pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,44 +19,44 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
20
19
  @pulumi.input_type
21
20
  class SecretBackendRoleArgs:
22
21
  def __init__(__self__, *,
23
- backend: Optional[pulumi.Input[builtins.str]] = None,
24
- consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
25
- consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- local: Optional[pulumi.Input[builtins.bool]] = None,
28
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
29
- name: Optional[pulumi.Input[builtins.str]] = None,
30
- namespace: Optional[pulumi.Input[builtins.str]] = None,
31
- node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
32
- partition: Optional[pulumi.Input[builtins.str]] = None,
33
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
34
- service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
35
- ttl: Optional[pulumi.Input[builtins.int]] = None):
22
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
23
+ consul_namespace: Optional[pulumi.Input[_builtins.str]] = None,
24
+ consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
27
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
28
+ name: Optional[pulumi.Input[_builtins.str]] = None,
29
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
30
+ node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
31
+ partition: Optional[pulumi.Input[_builtins.str]] = None,
32
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
33
+ service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
34
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
36
35
  """
37
36
  The set of arguments for constructing a SecretBackendRole resource.
38
- :param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
39
- :param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
37
+ :param pulumi.Input[_builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
38
+ :param pulumi.Input[_builtins.str] consul_namespace: The Consul namespace that the token will be created in.
40
39
  Applicable for Vault 1.10+ and Consul 1.7+".
41
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
42
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
40
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
41
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
43
42
  Applicable for Vault 1.10+ with Consul 1.5+.
44
- :param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
45
- :param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
46
- :param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
47
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
43
+ :param pulumi.Input[_builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
44
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
45
+ :param pulumi.Input[_builtins.str] name: The name of the Consul secrets engine role to create.
46
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
48
47
  The value should not contain leading or trailing forward slashes.
49
48
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
50
49
  *Available only for Vault Enterprise*.
51
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
50
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
52
51
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
53
- :param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
52
+ :param pulumi.Input[_builtins.str] partition: The admin partition that the token will be created in.
54
53
  Applicable for Vault 1.10+ and Consul 1.11+".
55
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
56
55
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
57
56
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
58
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
57
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
59
58
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
60
- :param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
59
+ :param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role.
61
60
  """
62
61
  if backend is not None:
63
62
  pulumi.set(__self__, "backend", backend)
@@ -86,21 +85,21 @@ class SecretBackendRoleArgs:
86
85
  if ttl is not None:
87
86
  pulumi.set(__self__, "ttl", ttl)
88
87
 
89
- @property
88
+ @_builtins.property
90
89
  @pulumi.getter
91
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
90
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
92
91
  """
93
92
  The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
94
93
  """
95
94
  return pulumi.get(self, "backend")
96
95
 
97
96
  @backend.setter
98
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
97
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
99
98
  pulumi.set(self, "backend", value)
100
99
 
101
- @property
100
+ @_builtins.property
102
101
  @pulumi.getter(name="consulNamespace")
103
- def consul_namespace(self) -> Optional[pulumi.Input[builtins.str]]:
102
+ def consul_namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
104
103
  """
105
104
  The Consul namespace that the token will be created in.
106
105
  Applicable for Vault 1.10+ and Consul 1.7+".
@@ -108,24 +107,24 @@ class SecretBackendRoleArgs:
108
107
  return pulumi.get(self, "consul_namespace")
109
108
 
110
109
  @consul_namespace.setter
111
- def consul_namespace(self, value: Optional[pulumi.Input[builtins.str]]):
110
+ def consul_namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
112
111
  pulumi.set(self, "consul_namespace", value)
113
112
 
114
- @property
113
+ @_builtins.property
115
114
  @pulumi.getter(name="consulPolicies")
116
- def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
115
+ def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
117
116
  """
118
117
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
119
118
  """
120
119
  return pulumi.get(self, "consul_policies")
121
120
 
122
121
  @consul_policies.setter
123
- def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
122
+ def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
124
123
  pulumi.set(self, "consul_policies", value)
125
124
 
126
- @property
125
+ @_builtins.property
127
126
  @pulumi.getter(name="consulRoles")
128
- def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
127
+ def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
129
128
  """
130
129
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
131
130
  Applicable for Vault 1.10+ with Consul 1.5+.
@@ -133,48 +132,48 @@ class SecretBackendRoleArgs:
133
132
  return pulumi.get(self, "consul_roles")
134
133
 
135
134
  @consul_roles.setter
136
- def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
135
+ def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
137
136
  pulumi.set(self, "consul_roles", value)
138
137
 
139
- @property
138
+ @_builtins.property
140
139
  @pulumi.getter
141
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
140
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
142
141
  """
143
142
  Indicates that the token should not be replicated globally and instead be local to the current datacenter.
144
143
  """
145
144
  return pulumi.get(self, "local")
146
145
 
147
146
  @local.setter
148
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
147
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
149
148
  pulumi.set(self, "local", value)
150
149
 
151
- @property
150
+ @_builtins.property
152
151
  @pulumi.getter(name="maxTtl")
153
- def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
152
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
154
153
  """
155
154
  Maximum TTL for leases associated with this role, in seconds.
156
155
  """
157
156
  return pulumi.get(self, "max_ttl")
158
157
 
159
158
  @max_ttl.setter
160
- def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
159
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
161
160
  pulumi.set(self, "max_ttl", value)
162
161
 
163
- @property
162
+ @_builtins.property
164
163
  @pulumi.getter
165
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
164
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
166
165
  """
167
166
  The name of the Consul secrets engine role to create.
168
167
  """
169
168
  return pulumi.get(self, "name")
170
169
 
171
170
  @name.setter
172
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
171
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
173
172
  pulumi.set(self, "name", value)
174
173
 
175
- @property
174
+ @_builtins.property
176
175
  @pulumi.getter
177
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
176
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
178
177
  """
179
178
  The namespace to provision the resource in.
180
179
  The value should not contain leading or trailing forward slashes.
@@ -184,12 +183,12 @@ class SecretBackendRoleArgs:
184
183
  return pulumi.get(self, "namespace")
185
184
 
186
185
  @namespace.setter
187
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
186
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
188
187
  pulumi.set(self, "namespace", value)
189
188
 
190
- @property
189
+ @_builtins.property
191
190
  @pulumi.getter(name="nodeIdentities")
192
- def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
191
+ def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
193
192
  """
194
193
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
195
194
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -197,12 +196,12 @@ class SecretBackendRoleArgs:
197
196
  return pulumi.get(self, "node_identities")
198
197
 
199
198
  @node_identities.setter
200
- def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
199
+ def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
201
200
  pulumi.set(self, "node_identities", value)
202
201
 
203
- @property
202
+ @_builtins.property
204
203
  @pulumi.getter
205
- def partition(self) -> Optional[pulumi.Input[builtins.str]]:
204
+ def partition(self) -> Optional[pulumi.Input[_builtins.str]]:
206
205
  """
207
206
  The admin partition that the token will be created in.
208
207
  Applicable for Vault 1.10+ and Consul 1.11+".
@@ -210,12 +209,12 @@ class SecretBackendRoleArgs:
210
209
  return pulumi.get(self, "partition")
211
210
 
212
211
  @partition.setter
213
- def partition(self, value: Optional[pulumi.Input[builtins.str]]):
212
+ def partition(self, value: Optional[pulumi.Input[_builtins.str]]):
214
213
  pulumi.set(self, "partition", value)
215
214
 
216
- @property
215
+ @_builtins.property
217
216
  @pulumi.getter
218
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
217
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
219
218
  """
220
219
  The list of Consul ACL policies to associate with these roles.
221
220
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
@@ -224,12 +223,12 @@ class SecretBackendRoleArgs:
224
223
  return pulumi.get(self, "policies")
225
224
 
226
225
  @policies.setter
227
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
226
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
228
227
  pulumi.set(self, "policies", value)
229
228
 
230
- @property
229
+ @_builtins.property
231
230
  @pulumi.getter(name="serviceIdentities")
232
- def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
231
+ def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
233
232
  """
234
233
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
235
234
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
@@ -237,63 +236,63 @@ class SecretBackendRoleArgs:
237
236
  return pulumi.get(self, "service_identities")
238
237
 
239
238
  @service_identities.setter
240
- def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
239
+ def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
241
240
  pulumi.set(self, "service_identities", value)
242
241
 
243
- @property
242
+ @_builtins.property
244
243
  @pulumi.getter
245
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
244
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
246
245
  """
247
246
  Specifies the TTL for this role.
248
247
  """
249
248
  return pulumi.get(self, "ttl")
250
249
 
251
250
  @ttl.setter
252
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
251
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
253
252
  pulumi.set(self, "ttl", value)
254
253
 
255
254
 
256
255
  @pulumi.input_type
257
256
  class _SecretBackendRoleState:
258
257
  def __init__(__self__, *,
259
- backend: Optional[pulumi.Input[builtins.str]] = None,
260
- consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
261
- consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
262
- consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
263
- local: Optional[pulumi.Input[builtins.bool]] = None,
264
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
265
- name: Optional[pulumi.Input[builtins.str]] = None,
266
- namespace: Optional[pulumi.Input[builtins.str]] = None,
267
- node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
268
- partition: Optional[pulumi.Input[builtins.str]] = None,
269
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
270
- service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
271
- ttl: Optional[pulumi.Input[builtins.int]] = None):
258
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
259
+ consul_namespace: Optional[pulumi.Input[_builtins.str]] = None,
260
+ consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
261
+ consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
262
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
263
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
264
+ name: Optional[pulumi.Input[_builtins.str]] = None,
265
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
266
+ node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
267
+ partition: Optional[pulumi.Input[_builtins.str]] = None,
268
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
269
+ service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
270
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
272
271
  """
273
272
  Input properties used for looking up and filtering SecretBackendRole resources.
274
- :param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
275
- :param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
273
+ :param pulumi.Input[_builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
274
+ :param pulumi.Input[_builtins.str] consul_namespace: The Consul namespace that the token will be created in.
276
275
  Applicable for Vault 1.10+ and Consul 1.7+".
277
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
278
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
276
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
277
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
279
278
  Applicable for Vault 1.10+ with Consul 1.5+.
280
- :param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
281
- :param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
282
- :param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
283
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
279
+ :param pulumi.Input[_builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
280
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
281
+ :param pulumi.Input[_builtins.str] name: The name of the Consul secrets engine role to create.
282
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
284
283
  The value should not contain leading or trailing forward slashes.
285
284
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
286
285
  *Available only for Vault Enterprise*.
287
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
286
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
288
287
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
289
- :param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
288
+ :param pulumi.Input[_builtins.str] partition: The admin partition that the token will be created in.
290
289
  Applicable for Vault 1.10+ and Consul 1.11+".
291
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
290
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
292
291
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
293
292
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
294
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
293
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
295
294
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
296
- :param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
295
+ :param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role.
297
296
  """
298
297
  if backend is not None:
299
298
  pulumi.set(__self__, "backend", backend)
@@ -322,21 +321,21 @@ class _SecretBackendRoleState:
322
321
  if ttl is not None:
323
322
  pulumi.set(__self__, "ttl", ttl)
324
323
 
325
- @property
324
+ @_builtins.property
326
325
  @pulumi.getter
327
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
326
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
328
327
  """
329
328
  The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
330
329
  """
331
330
  return pulumi.get(self, "backend")
332
331
 
333
332
  @backend.setter
334
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
333
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
335
334
  pulumi.set(self, "backend", value)
336
335
 
337
- @property
336
+ @_builtins.property
338
337
  @pulumi.getter(name="consulNamespace")
339
- def consul_namespace(self) -> Optional[pulumi.Input[builtins.str]]:
338
+ def consul_namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
340
339
  """
341
340
  The Consul namespace that the token will be created in.
342
341
  Applicable for Vault 1.10+ and Consul 1.7+".
@@ -344,24 +343,24 @@ class _SecretBackendRoleState:
344
343
  return pulumi.get(self, "consul_namespace")
345
344
 
346
345
  @consul_namespace.setter
347
- def consul_namespace(self, value: Optional[pulumi.Input[builtins.str]]):
346
+ def consul_namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
348
347
  pulumi.set(self, "consul_namespace", value)
349
348
 
350
- @property
349
+ @_builtins.property
351
350
  @pulumi.getter(name="consulPolicies")
352
- def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
351
+ def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
353
352
  """
354
353
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
355
354
  """
356
355
  return pulumi.get(self, "consul_policies")
357
356
 
358
357
  @consul_policies.setter
359
- def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
358
+ def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
360
359
  pulumi.set(self, "consul_policies", value)
361
360
 
362
- @property
361
+ @_builtins.property
363
362
  @pulumi.getter(name="consulRoles")
364
- def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
363
+ def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
365
364
  """
366
365
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
367
366
  Applicable for Vault 1.10+ with Consul 1.5+.
@@ -369,48 +368,48 @@ class _SecretBackendRoleState:
369
368
  return pulumi.get(self, "consul_roles")
370
369
 
371
370
  @consul_roles.setter
372
- def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
371
+ def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
373
372
  pulumi.set(self, "consul_roles", value)
374
373
 
375
- @property
374
+ @_builtins.property
376
375
  @pulumi.getter
377
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
376
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
378
377
  """
379
378
  Indicates that the token should not be replicated globally and instead be local to the current datacenter.
380
379
  """
381
380
  return pulumi.get(self, "local")
382
381
 
383
382
  @local.setter
384
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
383
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
385
384
  pulumi.set(self, "local", value)
386
385
 
387
- @property
386
+ @_builtins.property
388
387
  @pulumi.getter(name="maxTtl")
389
- def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
388
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
390
389
  """
391
390
  Maximum TTL for leases associated with this role, in seconds.
392
391
  """
393
392
  return pulumi.get(self, "max_ttl")
394
393
 
395
394
  @max_ttl.setter
396
- def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
395
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
397
396
  pulumi.set(self, "max_ttl", value)
398
397
 
399
- @property
398
+ @_builtins.property
400
399
  @pulumi.getter
401
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
400
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
402
401
  """
403
402
  The name of the Consul secrets engine role to create.
404
403
  """
405
404
  return pulumi.get(self, "name")
406
405
 
407
406
  @name.setter
408
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
407
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
409
408
  pulumi.set(self, "name", value)
410
409
 
411
- @property
410
+ @_builtins.property
412
411
  @pulumi.getter
413
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
412
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
414
413
  """
415
414
  The namespace to provision the resource in.
416
415
  The value should not contain leading or trailing forward slashes.
@@ -420,12 +419,12 @@ class _SecretBackendRoleState:
420
419
  return pulumi.get(self, "namespace")
421
420
 
422
421
  @namespace.setter
423
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
422
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
424
423
  pulumi.set(self, "namespace", value)
425
424
 
426
- @property
425
+ @_builtins.property
427
426
  @pulumi.getter(name="nodeIdentities")
428
- def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
427
+ def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
429
428
  """
430
429
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
431
430
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -433,12 +432,12 @@ class _SecretBackendRoleState:
433
432
  return pulumi.get(self, "node_identities")
434
433
 
435
434
  @node_identities.setter
436
- def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
435
+ def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
437
436
  pulumi.set(self, "node_identities", value)
438
437
 
439
- @property
438
+ @_builtins.property
440
439
  @pulumi.getter
441
- def partition(self) -> Optional[pulumi.Input[builtins.str]]:
440
+ def partition(self) -> Optional[pulumi.Input[_builtins.str]]:
442
441
  """
443
442
  The admin partition that the token will be created in.
444
443
  Applicable for Vault 1.10+ and Consul 1.11+".
@@ -446,12 +445,12 @@ class _SecretBackendRoleState:
446
445
  return pulumi.get(self, "partition")
447
446
 
448
447
  @partition.setter
449
- def partition(self, value: Optional[pulumi.Input[builtins.str]]):
448
+ def partition(self, value: Optional[pulumi.Input[_builtins.str]]):
450
449
  pulumi.set(self, "partition", value)
451
450
 
452
- @property
451
+ @_builtins.property
453
452
  @pulumi.getter
454
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
453
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
455
454
  """
456
455
  The list of Consul ACL policies to associate with these roles.
457
456
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
@@ -460,12 +459,12 @@ class _SecretBackendRoleState:
460
459
  return pulumi.get(self, "policies")
461
460
 
462
461
  @policies.setter
463
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
462
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
464
463
  pulumi.set(self, "policies", value)
465
464
 
466
- @property
465
+ @_builtins.property
467
466
  @pulumi.getter(name="serviceIdentities")
468
- def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
467
+ def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
469
468
  """
470
469
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
471
470
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
@@ -473,19 +472,19 @@ class _SecretBackendRoleState:
473
472
  return pulumi.get(self, "service_identities")
474
473
 
475
474
  @service_identities.setter
476
- def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
475
+ def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
477
476
  pulumi.set(self, "service_identities", value)
478
477
 
479
- @property
478
+ @_builtins.property
480
479
  @pulumi.getter
481
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
480
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
482
481
  """
483
482
  Specifies the TTL for this role.
484
483
  """
485
484
  return pulumi.get(self, "ttl")
486
485
 
487
486
  @ttl.setter
488
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
487
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
489
488
  pulumi.set(self, "ttl", value)
490
489
 
491
490
 
@@ -495,19 +494,19 @@ class SecretBackendRole(pulumi.CustomResource):
495
494
  def __init__(__self__,
496
495
  resource_name: str,
497
496
  opts: Optional[pulumi.ResourceOptions] = None,
498
- backend: Optional[pulumi.Input[builtins.str]] = None,
499
- consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
500
- consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
501
- consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
502
- local: Optional[pulumi.Input[builtins.bool]] = None,
503
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
504
- name: Optional[pulumi.Input[builtins.str]] = None,
505
- namespace: Optional[pulumi.Input[builtins.str]] = None,
506
- node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
507
- partition: Optional[pulumi.Input[builtins.str]] = None,
508
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
509
- service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
510
- ttl: Optional[pulumi.Input[builtins.int]] = None,
497
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
498
+ consul_namespace: Optional[pulumi.Input[_builtins.str]] = None,
499
+ consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
500
+ consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
501
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
502
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
503
+ name: Optional[pulumi.Input[_builtins.str]] = None,
504
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
505
+ node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
506
+ partition: Optional[pulumi.Input[_builtins.str]] = None,
507
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
508
+ service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
509
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
511
510
  __props__=None):
512
511
  """
513
512
  Manages a Consul secrets role for a Consul secrets engine in Vault. Consul secret backends can then issue Consul tokens.
@@ -545,29 +544,29 @@ class SecretBackendRole(pulumi.CustomResource):
545
544
 
546
545
  :param str resource_name: The name of the resource.
547
546
  :param pulumi.ResourceOptions opts: Options for the resource.
548
- :param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
549
- :param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
547
+ :param pulumi.Input[_builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
548
+ :param pulumi.Input[_builtins.str] consul_namespace: The Consul namespace that the token will be created in.
550
549
  Applicable for Vault 1.10+ and Consul 1.7+".
551
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
552
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
550
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
551
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
553
552
  Applicable for Vault 1.10+ with Consul 1.5+.
554
- :param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
555
- :param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
556
- :param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
557
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
553
+ :param pulumi.Input[_builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
554
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
555
+ :param pulumi.Input[_builtins.str] name: The name of the Consul secrets engine role to create.
556
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
558
557
  The value should not contain leading or trailing forward slashes.
559
558
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
560
559
  *Available only for Vault Enterprise*.
561
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
560
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
562
561
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
563
- :param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
562
+ :param pulumi.Input[_builtins.str] partition: The admin partition that the token will be created in.
564
563
  Applicable for Vault 1.10+ and Consul 1.11+".
565
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
564
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
566
565
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
567
566
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
568
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
567
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
569
568
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
570
- :param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
569
+ :param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role.
571
570
  """
572
571
  ...
573
572
  @overload
@@ -624,19 +623,19 @@ class SecretBackendRole(pulumi.CustomResource):
624
623
  def _internal_init(__self__,
625
624
  resource_name: str,
626
625
  opts: Optional[pulumi.ResourceOptions] = None,
627
- backend: Optional[pulumi.Input[builtins.str]] = None,
628
- consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
629
- consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
630
- consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
631
- local: Optional[pulumi.Input[builtins.bool]] = None,
632
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
633
- name: Optional[pulumi.Input[builtins.str]] = None,
634
- namespace: Optional[pulumi.Input[builtins.str]] = None,
635
- node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
636
- partition: Optional[pulumi.Input[builtins.str]] = None,
637
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
638
- service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
639
- ttl: Optional[pulumi.Input[builtins.int]] = None,
626
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
627
+ consul_namespace: Optional[pulumi.Input[_builtins.str]] = None,
628
+ consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
629
+ consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
630
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
631
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
632
+ name: Optional[pulumi.Input[_builtins.str]] = None,
633
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
634
+ node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
635
+ partition: Optional[pulumi.Input[_builtins.str]] = None,
636
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
637
+ service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
638
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
640
639
  __props__=None):
641
640
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
642
641
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -669,19 +668,19 @@ class SecretBackendRole(pulumi.CustomResource):
669
668
  def get(resource_name: str,
670
669
  id: pulumi.Input[str],
671
670
  opts: Optional[pulumi.ResourceOptions] = None,
672
- backend: Optional[pulumi.Input[builtins.str]] = None,
673
- consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
674
- consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
675
- consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
676
- local: Optional[pulumi.Input[builtins.bool]] = None,
677
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
678
- name: Optional[pulumi.Input[builtins.str]] = None,
679
- namespace: Optional[pulumi.Input[builtins.str]] = None,
680
- node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
681
- partition: Optional[pulumi.Input[builtins.str]] = None,
682
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
683
- service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
684
- ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'SecretBackendRole':
671
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
672
+ consul_namespace: Optional[pulumi.Input[_builtins.str]] = None,
673
+ consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
674
+ consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
675
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
676
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
677
+ name: Optional[pulumi.Input[_builtins.str]] = None,
678
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
679
+ node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
680
+ partition: Optional[pulumi.Input[_builtins.str]] = None,
681
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
682
+ service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
683
+ ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretBackendRole':
685
684
  """
686
685
  Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
687
686
  properties used to qualify the lookup.
@@ -689,29 +688,29 @@ class SecretBackendRole(pulumi.CustomResource):
689
688
  :param str resource_name: The unique name of the resulting resource.
690
689
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
691
690
  :param pulumi.ResourceOptions opts: Options for the resource.
692
- :param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
693
- :param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
691
+ :param pulumi.Input[_builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
692
+ :param pulumi.Input[_builtins.str] consul_namespace: The Consul namespace that the token will be created in.
694
693
  Applicable for Vault 1.10+ and Consul 1.7+".
695
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
696
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
694
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
695
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
697
696
  Applicable for Vault 1.10+ with Consul 1.5+.
698
- :param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
699
- :param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
700
- :param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
701
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
697
+ :param pulumi.Input[_builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
698
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
699
+ :param pulumi.Input[_builtins.str] name: The name of the Consul secrets engine role to create.
700
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
702
701
  The value should not contain leading or trailing forward slashes.
703
702
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
704
703
  *Available only for Vault Enterprise*.
705
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
704
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
706
705
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
707
- :param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
706
+ :param pulumi.Input[_builtins.str] partition: The admin partition that the token will be created in.
708
707
  Applicable for Vault 1.10+ and Consul 1.11+".
709
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
708
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
710
709
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
711
710
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
712
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
711
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
713
712
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
714
- :param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
713
+ :param pulumi.Input[_builtins.int] ttl: Specifies the TTL for this role.
715
714
  """
716
715
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
717
716
 
@@ -732,67 +731,67 @@ class SecretBackendRole(pulumi.CustomResource):
732
731
  __props__.__dict__["ttl"] = ttl
733
732
  return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
734
733
 
735
- @property
734
+ @_builtins.property
736
735
  @pulumi.getter
737
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
736
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
738
737
  """
739
738
  The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
740
739
  """
741
740
  return pulumi.get(self, "backend")
742
741
 
743
- @property
742
+ @_builtins.property
744
743
  @pulumi.getter(name="consulNamespace")
745
- def consul_namespace(self) -> pulumi.Output[builtins.str]:
744
+ def consul_namespace(self) -> pulumi.Output[_builtins.str]:
746
745
  """
747
746
  The Consul namespace that the token will be created in.
748
747
  Applicable for Vault 1.10+ and Consul 1.7+".
749
748
  """
750
749
  return pulumi.get(self, "consul_namespace")
751
750
 
752
- @property
751
+ @_builtins.property
753
752
  @pulumi.getter(name="consulPolicies")
754
- def consul_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
753
+ def consul_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
755
754
  """
756
755
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
757
756
  """
758
757
  return pulumi.get(self, "consul_policies")
759
758
 
760
- @property
759
+ @_builtins.property
761
760
  @pulumi.getter(name="consulRoles")
762
- def consul_roles(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
761
+ def consul_roles(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
763
762
  """
764
763
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
765
764
  Applicable for Vault 1.10+ with Consul 1.5+.
766
765
  """
767
766
  return pulumi.get(self, "consul_roles")
768
767
 
769
- @property
768
+ @_builtins.property
770
769
  @pulumi.getter
771
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
770
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
772
771
  """
773
772
  Indicates that the token should not be replicated globally and instead be local to the current datacenter.
774
773
  """
775
774
  return pulumi.get(self, "local")
776
775
 
777
- @property
776
+ @_builtins.property
778
777
  @pulumi.getter(name="maxTtl")
779
- def max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
778
+ def max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
780
779
  """
781
780
  Maximum TTL for leases associated with this role, in seconds.
782
781
  """
783
782
  return pulumi.get(self, "max_ttl")
784
783
 
785
- @property
784
+ @_builtins.property
786
785
  @pulumi.getter
787
- def name(self) -> pulumi.Output[builtins.str]:
786
+ def name(self) -> pulumi.Output[_builtins.str]:
788
787
  """
789
788
  The name of the Consul secrets engine role to create.
790
789
  """
791
790
  return pulumi.get(self, "name")
792
791
 
793
- @property
792
+ @_builtins.property
794
793
  @pulumi.getter
795
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
794
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
796
795
  """
797
796
  The namespace to provision the resource in.
798
797
  The value should not contain leading or trailing forward slashes.
@@ -801,27 +800,27 @@ class SecretBackendRole(pulumi.CustomResource):
801
800
  """
802
801
  return pulumi.get(self, "namespace")
803
802
 
804
- @property
803
+ @_builtins.property
805
804
  @pulumi.getter(name="nodeIdentities")
806
- def node_identities(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
805
+ def node_identities(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
807
806
  """
808
807
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
809
808
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
810
809
  """
811
810
  return pulumi.get(self, "node_identities")
812
811
 
813
- @property
812
+ @_builtins.property
814
813
  @pulumi.getter
815
- def partition(self) -> pulumi.Output[builtins.str]:
814
+ def partition(self) -> pulumi.Output[_builtins.str]:
816
815
  """
817
816
  The admin partition that the token will be created in.
818
817
  Applicable for Vault 1.10+ and Consul 1.11+".
819
818
  """
820
819
  return pulumi.get(self, "partition")
821
820
 
822
- @property
821
+ @_builtins.property
823
822
  @pulumi.getter
824
- def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
823
+ def policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
825
824
  """
826
825
  The list of Consul ACL policies to associate with these roles.
827
826
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
@@ -829,18 +828,18 @@ class SecretBackendRole(pulumi.CustomResource):
829
828
  """
830
829
  return pulumi.get(self, "policies")
831
830
 
832
- @property
831
+ @_builtins.property
833
832
  @pulumi.getter(name="serviceIdentities")
834
- def service_identities(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
833
+ def service_identities(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
835
834
  """
836
835
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
837
836
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
838
837
  """
839
838
  return pulumi.get(self, "service_identities")
840
839
 
841
- @property
840
+ @_builtins.property
842
841
  @pulumi.getter
843
- def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
842
+ def ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
844
843
  """
845
844
  Specifies the TTL for this role.
846
845
  """