description for this backend.
822
821
  """
823
822
  return pulumi.get(self, "description")
824
823
 
825
- @property
824
+ @_builtins.property
826
825
  @pulumi.getter(name="disableRemount")
827
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
826
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
828
827
  """
829
828
  If set, opts out of mount migration on path updates.
830
829
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
831
830
  """
832
831
  return pulumi.get(self, "disable_remount")
833
832
 
834
- @property
833
+ @_builtins.property
835
834
  @pulumi.getter
836
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
835
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
837
836
  """
838
837
  Specifies if the secret backend is local only.
839
838
  """
840
839
  return pulumi.get(self, "local")
841
840
 
842
- @property
841
+ @_builtins.property
843
842
  @pulumi.getter(name="maxLeaseTtlSeconds")
844
- def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[builtins.int]]:
843
+ def max_lease_ttl_seconds(self) -> pulumi.Output[Optional[_builtins.int]]:
845
844
  """
846
845
  The maximum TTL that can be requested
847
846
  for credentials issued by this backend.
848
847
  """
849
848
  return pulumi.get(self, "max_lease_ttl_seconds")
850
849
 
851
- @property
850
+ @_builtins.property
852
851
  @pulumi.getter
853
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
852
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
854
853
  """
855
854
  The namespace to provision the resource in.
856
855
  The value should not contain leading or trailing forward slashes.
@@ -859,26 +858,26 @@ class SecretBackend(pulumi.CustomResource):
859
858
  """
860
859
  return pulumi.get(self, "namespace")
861
860
 
862
- @property
861
+ @_builtins.property
863
862
  @pulumi.getter
864
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
863
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
865
864
  """
866
865
  The unique location this backend should be mounted at. Must not begin or end with a `/`. Defaults
867
866
  to `consul`.
868
867
  """
869
868
  return pulumi.get(self, "path")
870
869
 
871
- @property
870
+ @_builtins.property
872
871
  @pulumi.getter
873
- def scheme(self) -> pulumi.Output[Optional[builtins.str]]:
872
+ def scheme(self) -> pulumi.Output[Optional[_builtins.str]]:
874
873
  """
875
874
  Specifies the URL scheme to use. Defaults to `http`.
876
875
  """
877
876
  return pulumi.get(self, "scheme")
878
877
 
879
- @property
878
+ @_builtins.property
880
879
  @pulumi.getter
881
- def token(self) -> pulumi.Output[Optional[builtins.str]]:
880
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
882
881
  """
883
882
  Specifies the Consul token to use when managing or issuing new tokens.
884
883
  """