pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,59 +19,59 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
20
19
  @pulumi.input_type
21
20
  class SecretBackendRoleArgs:
22
21
  def __init__(__self__, *,
23
- backend: pulumi.Input[builtins.str],
24
- allowed_kubernetes_namespace_selector: Optional[pulumi.Input[builtins.str]] = None,
25
- allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
27
- extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
28
- generated_role_rules: Optional[pulumi.Input[builtins.str]] = None,
29
- kubernetes_role_name: Optional[pulumi.Input[builtins.str]] = None,
30
- kubernetes_role_type: Optional[pulumi.Input[builtins.str]] = None,
31
- name: Optional[pulumi.Input[builtins.str]] = None,
32
- name_template: Optional[pulumi.Input[builtins.str]] = None,
33
- namespace: Optional[pulumi.Input[builtins.str]] = None,
34
- service_account_name: Optional[pulumi.Input[builtins.str]] = None,
35
- token_default_ttl: Optional[pulumi.Input[builtins.int]] = None,
36
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None):
22
+ backend: pulumi.Input[_builtins.str],
23
+ allowed_kubernetes_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
24
+ allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
26
+ extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
27
+ generated_role_rules: Optional[pulumi.Input[_builtins.str]] = None,
28
+ kubernetes_role_name: Optional[pulumi.Input[_builtins.str]] = None,
29
+ kubernetes_role_type: Optional[pulumi.Input[_builtins.str]] = None,
30
+ name: Optional[pulumi.Input[_builtins.str]] = None,
31
+ name_template: Optional[pulumi.Input[_builtins.str]] = None,
32
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
33
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
34
+ token_default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
35
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None):
37
36
  """
38
37
  The set of arguments for constructing a SecretBackendRole resource.
39
- :param pulumi.Input[builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
38
+ :param pulumi.Input[_builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
40
39
  the role in.
41
- :param pulumi.Input[builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
40
+ :param pulumi.Input[_builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
42
41
  in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
43
42
  of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
44
43
  If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
45
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
44
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
46
45
  can generate credentials for. If set to `*` all namespaces are allowed. If set with
47
46
  `allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
48
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] extra_annotations: Additional annotations to apply to all generated
47
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_annotations: Additional annotations to apply to all generated
49
48
  Kubernetes objects.
50
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
49
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
51
50
  objects.
52
51
 
53
52
  This resource also directly accepts all Mount fields.
54
- :param pulumi.Input[builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
53
+ :param pulumi.Input[_builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
55
54
  a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
56
55
  and `kubernetes_role_name`. If set, the entire chain of Kubernetes objects will be generated
57
56
  when credentials are requested.
58
- :param pulumi.Input[builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
57
+ :param pulumi.Input[_builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
59
58
  generated service account to. Mutually exclusive with `service_account_name` and
60
59
  `generated_role_rules`. If set, Kubernetes token, service account, and role
61
60
  binding objects will be created when credentials are requested.
62
- :param pulumi.Input[builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
61
+ :param pulumi.Input[_builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
63
62
  ClusterRole.
64
- :param pulumi.Input[builtins.str] name: The name of the role.
65
- :param pulumi.Input[builtins.str] name_template: The name template to use when generating service accounts,
63
+ :param pulumi.Input[_builtins.str] name: The name of the role.
64
+ :param pulumi.Input[_builtins.str] name_template: The name template to use when generating service accounts,
66
65
  roles and role bindings. If unset, a default template is used.
67
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
66
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
68
67
  The value should not contain leading or trailing forward slashes.
69
68
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
70
69
  *Available only for Vault Enterprise*.
71
- :param pulumi.Input[builtins.str] service_account_name: The pre-existing service account to generate tokens for.
70
+ :param pulumi.Input[_builtins.str] service_account_name: The pre-existing service account to generate tokens for.
72
71
  Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
73
72
  Kubernetes token will be created when credentials are requested.
74
- :param pulumi.Input[builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
75
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
73
+ :param pulumi.Input[_builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
74
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
76
75
  """
77
76
  pulumi.set(__self__, "backend", backend)
78
77
  if allowed_kubernetes_namespace_selector is not None:
@@ -102,9 +101,9 @@ class SecretBackendRoleArgs:
102
101
  if token_max_ttl is not None:
103
102
  pulumi.set(__self__, "token_max_ttl", token_max_ttl)
104
103
 
105
- @property
104
+ @_builtins.property
106
105
  @pulumi.getter
107
- def backend(self) -> pulumi.Input[builtins.str]:
106
+ def backend(self) -> pulumi.Input[_builtins.str]:
108
107
  """
109
108
  The path of the Kubernetes Secrets Engine backend mount to create
110
109
  the role in.
@@ -112,12 +111,12 @@ class SecretBackendRoleArgs:
112
111
  return pulumi.get(self, "backend")
113
112
 
114
113
  @backend.setter
115
- def backend(self, value: pulumi.Input[builtins.str]):
114
+ def backend(self, value: pulumi.Input[_builtins.str]):
116
115
  pulumi.set(self, "backend", value)
117
116
 
118
- @property
117
+ @_builtins.property
119
118
  @pulumi.getter(name="allowedKubernetesNamespaceSelector")
120
- def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[builtins.str]]:
119
+ def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[_builtins.str]]:
121
120
  """
122
121
  A label selector for Kubernetes namespaces
123
122
  in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
@@ -127,12 +126,12 @@ class SecretBackendRoleArgs:
127
126
  return pulumi.get(self, "allowed_kubernetes_namespace_selector")
128
127
 
129
128
  @allowed_kubernetes_namespace_selector.setter
130
- def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[builtins.str]]):
129
+ def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[_builtins.str]]):
131
130
  pulumi.set(self, "allowed_kubernetes_namespace_selector", value)
132
131
 
133
- @property
132
+ @_builtins.property
134
133
  @pulumi.getter(name="allowedKubernetesNamespaces")
135
- def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
134
+ def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
136
135
  """
137
136
  The list of Kubernetes namespaces this role
138
137
  can generate credentials for. If set to `*` all namespaces are allowed. If set with
@@ -141,12 +140,12 @@ class SecretBackendRoleArgs:
141
140
  return pulumi.get(self, "allowed_kubernetes_namespaces")
142
141
 
143
142
  @allowed_kubernetes_namespaces.setter
144
- def allowed_kubernetes_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
143
+ def allowed_kubernetes_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
145
144
  pulumi.set(self, "allowed_kubernetes_namespaces", value)
146
145
 
147
- @property
146
+ @_builtins.property
148
147
  @pulumi.getter(name="extraAnnotations")
149
- def extra_annotations(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
148
+ def extra_annotations(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
150
149
  """
151
150
  Additional annotations to apply to all generated
152
151
  Kubernetes objects.
@@ -154,12 +153,12 @@ class SecretBackendRoleArgs:
154
153
  return pulumi.get(self, "extra_annotations")
155
154
 
156
155
  @extra_annotations.setter
157
- def extra_annotations(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
156
+ def extra_annotations(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
158
157
  pulumi.set(self, "extra_annotations", value)
159
158
 
160
- @property
159
+ @_builtins.property
161
160
  @pulumi.getter(name="extraLabels")
162
- def extra_labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
161
+ def extra_labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
163
162
  """
164
163
  Additional labels to apply to all generated Kubernetes
165
164
  objects.
@@ -169,12 +168,12 @@ class SecretBackendRoleArgs:
169
168
  return pulumi.get(self, "extra_labels")
170
169
 
171
170
  @extra_labels.setter
172
- def extra_labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
171
+ def extra_labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
173
172
  pulumi.set(self, "extra_labels", value)
174
173
 
175
- @property
174
+ @_builtins.property
176
175
  @pulumi.getter(name="generatedRoleRules")
177
- def generated_role_rules(self) -> Optional[pulumi.Input[builtins.str]]:
176
+ def generated_role_rules(self) -> Optional[pulumi.Input[_builtins.str]]:
178
177
  """
179
178
  The Role or ClusterRole rules to use when generating
180
179
  a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
@@ -184,12 +183,12 @@ class SecretBackendRoleArgs:
184
183
  return pulumi.get(self, "generated_role_rules")
185
184
 
186
185
  @generated_role_rules.setter
187
- def generated_role_rules(self, value: Optional[pulumi.Input[builtins.str]]):
186
+ def generated_role_rules(self, value: Optional[pulumi.Input[_builtins.str]]):
188
187
  pulumi.set(self, "generated_role_rules", value)
189
188
 
190
- @property
189
+ @_builtins.property
191
190
  @pulumi.getter(name="kubernetesRoleName")
192
- def kubernetes_role_name(self) -> Optional[pulumi.Input[builtins.str]]:
191
+ def kubernetes_role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
193
192
  """
194
193
  The pre-existing Role or ClusterRole to bind a
195
194
  generated service account to. Mutually exclusive with `service_account_name` and
@@ -199,12 +198,12 @@ class SecretBackendRoleArgs:
199
198
  return pulumi.get(self, "kubernetes_role_name")
200
199
 
201
200
  @kubernetes_role_name.setter
202
- def kubernetes_role_name(self, value: Optional[pulumi.Input[builtins.str]]):
201
+ def kubernetes_role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
203
202
  pulumi.set(self, "kubernetes_role_name", value)
204
203
 
205
- @property
204
+ @_builtins.property
206
205
  @pulumi.getter(name="kubernetesRoleType")
207
- def kubernetes_role_type(self) -> Optional[pulumi.Input[builtins.str]]:
206
+ def kubernetes_role_type(self) -> Optional[pulumi.Input[_builtins.str]]:
208
207
  """
209
208
  Specifies whether the Kubernetes role is a Role or
210
209
  ClusterRole.
@@ -212,24 +211,24 @@ class SecretBackendRoleArgs:
212
211
  return pulumi.get(self, "kubernetes_role_type")
213
212
 
214
213
  @kubernetes_role_type.setter
215
- def kubernetes_role_type(self, value: Optional[pulumi.Input[builtins.str]]):
214
+ def kubernetes_role_type(self, value: Optional[pulumi.Input[_builtins.str]]):
216
215
  pulumi.set(self, "kubernetes_role_type", value)
217
216
 
218
- @property
217
+ @_builtins.property
219
218
  @pulumi.getter
220
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
219
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
221
220
  """
222
221
  The name of the role.
223
222
  """
224
223
  return pulumi.get(self, "name")
225
224
 
226
225
  @name.setter
227
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
226
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
228
227
  pulumi.set(self, "name", value)
229
228
 
230
- @property
229
+ @_builtins.property
231
230
  @pulumi.getter(name="nameTemplate")
232
- def name_template(self) -> Optional[pulumi.Input[builtins.str]]:
231
+ def name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
233
232
  """
234
233
  The name template to use when generating service accounts,
235
234
  roles and role bindings. If unset, a default template is used.
@@ -237,12 +236,12 @@ class SecretBackendRoleArgs:
237
236
  return pulumi.get(self, "name_template")
238
237
 
239
238
  @name_template.setter
240
- def name_template(self, value: Optional[pulumi.Input[builtins.str]]):
239
+ def name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
241
240
  pulumi.set(self, "name_template", value)
242
241
 
243
- @property
242
+ @_builtins.property
244
243
  @pulumi.getter
245
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
244
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
246
245
  """
247
246
  The namespace to provision the resource in.
248
247
  The value should not contain leading or trailing forward slashes.
@@ -252,12 +251,12 @@ class SecretBackendRoleArgs:
252
251
  return pulumi.get(self, "namespace")
253
252
 
254
253
  @namespace.setter
255
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
254
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
256
255
  pulumi.set(self, "namespace", value)
257
256
 
258
- @property
257
+ @_builtins.property
259
258
  @pulumi.getter(name="serviceAccountName")
260
- def service_account_name(self) -> Optional[pulumi.Input[builtins.str]]:
259
+ def service_account_name(self) -> Optional[pulumi.Input[_builtins.str]]:
261
260
  """
262
261
  The pre-existing service account to generate tokens for.
263
262
  Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
@@ -266,90 +265,90 @@ class SecretBackendRoleArgs:
266
265
  return pulumi.get(self, "service_account_name")
267
266
 
268
267
  @service_account_name.setter
269
- def service_account_name(self, value: Optional[pulumi.Input[builtins.str]]):
268
+ def service_account_name(self, value: Optional[pulumi.Input[_builtins.str]]):
270
269
  pulumi.set(self, "service_account_name", value)
271
270
 
272
- @property
271
+ @_builtins.property
273
272
  @pulumi.getter(name="tokenDefaultTtl")
274
- def token_default_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
273
+ def token_default_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
275
274
  """
276
275
  The default TTL for generated Kubernetes tokens in seconds.
277
276
  """
278
277
  return pulumi.get(self, "token_default_ttl")
279
278
 
280
279
  @token_default_ttl.setter
281
- def token_default_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
280
+ def token_default_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
282
281
  pulumi.set(self, "token_default_ttl", value)
283
282
 
284
- @property
283
+ @_builtins.property
285
284
  @pulumi.getter(name="tokenMaxTtl")
286
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
285
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
287
286
  """
288
287
  The maximum TTL for generated Kubernetes tokens in seconds.
289
288
  """
290
289
  return pulumi.get(self, "token_max_ttl")
291
290
 
292
291
  @token_max_ttl.setter
293
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
292
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
294
293
  pulumi.set(self, "token_max_ttl", value)
295
294
 
296
295
 
297
296
  @pulumi.input_type
298
297
  class _SecretBackendRoleState:
299
298
  def __init__(__self__, *,
300
- allowed_kubernetes_namespace_selector: Optional[pulumi.Input[builtins.str]] = None,
301
- allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
302
- backend: Optional[pulumi.Input[builtins.str]] = None,
303
- extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
304
- extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
305
- generated_role_rules: Optional[pulumi.Input[builtins.str]] = None,
306
- kubernetes_role_name: Optional[pulumi.Input[builtins.str]] = None,
307
- kubernetes_role_type: Optional[pulumi.Input[builtins.str]] = None,
308
- name: Optional[pulumi.Input[builtins.str]] = None,
309
- name_template: Optional[pulumi.Input[builtins.str]] = None,
310
- namespace: Optional[pulumi.Input[builtins.str]] = None,
311
- service_account_name: Optional[pulumi.Input[builtins.str]] = None,
312
- token_default_ttl: Optional[pulumi.Input[builtins.int]] = None,
313
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None):
299
+ allowed_kubernetes_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
300
+ allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
301
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
302
+ extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
303
+ extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
304
+ generated_role_rules: Optional[pulumi.Input[_builtins.str]] = None,
305
+ kubernetes_role_name: Optional[pulumi.Input[_builtins.str]] = None,
306
+ kubernetes_role_type: Optional[pulumi.Input[_builtins.str]] = None,
307
+ name: Optional[pulumi.Input[_builtins.str]] = None,
308
+ name_template: Optional[pulumi.Input[_builtins.str]] = None,
309
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
310
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
311
+ token_default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
312
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None):
314
313
  """
315
314
  Input properties used for looking up and filtering SecretBackendRole resources.
316
- :param pulumi.Input[builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
315
+ :param pulumi.Input[_builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
317
316
  in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
318
317
  of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
319
318
  If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
320
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
319
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
321
320
  can generate credentials for. If set to `*` all namespaces are allowed. If set with
322
321
  `allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
323
- :param pulumi.Input[builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
322
+ :param pulumi.Input[_builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
324
323
  the role in.
325
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] extra_annotations: Additional annotations to apply to all generated
324
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_annotations: Additional annotations to apply to all generated
326
325
  Kubernetes objects.
327
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
326
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
328
327
  objects.
329
328
 
330
329
  This resource also directly accepts all Mount fields.
331
- :param pulumi.Input[builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
330
+ :param pulumi.Input[_builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
332
331
  a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
333
332
  and `kubernetes_role_name`. If set, the entire chain of Kubernetes objects will be generated
334
333
  when credentials are requested.
335
- :param pulumi.Input[builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
334
+ :param pulumi.Input[_builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
336
335
  generated service account to. Mutually exclusive with `service_account_name` and
337
336
  `generated_role_rules`. If set, Kubernetes token, service account, and role
338
337
  binding objects will be created when credentials are requested.
339
- :param pulumi.Input[builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
338
+ :param pulumi.Input[_builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
340
339
  ClusterRole.
341
- :param pulumi.Input[builtins.str] name: The name of the role.
342
- :param pulumi.Input[builtins.str] name_template: The name template to use when generating service accounts,
340
+ :param pulumi.Input[_builtins.str] name: The name of the role.
341
+ :param pulumi.Input[_builtins.str] name_template: The name template to use when generating service accounts,
343
342
  roles and role bindings. If unset, a default template is used.
344
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
343
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
345
344
  The value should not contain leading or trailing forward slashes.
346
345
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
347
346
  *Available only for Vault Enterprise*.
348
- :param pulumi.Input[builtins.str] service_account_name: The pre-existing service account to generate tokens for.
347
+ :param pulumi.Input[_builtins.str] service_account_name: The pre-existing service account to generate tokens for.
349
348
  Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
350
349
  Kubernetes token will be created when credentials are requested.
351
- :param pulumi.Input[builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
352
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
350
+ :param pulumi.Input[_builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
351
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
353
352
  """
354
353
  if allowed_kubernetes_namespace_selector is not None:
355
354
  pulumi.set(__self__, "allowed_kubernetes_namespace_selector", allowed_kubernetes_namespace_selector)
@@ -380,9 +379,9 @@ class _SecretBackendRoleState:
380
379
  if token_max_ttl is not None:
381
380
  pulumi.set(__self__, "token_max_ttl", token_max_ttl)
382
381
 
383
- @property
382
+ @_builtins.property
384
383
  @pulumi.getter(name="allowedKubernetesNamespaceSelector")
385
- def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[builtins.str]]:
384
+ def allowed_kubernetes_namespace_selector(self) -> Optional[pulumi.Input[_builtins.str]]:
386
385
  """
387
386
  A label selector for Kubernetes namespaces
388
387
  in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
@@ -392,12 +391,12 @@ class _SecretBackendRoleState:
392
391
  return pulumi.get(self, "allowed_kubernetes_namespace_selector")
393
392
 
394
393
  @allowed_kubernetes_namespace_selector.setter
395
- def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[builtins.str]]):
394
+ def allowed_kubernetes_namespace_selector(self, value: Optional[pulumi.Input[_builtins.str]]):
396
395
  pulumi.set(self, "allowed_kubernetes_namespace_selector", value)
397
396
 
398
- @property
397
+ @_builtins.property
399
398
  @pulumi.getter(name="allowedKubernetesNamespaces")
400
- def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
399
+ def allowed_kubernetes_namespaces(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
401
400
  """
402
401
  The list of Kubernetes namespaces this role
403
402
  can generate credentials for. If set to `*` all namespaces are allowed. If set with
@@ -406,12 +405,12 @@ class _SecretBackendRoleState:
406
405
  return pulumi.get(self, "allowed_kubernetes_namespaces")
407
406
 
408
407
  @allowed_kubernetes_namespaces.setter
409
- def allowed_kubernetes_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
408
+ def allowed_kubernetes_namespaces(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
410
409
  pulumi.set(self, "allowed_kubernetes_namespaces", value)
411
410
 
412
- @property
411
+ @_builtins.property
413
412
  @pulumi.getter
414
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
413
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
415
414
  """
416
415
  The path of the Kubernetes Secrets Engine backend mount to create
417
416
  the role in.
@@ -419,12 +418,12 @@ class _SecretBackendRoleState:
419
418
  return pulumi.get(self, "backend")
420
419
 
421
420
  @backend.setter
422
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
421
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
423
422
  pulumi.set(self, "backend", value)
424
423
 
425
- @property
424
+ @_builtins.property
426
425
  @pulumi.getter(name="extraAnnotations")
427
- def extra_annotations(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
426
+ def extra_annotations(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
428
427
  """
429
428
  Additional annotations to apply to all generated
430
429
  Kubernetes objects.
@@ -432,12 +431,12 @@ class _SecretBackendRoleState:
432
431
  return pulumi.get(self, "extra_annotations")
433
432
 
434
433
  @extra_annotations.setter
435
- def extra_annotations(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
434
+ def extra_annotations(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
436
435
  pulumi.set(self, "extra_annotations", value)
437
436
 
438
- @property
437
+ @_builtins.property
439
438
  @pulumi.getter(name="extraLabels")
440
- def extra_labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
439
+ def extra_labels(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
441
440
  """
442
441
  Additional labels to apply to all generated Kubernetes
443
442
  objects.
@@ -447,12 +446,12 @@ class _SecretBackendRoleState:
447
446
  return pulumi.get(self, "extra_labels")
448
447
 
449
448
  @extra_labels.setter
450
- def extra_labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
449
+ def extra_labels(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
451
450
  pulumi.set(self, "extra_labels", value)
452
451
 
453
- @property
452
+ @_builtins.property
454
453
  @pulumi.getter(name="generatedRoleRules")
455
- def generated_role_rules(self) -> Optional[pulumi.Input[builtins.str]]:
454
+ def generated_role_rules(self) -> Optional[pulumi.Input[_builtins.str]]:
456
455
  """
457
456
  The Role or ClusterRole rules to use when generating
458
457
  a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
@@ -462,12 +461,12 @@ class _SecretBackendRoleState:
462
461
  return pulumi.get(self, "generated_role_rules")
463
462
 
464
463
  @generated_role_rules.setter
465
- def generated_role_rules(self, value: Optional[pulumi.Input[builtins.str]]):
464
+ def generated_role_rules(self, value: Optional[pulumi.Input[_builtins.str]]):
466
465
  pulumi.set(self, "generated_role_rules", value)
467
466
 
468
- @property
467
+ @_builtins.property
469
468
  @pulumi.getter(name="kubernetesRoleName")
470
- def kubernetes_role_name(self) -> Optional[pulumi.Input[builtins.str]]:
469
+ def kubernetes_role_name(self) -> Optional[pulumi.Input[_builtins.str]]:
471
470
  """
472
471
  The pre-existing Role or ClusterRole to bind a
473
472
  generated service account to. Mutually exclusive with `service_account_name` and
@@ -477,12 +476,12 @@ class _SecretBackendRoleState:
477
476
  return pulumi.get(self, "kubernetes_role_name")
478
477
 
479
478
  @kubernetes_role_name.setter
480
- def kubernetes_role_name(self, value: Optional[pulumi.Input[builtins.str]]):
479
+ def kubernetes_role_name(self, value: Optional[pulumi.Input[_builtins.str]]):
481
480
  pulumi.set(self, "kubernetes_role_name", value)
482
481
 
483
- @property
482
+ @_builtins.property
484
483
  @pulumi.getter(name="kubernetesRoleType")
485
- def kubernetes_role_type(self) -> Optional[pulumi.Input[builtins.str]]:
484
+ def kubernetes_role_type(self) -> Optional[pulumi.Input[_builtins.str]]:
486
485
  """
487
486
  Specifies whether the Kubernetes role is a Role or
488
487
  ClusterRole.
@@ -490,24 +489,24 @@ class _SecretBackendRoleState:
490
489
  return pulumi.get(self, "kubernetes_role_type")
491
490
 
492
491
  @kubernetes_role_type.setter
493
- def kubernetes_role_type(self, value: Optional[pulumi.Input[builtins.str]]):
492
+ def kubernetes_role_type(self, value: Optional[pulumi.Input[_builtins.str]]):
494
493
  pulumi.set(self, "kubernetes_role_type", value)
495
494
 
496
- @property
495
+ @_builtins.property
497
496
  @pulumi.getter
498
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
497
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
499
498
  """
500
499
  The name of the role.
501
500
  """
502
501
  return pulumi.get(self, "name")
503
502
 
504
503
  @name.setter
505
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
504
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
506
505
  pulumi.set(self, "name", value)
507
506
 
508
- @property
507
+ @_builtins.property
509
508
  @pulumi.getter(name="nameTemplate")
510
- def name_template(self) -> Optional[pulumi.Input[builtins.str]]:
509
+ def name_template(self) -> Optional[pulumi.Input[_builtins.str]]:
511
510
  """
512
511
  The name template to use when generating service accounts,
513
512
  roles and role bindings. If unset, a default template is used.
@@ -515,12 +514,12 @@ class _SecretBackendRoleState:
515
514
  return pulumi.get(self, "name_template")
516
515
 
517
516
  @name_template.setter
518
- def name_template(self, value: Optional[pulumi.Input[builtins.str]]):
517
+ def name_template(self, value: Optional[pulumi.Input[_builtins.str]]):
519
518
  pulumi.set(self, "name_template", value)
520
519
 
521
- @property
520
+ @_builtins.property
522
521
  @pulumi.getter
523
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
522
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
524
523
  """
525
524
  The namespace to provision the resource in.
526
525
  The value should not contain leading or trailing forward slashes.
@@ -530,12 +529,12 @@ class _SecretBackendRoleState:
530
529
  return pulumi.get(self, "namespace")
531
530
 
532
531
  @namespace.setter
533
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
532
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
534
533
  pulumi.set(self, "namespace", value)
535
534
 
536
- @property
535
+ @_builtins.property
537
536
  @pulumi.getter(name="serviceAccountName")
538
- def service_account_name(self) -> Optional[pulumi.Input[builtins.str]]:
537
+ def service_account_name(self) -> Optional[pulumi.Input[_builtins.str]]:
539
538
  """
540
539
  The pre-existing service account to generate tokens for.
541
540
  Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
@@ -544,31 +543,31 @@ class _SecretBackendRoleState:
544
543
  return pulumi.get(self, "service_account_name")
545
544
 
546
545
  @service_account_name.setter
547
- def service_account_name(self, value: Optional[pulumi.Input[builtins.str]]):
546
+ def service_account_name(self, value: Optional[pulumi.Input[_builtins.str]]):
548
547
  pulumi.set(self, "service_account_name", value)
549
548
 
550
- @property
549
+ @_builtins.property
551
550
  @pulumi.getter(name="tokenDefaultTtl")
552
- def token_default_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
551
+ def token_default_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
553
552
  """
554
553
  The default TTL for generated Kubernetes tokens in seconds.
555
554
  """
556
555
  return pulumi.get(self, "token_default_ttl")
557
556
 
558
557
  @token_default_ttl.setter
559
- def token_default_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
558
+ def token_default_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
560
559
  pulumi.set(self, "token_default_ttl", value)
561
560
 
562
- @property
561
+ @_builtins.property
563
562
  @pulumi.getter(name="tokenMaxTtl")
564
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
563
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
565
564
  """
566
565
  The maximum TTL for generated Kubernetes tokens in seconds.
567
566
  """
568
567
  return pulumi.get(self, "token_max_ttl")
569
568
 
570
569
  @token_max_ttl.setter
571
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
570
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
572
571
  pulumi.set(self, "token_max_ttl", value)
573
572
 
574
573
 
@@ -578,20 +577,20 @@ class SecretBackendRole(pulumi.CustomResource):
578
577
  def __init__(__self__,
579
578
  resource_name: str,
580
579
  opts: Optional[pulumi.ResourceOptions] = None,
581
- allowed_kubernetes_namespace_selector: Optional[pulumi.Input[builtins.str]] = None,
582
- allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
583
- backend: Optional[pulumi.Input[builtins.str]] = None,
584
- extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
585
- extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
586
- generated_role_rules: Optional[pulumi.Input[builtins.str]] = None,
587
- kubernetes_role_name: Optional[pulumi.Input[builtins.str]] = None,
588
- kubernetes_role_type: Optional[pulumi.Input[builtins.str]] = None,
589
- name: Optional[pulumi.Input[builtins.str]] = None,
590
- name_template: Optional[pulumi.Input[builtins.str]] = None,
591
- namespace: Optional[pulumi.Input[builtins.str]] = None,
592
- service_account_name: Optional[pulumi.Input[builtins.str]] = None,
593
- token_default_ttl: Optional[pulumi.Input[builtins.int]] = None,
594
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
580
+ allowed_kubernetes_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
581
+ allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
582
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
583
+ extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
584
+ extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
585
+ generated_role_rules: Optional[pulumi.Input[_builtins.str]] = None,
586
+ kubernetes_role_name: Optional[pulumi.Input[_builtins.str]] = None,
587
+ kubernetes_role_type: Optional[pulumi.Input[_builtins.str]] = None,
588
+ name: Optional[pulumi.Input[_builtins.str]] = None,
589
+ name_template: Optional[pulumi.Input[_builtins.str]] = None,
590
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
591
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
592
+ token_default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
593
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
595
594
  __props__=None):
596
595
  """
597
596
  ## Example Usage
@@ -706,43 +705,43 @@ class SecretBackendRole(pulumi.CustomResource):
706
705
 
707
706
  :param str resource_name: The name of the resource.
708
707
  :param pulumi.ResourceOptions opts: Options for the resource.
709
- :param pulumi.Input[builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
708
+ :param pulumi.Input[_builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
710
709
  in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
711
710
  of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
712
711
  If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
713
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
712
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
714
713
  can generate credentials for. If set to `*` all namespaces are allowed. If set with
715
714
  `allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
716
- :param pulumi.Input[builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
715
+ :param pulumi.Input[_builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
717
716
  the role in.
718
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] extra_annotations: Additional annotations to apply to all generated
717
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_annotations: Additional annotations to apply to all generated
719
718
  Kubernetes objects.
720
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
719
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
721
720
  objects.
722
721
 
723
722
  This resource also directly accepts all Mount fields.
724
- :param pulumi.Input[builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
723
+ :param pulumi.Input[_builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
725
724
  a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
726
725
  and `kubernetes_role_name`. If set, the entire chain of Kubernetes objects will be generated
727
726
  when credentials are requested.
728
- :param pulumi.Input[builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
727
+ :param pulumi.Input[_builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
729
728
  generated service account to. Mutually exclusive with `service_account_name` and
730
729
  `generated_role_rules`. If set, Kubernetes token, service account, and role
731
730
  binding objects will be created when credentials are requested.
732
- :param pulumi.Input[builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
731
+ :param pulumi.Input[_builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
733
732
  ClusterRole.
734
- :param pulumi.Input[builtins.str] name: The name of the role.
735
- :param pulumi.Input[builtins.str] name_template: The name template to use when generating service accounts,
733
+ :param pulumi.Input[_builtins.str] name: The name of the role.
734
+ :param pulumi.Input[_builtins.str] name_template: The name template to use when generating service accounts,
736
735
  roles and role bindings. If unset, a default template is used.
737
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
736
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
738
737
  The value should not contain leading or trailing forward slashes.
739
738
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
740
739
  *Available only for Vault Enterprise*.
741
- :param pulumi.Input[builtins.str] service_account_name: The pre-existing service account to generate tokens for.
740
+ :param pulumi.Input[_builtins.str] service_account_name: The pre-existing service account to generate tokens for.
742
741
  Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
743
742
  Kubernetes token will be created when credentials are requested.
744
- :param pulumi.Input[builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
745
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
743
+ :param pulumi.Input[_builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
744
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
746
745
  """
747
746
  ...
748
747
  @overload
@@ -876,20 +875,20 @@ class SecretBackendRole(pulumi.CustomResource):
876
875
  def _internal_init(__self__,
877
876
  resource_name: str,
878
877
  opts: Optional[pulumi.ResourceOptions] = None,
879
- allowed_kubernetes_namespace_selector: Optional[pulumi.Input[builtins.str]] = None,
880
- allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
881
- backend: Optional[pulumi.Input[builtins.str]] = None,
882
- extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
883
- extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
884
- generated_role_rules: Optional[pulumi.Input[builtins.str]] = None,
885
- kubernetes_role_name: Optional[pulumi.Input[builtins.str]] = None,
886
- kubernetes_role_type: Optional[pulumi.Input[builtins.str]] = None,
887
- name: Optional[pulumi.Input[builtins.str]] = None,
888
- name_template: Optional[pulumi.Input[builtins.str]] = None,
889
- namespace: Optional[pulumi.Input[builtins.str]] = None,
890
- service_account_name: Optional[pulumi.Input[builtins.str]] = None,
891
- token_default_ttl: Optional[pulumi.Input[builtins.int]] = None,
892
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
878
+ allowed_kubernetes_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
879
+ allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
880
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
881
+ extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
882
+ extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
883
+ generated_role_rules: Optional[pulumi.Input[_builtins.str]] = None,
884
+ kubernetes_role_name: Optional[pulumi.Input[_builtins.str]] = None,
885
+ kubernetes_role_type: Optional[pulumi.Input[_builtins.str]] = None,
886
+ name: Optional[pulumi.Input[_builtins.str]] = None,
887
+ name_template: Optional[pulumi.Input[_builtins.str]] = None,
888
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
889
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
890
+ token_default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
891
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
893
892
  __props__=None):
894
893
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
895
894
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -925,20 +924,20 @@ class SecretBackendRole(pulumi.CustomResource):
925
924
  def get(resource_name: str,
926
925
  id: pulumi.Input[str],
927
926
  opts: Optional[pulumi.ResourceOptions] = None,
928
- allowed_kubernetes_namespace_selector: Optional[pulumi.Input[builtins.str]] = None,
929
- allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
930
- backend: Optional[pulumi.Input[builtins.str]] = None,
931
- extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
932
- extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
933
- generated_role_rules: Optional[pulumi.Input[builtins.str]] = None,
934
- kubernetes_role_name: Optional[pulumi.Input[builtins.str]] = None,
935
- kubernetes_role_type: Optional[pulumi.Input[builtins.str]] = None,
936
- name: Optional[pulumi.Input[builtins.str]] = None,
937
- name_template: Optional[pulumi.Input[builtins.str]] = None,
938
- namespace: Optional[pulumi.Input[builtins.str]] = None,
939
- service_account_name: Optional[pulumi.Input[builtins.str]] = None,
940
- token_default_ttl: Optional[pulumi.Input[builtins.int]] = None,
941
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'SecretBackendRole':
927
+ allowed_kubernetes_namespace_selector: Optional[pulumi.Input[_builtins.str]] = None,
928
+ allowed_kubernetes_namespaces: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
929
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
930
+ extra_annotations: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
931
+ extra_labels: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
932
+ generated_role_rules: Optional[pulumi.Input[_builtins.str]] = None,
933
+ kubernetes_role_name: Optional[pulumi.Input[_builtins.str]] = None,
934
+ kubernetes_role_type: Optional[pulumi.Input[_builtins.str]] = None,
935
+ name: Optional[pulumi.Input[_builtins.str]] = None,
936
+ name_template: Optional[pulumi.Input[_builtins.str]] = None,
937
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
938
+ service_account_name: Optional[pulumi.Input[_builtins.str]] = None,
939
+ token_default_ttl: Optional[pulumi.Input[_builtins.int]] = None,
940
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'SecretBackendRole':
942
941
  """
943
942
  Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
944
943
  properties used to qualify the lookup.
@@ -946,43 +945,43 @@ class SecretBackendRole(pulumi.CustomResource):
946
945
  :param str resource_name: The unique name of the resulting resource.
947
946
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
948
947
  :param pulumi.ResourceOptions opts: Options for the resource.
949
- :param pulumi.Input[builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
948
+ :param pulumi.Input[_builtins.str] allowed_kubernetes_namespace_selector: A label selector for Kubernetes namespaces
950
949
  in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
951
950
  of type [LabelSelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#labelselector-v1-meta).
952
951
  If set with `allowed_kubernetes_namespace`, the conditions are `OR`ed.
953
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
952
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_kubernetes_namespaces: The list of Kubernetes namespaces this role
954
953
  can generate credentials for. If set to `*` all namespaces are allowed. If set with
955
954
  `allowed_kubernetes_namespace_selector`, the conditions are `OR`ed.
956
- :param pulumi.Input[builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
955
+ :param pulumi.Input[_builtins.str] backend: The path of the Kubernetes Secrets Engine backend mount to create
957
956
  the role in.
958
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] extra_annotations: Additional annotations to apply to all generated
957
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_annotations: Additional annotations to apply to all generated
959
958
  Kubernetes objects.
960
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
959
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] extra_labels: Additional labels to apply to all generated Kubernetes
961
960
  objects.
962
961
 
963
962
  This resource also directly accepts all Mount fields.
964
- :param pulumi.Input[builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
963
+ :param pulumi.Input[_builtins.str] generated_role_rules: The Role or ClusterRole rules to use when generating
965
964
  a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
966
965
  and `kubernetes_role_name`. If set, the entire chain of Kubernetes objects will be generated
967
966
  when credentials are requested.
968
- :param pulumi.Input[builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
967
+ :param pulumi.Input[_builtins.str] kubernetes_role_name: The pre-existing Role or ClusterRole to bind a
969
968
  generated service account to. Mutually exclusive with `service_account_name` and
970
969
  `generated_role_rules`. If set, Kubernetes token, service account, and role
971
970
  binding objects will be created when credentials are requested.
972
- :param pulumi.Input[builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
971
+ :param pulumi.Input[_builtins.str] kubernetes_role_type: Specifies whether the Kubernetes role is a Role or
973
972
  ClusterRole.
974
- :param pulumi.Input[builtins.str] name: The name of the role.
975
- :param pulumi.Input[builtins.str] name_template: The name template to use when generating service accounts,
973
+ :param pulumi.Input[_builtins.str] name: The name of the role.
974
+ :param pulumi.Input[_builtins.str] name_template: The name template to use when generating service accounts,
976
975
  roles and role bindings. If unset, a default template is used.
977
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
976
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
978
977
  The value should not contain leading or trailing forward slashes.
979
978
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
980
979
  *Available only for Vault Enterprise*.
981
- :param pulumi.Input[builtins.str] service_account_name: The pre-existing service account to generate tokens for.
980
+ :param pulumi.Input[_builtins.str] service_account_name: The pre-existing service account to generate tokens for.
982
981
  Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
983
982
  Kubernetes token will be created when credentials are requested.
984
- :param pulumi.Input[builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
985
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
983
+ :param pulumi.Input[_builtins.int] token_default_ttl: The default TTL for generated Kubernetes tokens in seconds.
984
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum TTL for generated Kubernetes tokens in seconds.
986
985
  """
987
986
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
988
987
 
@@ -1004,9 +1003,9 @@ class SecretBackendRole(pulumi.CustomResource):
1004
1003
  __props__.__dict__["token_max_ttl"] = token_max_ttl
1005
1004
  return SecretBackendRole(resource_name, opts=opts, __props__=__props__)
1006
1005
 
1007
- @property
1006
+ @_builtins.property
1008
1007
  @pulumi.getter(name="allowedKubernetesNamespaceSelector")
1009
- def allowed_kubernetes_namespace_selector(self) -> pulumi.Output[Optional[builtins.str]]:
1008
+ def allowed_kubernetes_namespace_selector(self) -> pulumi.Output[Optional[_builtins.str]]:
1010
1009
  """
1011
1010
  A label selector for Kubernetes namespaces
1012
1011
  in which credentials can be generated. Accepts either a JSON or YAML object. The value should be
@@ -1015,9 +1014,9 @@ class SecretBackendRole(pulumi.CustomResource):
1015
1014
  """
1016
1015
  return pulumi.get(self, "allowed_kubernetes_namespace_selector")
1017
1016
 
1018
- @property
1017
+ @_builtins.property
1019
1018
  @pulumi.getter(name="allowedKubernetesNamespaces")
1020
- def allowed_kubernetes_namespaces(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1019
+ def allowed_kubernetes_namespaces(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1021
1020
  """
1022
1021
  The list of Kubernetes namespaces this role
1023
1022
  can generate credentials for. If set to `*` all namespaces are allowed. If set with
@@ -1025,27 +1024,27 @@ class SecretBackendRole(pulumi.CustomResource):
1025
1024
  """
1026
1025
  return pulumi.get(self, "allowed_kubernetes_namespaces")
1027
1026
 
1028
- @property
1027
+ @_builtins.property
1029
1028
  @pulumi.getter
1030
- def backend(self) -> pulumi.Output[builtins.str]:
1029
+ def backend(self) -> pulumi.Output[_builtins.str]:
1031
1030
  """
1032
1031
  The path of the Kubernetes Secrets Engine backend mount to create
1033
1032
  the role in.
1034
1033
  """
1035
1034
  return pulumi.get(self, "backend")
1036
1035
 
1037
- @property
1036
+ @_builtins.property
1038
1037
  @pulumi.getter(name="extraAnnotations")
1039
- def extra_annotations(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1038
+ def extra_annotations(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1040
1039
  """
1041
1040
  Additional annotations to apply to all generated
1042
1041
  Kubernetes objects.
1043
1042
  """
1044
1043
  return pulumi.get(self, "extra_annotations")
1045
1044
 
1046
- @property
1045
+ @_builtins.property
1047
1046
  @pulumi.getter(name="extraLabels")
1048
- def extra_labels(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
1047
+ def extra_labels(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
1049
1048
  """
1050
1049
  Additional labels to apply to all generated Kubernetes
1051
1050
  objects.
@@ -1054,9 +1053,9 @@ class SecretBackendRole(pulumi.CustomResource):
1054
1053
  """
1055
1054
  return pulumi.get(self, "extra_labels")
1056
1055
 
1057
- @property
1056
+ @_builtins.property
1058
1057
  @pulumi.getter(name="generatedRoleRules")
1059
- def generated_role_rules(self) -> pulumi.Output[Optional[builtins.str]]:
1058
+ def generated_role_rules(self) -> pulumi.Output[Optional[_builtins.str]]:
1060
1059
  """
1061
1060
  The Role or ClusterRole rules to use when generating
1062
1061
  a role. Accepts either JSON or YAML formatted rules. Mutually exclusive with `service_account_name`
@@ -1065,9 +1064,9 @@ class SecretBackendRole(pulumi.CustomResource):
1065
1064
  """
1066
1065
  return pulumi.get(self, "generated_role_rules")
1067
1066
 
1068
- @property
1067
+ @_builtins.property
1069
1068
  @pulumi.getter(name="kubernetesRoleName")
1070
- def kubernetes_role_name(self) -> pulumi.Output[Optional[builtins.str]]:
1069
+ def kubernetes_role_name(self) -> pulumi.Output[Optional[_builtins.str]]:
1071
1070
  """
1072
1071
  The pre-existing Role or ClusterRole to bind a
1073
1072
  generated service account to. Mutually exclusive with `service_account_name` and
@@ -1076,35 +1075,35 @@ class SecretBackendRole(pulumi.CustomResource):
1076
1075
  """
1077
1076
  return pulumi.get(self, "kubernetes_role_name")
1078
1077
 
1079
- @property
1078
+ @_builtins.property
1080
1079
  @pulumi.getter(name="kubernetesRoleType")
1081
- def kubernetes_role_type(self) -> pulumi.Output[Optional[builtins.str]]:
1080
+ def kubernetes_role_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1082
1081
  """
1083
1082
  Specifies whether the Kubernetes role is a Role or
1084
1083
  ClusterRole.
1085
1084
  """
1086
1085
  return pulumi.get(self, "kubernetes_role_type")
1087
1086
 
1088
- @property
1087
+ @_builtins.property
1089
1088
  @pulumi.getter
1090
- def name(self) -> pulumi.Output[builtins.str]:
1089
+ def name(self) -> pulumi.Output[_builtins.str]:
1091
1090
  """
1092
1091
  The name of the role.
1093
1092
  """
1094
1093
  return pulumi.get(self, "name")
1095
1094
 
1096
- @property
1095
+ @_builtins.property
1097
1096
  @pulumi.getter(name="nameTemplate")
1098
- def name_template(self) -> pulumi.Output[Optional[builtins.str]]:
1097
+ def name_template(self) -> pulumi.Output[Optional[_builtins.str]]:
1099
1098
  """
1100
1099
  The name template to use when generating service accounts,
1101
1100
  roles and role bindings. If unset, a default template is used.
1102
1101
  """
1103
1102
  return pulumi.get(self, "name_template")
1104
1103
 
1105
- @property
1104
+ @_builtins.property
1106
1105
  @pulumi.getter
1107
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1106
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1108
1107
  """
1109
1108
  The namespace to provision the resource in.
1110
1109
  The value should not contain leading or trailing forward slashes.
@@ -1113,9 +1112,9 @@ class SecretBackendRole(pulumi.CustomResource):
1113
1112
  """
1114
1113
  return pulumi.get(self, "namespace")
1115
1114
 
1116
- @property
1115
+ @_builtins.property
1117
1116
  @pulumi.getter(name="serviceAccountName")
1118
- def service_account_name(self) -> pulumi.Output[Optional[builtins.str]]:
1117
+ def service_account_name(self) -> pulumi.Output[Optional[_builtins.str]]:
1119
1118
  """
1120
1119
  The pre-existing service account to generate tokens for.
1121
1120
  Mutually exclusive with `kubernetes_role_name` and `generated_role_rules`. If set, only a
@@ -1123,17 +1122,17 @@ class SecretBackendRole(pulumi.CustomResource):
1123
1122
  """
1124
1123
  return pulumi.get(self, "service_account_name")
1125
1124
 
1126
- @property
1125
+ @_builtins.property
1127
1126
  @pulumi.getter(name="tokenDefaultTtl")
1128
- def token_default_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1127
+ def token_default_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1129
1128
  """
1130
1129
  The default TTL for generated Kubernetes tokens in seconds.
1131
1130
  """
1132
1131
  return pulumi.get(self, "token_default_ttl")
1133
1132
 
1134
- @property
1133
+ @_builtins.property
1135
1134
  @pulumi.getter(name="tokenMaxTtl")
1136
- def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1135
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1137
1136
  """
1138
1137
  The maximum TTL for generated Kubernetes tokens in seconds.
1139
1138
  """