pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,48 +19,48 @@ __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
20
19
  @pulumi.input_type
21
20
  class NomadSecretBackendArgs:
22
21
  def __init__(__self__, *,
23
- address: Optional[pulumi.Input[builtins.str]] = None,
24
- backend: Optional[pulumi.Input[builtins.str]] = None,
25
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
26
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
27
- client_key: Optional[pulumi.Input[builtins.str]] = None,
28
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
29
- description: Optional[pulumi.Input[builtins.str]] = None,
30
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
31
- local: Optional[pulumi.Input[builtins.bool]] = None,
32
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
33
- max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
34
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
35
- namespace: Optional[pulumi.Input[builtins.str]] = None,
36
- token: Optional[pulumi.Input[builtins.str]] = None,
37
- ttl: Optional[pulumi.Input[builtins.int]] = None):
22
+ address: Optional[pulumi.Input[_builtins.str]] = None,
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
25
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
26
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
27
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
28
+ description: Optional[pulumi.Input[_builtins.str]] = None,
29
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
30
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
31
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
32
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
33
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
34
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
35
+ token: Optional[pulumi.Input[_builtins.str]] = None,
36
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
38
37
  """
39
38
  The set of arguments for constructing a NomadSecretBackend resource.
40
- :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
39
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
41
40
  as "protocol://host:port" like "http://127.0.0.1:4646".
42
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
41
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
43
42
  not begin or end with a `/`. Defaults to `nomad`.
44
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
43
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
45
44
  x509 PEM encoded.
46
- :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
47
- :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
48
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
49
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
50
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
45
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
46
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
47
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
48
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
49
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
51
50
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
52
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
51
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
53
52
  replication.Tolerance duration to use when checking the last rotation time.
54
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
55
- :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
53
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
54
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
56
55
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
57
56
  by the Nomad version.
58
- :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
59
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
57
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
58
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
60
59
  The value should not contain leading or trailing forward slashes.
61
60
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
62
61
  *Available only for Vault Enterprise*.
63
- :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
64
- :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
62
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
63
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
65
64
  """
66
65
  if address is not None:
67
66
  pulumi.set(__self__, "address", address)
@@ -94,9 +93,9 @@ class NomadSecretBackendArgs:
94
93
  if ttl is not None:
95
94
  pulumi.set(__self__, "ttl", ttl)
96
95
 
97
- @property
96
+ @_builtins.property
98
97
  @pulumi.getter
99
- def address(self) -> Optional[pulumi.Input[builtins.str]]:
98
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
100
99
  """
101
100
  Specifies the address of the Nomad instance, provided
102
101
  as "protocol://host:port" like "http://127.0.0.1:4646".
@@ -104,12 +103,12 @@ class NomadSecretBackendArgs:
104
103
  return pulumi.get(self, "address")
105
104
 
106
105
  @address.setter
107
- def address(self, value: Optional[pulumi.Input[builtins.str]]):
106
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
108
107
  pulumi.set(self, "address", value)
109
108
 
110
- @property
109
+ @_builtins.property
111
110
  @pulumi.getter
112
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
111
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
113
112
  """
114
113
  The unique path this backend should be mounted at. Must
115
114
  not begin or end with a `/`. Defaults to `nomad`.
@@ -117,12 +116,12 @@ class NomadSecretBackendArgs:
117
116
  return pulumi.get(self, "backend")
118
117
 
119
118
  @backend.setter
120
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
119
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
121
120
  pulumi.set(self, "backend", value)
122
121
 
123
- @property
122
+ @_builtins.property
124
123
  @pulumi.getter(name="caCert")
125
- def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
124
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
126
125
  """
127
126
  CA certificate to use when verifying the Nomad server certificate, must be
128
127
  x509 PEM encoded.
@@ -130,60 +129,60 @@ class NomadSecretBackendArgs:
130
129
  return pulumi.get(self, "ca_cert")
131
130
 
132
131
  @ca_cert.setter
133
- def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
132
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
134
133
  pulumi.set(self, "ca_cert", value)
135
134
 
136
- @property
135
+ @_builtins.property
137
136
  @pulumi.getter(name="clientCert")
138
- def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
137
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
139
138
  """
140
139
  Client certificate to provide to the Nomad server, must be x509 PEM encoded.
141
140
  """
142
141
  return pulumi.get(self, "client_cert")
143
142
 
144
143
  @client_cert.setter
145
- def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
144
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
146
145
  pulumi.set(self, "client_cert", value)
147
146
 
148
- @property
147
+ @_builtins.property
149
148
  @pulumi.getter(name="clientKey")
150
- def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
149
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
151
150
  """
152
151
  Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
153
152
  """
154
153
  return pulumi.get(self, "client_key")
155
154
 
156
155
  @client_key.setter
157
- def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
156
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
158
157
  pulumi.set(self, "client_key", value)
159
158
 
160
- @property
159
+ @_builtins.property
161
160
  @pulumi.getter(name="defaultLeaseTtlSeconds")
162
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
161
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
163
162
  """
164
163
  Default lease duration for secrets in seconds.
165
164
  """
166
165
  return pulumi.get(self, "default_lease_ttl_seconds")
167
166
 
168
167
  @default_lease_ttl_seconds.setter
169
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
168
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
170
169
  pulumi.set(self, "default_lease_ttl_seconds", value)
171
170
 
172
- @property
171
+ @_builtins.property
173
172
  @pulumi.getter
174
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
173
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
175
174
  """
176
175
  Human-friendly description of the mount for the Active Directory backend.
177
176
  """
178
177
  return pulumi.get(self, "description")
179
178
 
180
179
  @description.setter
181
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
180
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
182
181
  pulumi.set(self, "description", value)
183
182
 
184
- @property
183
+ @_builtins.property
185
184
  @pulumi.getter(name="disableRemount")
186
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
185
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
187
186
  """
188
187
  If set, opts out of mount migration on path updates.
189
188
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -191,12 +190,12 @@ class NomadSecretBackendArgs:
191
190
  return pulumi.get(self, "disable_remount")
192
191
 
193
192
  @disable_remount.setter
194
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
193
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
195
194
  pulumi.set(self, "disable_remount", value)
196
195
 
197
- @property
196
+ @_builtins.property
198
197
  @pulumi.getter
199
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
198
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
200
199
  """
201
200
  Mark the secrets engine as local-only. Local engines are not replicated or removed by
202
201
  replication.Tolerance duration to use when checking the last rotation time.
@@ -204,24 +203,24 @@ class NomadSecretBackendArgs:
204
203
  return pulumi.get(self, "local")
205
204
 
206
205
  @local.setter
207
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
206
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
208
207
  pulumi.set(self, "local", value)
209
208
 
210
- @property
209
+ @_builtins.property
211
210
  @pulumi.getter(name="maxLeaseTtlSeconds")
212
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
211
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
213
212
  """
214
213
  Maximum possible lease duration for secrets in seconds.
215
214
  """
216
215
  return pulumi.get(self, "max_lease_ttl_seconds")
217
216
 
218
217
  @max_lease_ttl_seconds.setter
219
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
218
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
220
219
  pulumi.set(self, "max_lease_ttl_seconds", value)
221
220
 
222
- @property
221
+ @_builtins.property
223
222
  @pulumi.getter(name="maxTokenNameLength")
224
- def max_token_name_length(self) -> Optional[pulumi.Input[builtins.int]]:
223
+ def max_token_name_length(self) -> Optional[pulumi.Input[_builtins.int]]:
225
224
  """
226
225
  Specifies the maximum length to use for the name of the Nomad token
227
226
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -230,24 +229,24 @@ class NomadSecretBackendArgs:
230
229
  return pulumi.get(self, "max_token_name_length")
231
230
 
232
231
  @max_token_name_length.setter
233
- def max_token_name_length(self, value: Optional[pulumi.Input[builtins.int]]):
232
+ def max_token_name_length(self, value: Optional[pulumi.Input[_builtins.int]]):
234
233
  pulumi.set(self, "max_token_name_length", value)
235
234
 
236
- @property
235
+ @_builtins.property
237
236
  @pulumi.getter(name="maxTtl")
238
- def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
237
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
239
238
  """
240
239
  Maximum possible lease duration for secrets in seconds.
241
240
  """
242
241
  return pulumi.get(self, "max_ttl")
243
242
 
244
243
  @max_ttl.setter
245
- def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
244
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
246
245
  pulumi.set(self, "max_ttl", value)
247
246
 
248
- @property
247
+ @_builtins.property
249
248
  @pulumi.getter
250
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
249
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
251
250
  """
252
251
  The namespace to provision the resource in.
253
252
  The value should not contain leading or trailing forward slashes.
@@ -257,79 +256,79 @@ class NomadSecretBackendArgs:
257
256
  return pulumi.get(self, "namespace")
258
257
 
259
258
  @namespace.setter
260
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
259
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
261
260
  pulumi.set(self, "namespace", value)
262
261
 
263
- @property
262
+ @_builtins.property
264
263
  @pulumi.getter
265
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
264
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
266
265
  """
267
266
  Specifies the Nomad Management token to use.
268
267
  """
269
268
  return pulumi.get(self, "token")
270
269
 
271
270
  @token.setter
272
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
271
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
273
272
  pulumi.set(self, "token", value)
274
273
 
275
- @property
274
+ @_builtins.property
276
275
  @pulumi.getter
277
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
276
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
278
277
  """
279
278
  Specifies the ttl of the lease for the generated token.
280
279
  """
281
280
  return pulumi.get(self, "ttl")
282
281
 
283
282
  @ttl.setter
284
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
283
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
285
284
  pulumi.set(self, "ttl", value)
286
285
 
287
286
 
288
287
  @pulumi.input_type
289
288
  class _NomadSecretBackendState:
290
289
  def __init__(__self__, *,
291
- address: Optional[pulumi.Input[builtins.str]] = None,
292
- backend: Optional[pulumi.Input[builtins.str]] = None,
293
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
294
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
295
- client_key: Optional[pulumi.Input[builtins.str]] = None,
296
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
297
- description: Optional[pulumi.Input[builtins.str]] = None,
298
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
299
- local: Optional[pulumi.Input[builtins.bool]] = None,
300
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
301
- max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
302
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
303
- namespace: Optional[pulumi.Input[builtins.str]] = None,
304
- token: Optional[pulumi.Input[builtins.str]] = None,
305
- ttl: Optional[pulumi.Input[builtins.int]] = None):
290
+ address: Optional[pulumi.Input[_builtins.str]] = None,
291
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
292
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
293
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
294
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
295
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
296
+ description: Optional[pulumi.Input[_builtins.str]] = None,
297
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
298
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
299
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
300
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
301
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
302
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
303
+ token: Optional[pulumi.Input[_builtins.str]] = None,
304
+ ttl: Optional[pulumi.Input[_builtins.int]] = None):
306
305
  """
307
306
  Input properties used for looking up and filtering NomadSecretBackend resources.
308
- :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
307
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
309
308
  as "protocol://host:port" like "http://127.0.0.1:4646".
310
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
309
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
311
310
  not begin or end with a `/`. Defaults to `nomad`.
312
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
311
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
313
312
  x509 PEM encoded.
314
- :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
315
- :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
316
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
317
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
318
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
313
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
314
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
315
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
316
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
317
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
319
318
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
320
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
319
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
321
320
  replication.Tolerance duration to use when checking the last rotation time.
322
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
323
- :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
321
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
322
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
324
323
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
325
324
  by the Nomad version.
326
- :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
327
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
325
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
326
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
328
327
  The value should not contain leading or trailing forward slashes.
329
328
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
330
329
  *Available only for Vault Enterprise*.
331
- :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
332
- :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
330
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
331
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
333
332
  """
334
333
  if address is not None:
335
334
  pulumi.set(__self__, "address", address)
@@ -362,9 +361,9 @@ class _NomadSecretBackendState:
362
361
  if ttl is not None:
363
362
  pulumi.set(__self__, "ttl", ttl)
364
363
 
365
- @property
364
+ @_builtins.property
366
365
  @pulumi.getter
367
- def address(self) -> Optional[pulumi.Input[builtins.str]]:
366
+ def address(self) -> Optional[pulumi.Input[_builtins.str]]:
368
367
  """
369
368
  Specifies the address of the Nomad instance, provided
370
369
  as "protocol://host:port" like "http://127.0.0.1:4646".
@@ -372,12 +371,12 @@ class _NomadSecretBackendState:
372
371
  return pulumi.get(self, "address")
373
372
 
374
373
  @address.setter
375
- def address(self, value: Optional[pulumi.Input[builtins.str]]):
374
+ def address(self, value: Optional[pulumi.Input[_builtins.str]]):
376
375
  pulumi.set(self, "address", value)
377
376
 
378
- @property
377
+ @_builtins.property
379
378
  @pulumi.getter
380
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
379
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
381
380
  """
382
381
  The unique path this backend should be mounted at. Must
383
382
  not begin or end with a `/`. Defaults to `nomad`.
@@ -385,12 +384,12 @@ class _NomadSecretBackendState:
385
384
  return pulumi.get(self, "backend")
386
385
 
387
386
  @backend.setter
388
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
387
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
389
388
  pulumi.set(self, "backend", value)
390
389
 
391
- @property
390
+ @_builtins.property
392
391
  @pulumi.getter(name="caCert")
393
- def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
392
+ def ca_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
394
393
  """
395
394
  CA certificate to use when verifying the Nomad server certificate, must be
396
395
  x509 PEM encoded.
@@ -398,60 +397,60 @@ class _NomadSecretBackendState:
398
397
  return pulumi.get(self, "ca_cert")
399
398
 
400
399
  @ca_cert.setter
401
- def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
400
+ def ca_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
402
401
  pulumi.set(self, "ca_cert", value)
403
402
 
404
- @property
403
+ @_builtins.property
405
404
  @pulumi.getter(name="clientCert")
406
- def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
405
+ def client_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
407
406
  """
408
407
  Client certificate to provide to the Nomad server, must be x509 PEM encoded.
409
408
  """
410
409
  return pulumi.get(self, "client_cert")
411
410
 
412
411
  @client_cert.setter
413
- def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
412
+ def client_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
414
413
  pulumi.set(self, "client_cert", value)
415
414
 
416
- @property
415
+ @_builtins.property
417
416
  @pulumi.getter(name="clientKey")
418
- def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
417
+ def client_key(self) -> Optional[pulumi.Input[_builtins.str]]:
419
418
  """
420
419
  Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
421
420
  """
422
421
  return pulumi.get(self, "client_key")
423
422
 
424
423
  @client_key.setter
425
- def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
424
+ def client_key(self, value: Optional[pulumi.Input[_builtins.str]]):
426
425
  pulumi.set(self, "client_key", value)
427
426
 
428
- @property
427
+ @_builtins.property
429
428
  @pulumi.getter(name="defaultLeaseTtlSeconds")
430
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
429
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
431
430
  """
432
431
  Default lease duration for secrets in seconds.
433
432
  """
434
433
  return pulumi.get(self, "default_lease_ttl_seconds")
435
434
 
436
435
  @default_lease_ttl_seconds.setter
437
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
436
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
438
437
  pulumi.set(self, "default_lease_ttl_seconds", value)
439
438
 
440
- @property
439
+ @_builtins.property
441
440
  @pulumi.getter
442
- def description(self) -> Optional[pulumi.Input[builtins.str]]:
441
+ def description(self) -> Optional[pulumi.Input[_builtins.str]]:
443
442
  """
444
443
  Human-friendly description of the mount for the Active Directory backend.
445
444
  """
446
445
  return pulumi.get(self, "description")
447
446
 
448
447
  @description.setter
449
- def description(self, value: Optional[pulumi.Input[builtins.str]]):
448
+ def description(self, value: Optional[pulumi.Input[_builtins.str]]):
450
449
  pulumi.set(self, "description", value)
451
450
 
452
- @property
451
+ @_builtins.property
453
452
  @pulumi.getter(name="disableRemount")
454
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
453
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
455
454
  """
456
455
  If set, opts out of mount migration on path updates.
457
456
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -459,12 +458,12 @@ class _NomadSecretBackendState:
459
458
  return pulumi.get(self, "disable_remount")
460
459
 
461
460
  @disable_remount.setter
462
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
461
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
463
462
  pulumi.set(self, "disable_remount", value)
464
463
 
465
- @property
464
+ @_builtins.property
466
465
  @pulumi.getter
467
- def local(self) -> Optional[pulumi.Input[builtins.bool]]:
466
+ def local(self) -> Optional[pulumi.Input[_builtins.bool]]:
468
467
  """
469
468
  Mark the secrets engine as local-only. Local engines are not replicated or removed by
470
469
  replication.Tolerance duration to use when checking the last rotation time.
@@ -472,24 +471,24 @@ class _NomadSecretBackendState:
472
471
  return pulumi.get(self, "local")
473
472
 
474
473
  @local.setter
475
- def local(self, value: Optional[pulumi.Input[builtins.bool]]):
474
+ def local(self, value: Optional[pulumi.Input[_builtins.bool]]):
476
475
  pulumi.set(self, "local", value)
477
476
 
478
- @property
477
+ @_builtins.property
479
478
  @pulumi.getter(name="maxLeaseTtlSeconds")
480
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
479
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[_builtins.int]]:
481
480
  """
482
481
  Maximum possible lease duration for secrets in seconds.
483
482
  """
484
483
  return pulumi.get(self, "max_lease_ttl_seconds")
485
484
 
486
485
  @max_lease_ttl_seconds.setter
487
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
486
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[_builtins.int]]):
488
487
  pulumi.set(self, "max_lease_ttl_seconds", value)
489
488
 
490
- @property
489
+ @_builtins.property
491
490
  @pulumi.getter(name="maxTokenNameLength")
492
- def max_token_name_length(self) -> Optional[pulumi.Input[builtins.int]]:
491
+ def max_token_name_length(self) -> Optional[pulumi.Input[_builtins.int]]:
493
492
  """
494
493
  Specifies the maximum length to use for the name of the Nomad token
495
494
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -498,24 +497,24 @@ class _NomadSecretBackendState:
498
497
  return pulumi.get(self, "max_token_name_length")
499
498
 
500
499
  @max_token_name_length.setter
501
- def max_token_name_length(self, value: Optional[pulumi.Input[builtins.int]]):
500
+ def max_token_name_length(self, value: Optional[pulumi.Input[_builtins.int]]):
502
501
  pulumi.set(self, "max_token_name_length", value)
503
502
 
504
- @property
503
+ @_builtins.property
505
504
  @pulumi.getter(name="maxTtl")
506
- def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
505
+ def max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
507
506
  """
508
507
  Maximum possible lease duration for secrets in seconds.
509
508
  """
510
509
  return pulumi.get(self, "max_ttl")
511
510
 
512
511
  @max_ttl.setter
513
- def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
512
+ def max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
514
513
  pulumi.set(self, "max_ttl", value)
515
514
 
516
- @property
515
+ @_builtins.property
517
516
  @pulumi.getter
518
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
517
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
519
518
  """
520
519
  The namespace to provision the resource in.
521
520
  The value should not contain leading or trailing forward slashes.
@@ -525,31 +524,31 @@ class _NomadSecretBackendState:
525
524
  return pulumi.get(self, "namespace")
526
525
 
527
526
  @namespace.setter
528
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
527
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
529
528
  pulumi.set(self, "namespace", value)
530
529
 
531
- @property
530
+ @_builtins.property
532
531
  @pulumi.getter
533
- def token(self) -> Optional[pulumi.Input[builtins.str]]:
532
+ def token(self) -> Optional[pulumi.Input[_builtins.str]]:
534
533
  """
535
534
  Specifies the Nomad Management token to use.
536
535
  """
537
536
  return pulumi.get(self, "token")
538
537
 
539
538
  @token.setter
540
- def token(self, value: Optional[pulumi.Input[builtins.str]]):
539
+ def token(self, value: Optional[pulumi.Input[_builtins.str]]):
541
540
  pulumi.set(self, "token", value)
542
541
 
543
- @property
542
+ @_builtins.property
544
543
  @pulumi.getter
545
- def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
544
+ def ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
546
545
  """
547
546
  Specifies the ttl of the lease for the generated token.
548
547
  """
549
548
  return pulumi.get(self, "ttl")
550
549
 
551
550
  @ttl.setter
552
- def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
551
+ def ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
553
552
  pulumi.set(self, "ttl", value)
554
553
 
555
554
 
@@ -559,21 +558,21 @@ class NomadSecretBackend(pulumi.CustomResource):
559
558
  def __init__(__self__,
560
559
  resource_name: str,
561
560
  opts: Optional[pulumi.ResourceOptions] = None,
562
- address: Optional[pulumi.Input[builtins.str]] = None,
563
- backend: Optional[pulumi.Input[builtins.str]] = None,
564
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
565
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
566
- client_key: Optional[pulumi.Input[builtins.str]] = None,
567
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
568
- description: Optional[pulumi.Input[builtins.str]] = None,
569
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
570
- local: Optional[pulumi.Input[builtins.bool]] = None,
571
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
572
- max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
573
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
574
- namespace: Optional[pulumi.Input[builtins.str]] = None,
575
- token: Optional[pulumi.Input[builtins.str]] = None,
576
- ttl: Optional[pulumi.Input[builtins.int]] = None,
561
+ address: Optional[pulumi.Input[_builtins.str]] = None,
562
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
563
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
564
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
565
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
566
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
567
+ description: Optional[pulumi.Input[_builtins.str]] = None,
568
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
569
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
570
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
571
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
572
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
573
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
574
+ token: Optional[pulumi.Input[_builtins.str]] = None,
575
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
577
576
  __props__=None):
578
577
  """
579
578
  ## Example Usage
@@ -603,31 +602,31 @@ class NomadSecretBackend(pulumi.CustomResource):
603
602
 
604
603
  :param str resource_name: The name of the resource.
605
604
  :param pulumi.ResourceOptions opts: Options for the resource.
606
- :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
605
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
607
606
  as "protocol://host:port" like "http://127.0.0.1:4646".
608
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
607
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
609
608
  not begin or end with a `/`. Defaults to `nomad`.
610
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
609
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
611
610
  x509 PEM encoded.
612
- :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
613
- :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
614
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
615
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
616
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
611
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
612
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
613
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
614
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
615
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
617
616
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
618
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
617
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
619
618
  replication.Tolerance duration to use when checking the last rotation time.
620
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
621
- :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
619
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
620
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
622
621
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
623
622
  by the Nomad version.
624
- :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
625
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
623
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
624
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
626
625
  The value should not contain leading or trailing forward slashes.
627
626
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
628
627
  *Available only for Vault Enterprise*.
629
- :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
630
- :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
628
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
629
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
631
630
  """
632
631
  ...
633
632
  @overload
@@ -676,21 +675,21 @@ class NomadSecretBackend(pulumi.CustomResource):
676
675
  def _internal_init(__self__,
677
676
  resource_name: str,
678
677
  opts: Optional[pulumi.ResourceOptions] = None,
679
- address: Optional[pulumi.Input[builtins.str]] = None,
680
- backend: Optional[pulumi.Input[builtins.str]] = None,
681
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
682
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
683
- client_key: Optional[pulumi.Input[builtins.str]] = None,
684
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
685
- description: Optional[pulumi.Input[builtins.str]] = None,
686
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
687
- local: Optional[pulumi.Input[builtins.bool]] = None,
688
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
689
- max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
690
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
691
- namespace: Optional[pulumi.Input[builtins.str]] = None,
692
- token: Optional[pulumi.Input[builtins.str]] = None,
693
- ttl: Optional[pulumi.Input[builtins.int]] = None,
678
+ address: Optional[pulumi.Input[_builtins.str]] = None,
679
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
680
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
681
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
682
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
683
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
684
+ description: Optional[pulumi.Input[_builtins.str]] = None,
685
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
686
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
687
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
688
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
689
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
690
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
691
+ token: Optional[pulumi.Input[_builtins.str]] = None,
692
+ ttl: Optional[pulumi.Input[_builtins.int]] = None,
694
693
  __props__=None):
695
694
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
696
695
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -727,21 +726,21 @@ class NomadSecretBackend(pulumi.CustomResource):
727
726
  def get(resource_name: str,
728
727
  id: pulumi.Input[str],
729
728
  opts: Optional[pulumi.ResourceOptions] = None,
730
- address: Optional[pulumi.Input[builtins.str]] = None,
731
- backend: Optional[pulumi.Input[builtins.str]] = None,
732
- ca_cert: Optional[pulumi.Input[builtins.str]] = None,
733
- client_cert: Optional[pulumi.Input[builtins.str]] = None,
734
- client_key: Optional[pulumi.Input[builtins.str]] = None,
735
- default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
736
- description: Optional[pulumi.Input[builtins.str]] = None,
737
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
738
- local: Optional[pulumi.Input[builtins.bool]] = None,
739
- max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
740
- max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
741
- max_ttl: Optional[pulumi.Input[builtins.int]] = None,
742
- namespace: Optional[pulumi.Input[builtins.str]] = None,
743
- token: Optional[pulumi.Input[builtins.str]] = None,
744
- ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'NomadSecretBackend':
729
+ address: Optional[pulumi.Input[_builtins.str]] = None,
730
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
731
+ ca_cert: Optional[pulumi.Input[_builtins.str]] = None,
732
+ client_cert: Optional[pulumi.Input[_builtins.str]] = None,
733
+ client_key: Optional[pulumi.Input[_builtins.str]] = None,
734
+ default_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
735
+ description: Optional[pulumi.Input[_builtins.str]] = None,
736
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
737
+ local: Optional[pulumi.Input[_builtins.bool]] = None,
738
+ max_lease_ttl_seconds: Optional[pulumi.Input[_builtins.int]] = None,
739
+ max_token_name_length: Optional[pulumi.Input[_builtins.int]] = None,
740
+ max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
741
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
742
+ token: Optional[pulumi.Input[_builtins.str]] = None,
743
+ ttl: Optional[pulumi.Input[_builtins.int]] = None) -> 'NomadSecretBackend':
745
744
  """
746
745
  Get an existing NomadSecretBackend resource's state with the given name, id, and optional extra
747
746
  properties used to qualify the lookup.
@@ -749,31 +748,31 @@ class NomadSecretBackend(pulumi.CustomResource):
749
748
  :param str resource_name: The unique name of the resulting resource.
750
749
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
751
750
  :param pulumi.ResourceOptions opts: Options for the resource.
752
- :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
751
+ :param pulumi.Input[_builtins.str] address: Specifies the address of the Nomad instance, provided
753
752
  as "protocol://host:port" like "http://127.0.0.1:4646".
754
- :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
753
+ :param pulumi.Input[_builtins.str] backend: The unique path this backend should be mounted at. Must
755
754
  not begin or end with a `/`. Defaults to `nomad`.
756
- :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
755
+ :param pulumi.Input[_builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
757
756
  x509 PEM encoded.
758
- :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
759
- :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
760
- :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
761
- :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
762
- :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
757
+ :param pulumi.Input[_builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
758
+ :param pulumi.Input[_builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
759
+ :param pulumi.Input[_builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
760
+ :param pulumi.Input[_builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
761
+ :param pulumi.Input[_builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
763
762
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
764
- :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
763
+ :param pulumi.Input[_builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
765
764
  replication.Tolerance duration to use when checking the last rotation time.
766
- :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
767
- :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
765
+ :param pulumi.Input[_builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
766
+ :param pulumi.Input[_builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
768
767
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
769
768
  by the Nomad version.
770
- :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
771
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
769
+ :param pulumi.Input[_builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
770
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
772
771
  The value should not contain leading or trailing forward slashes.
773
772
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
774
773
  *Available only for Vault Enterprise*.
775
- :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
776
- :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
774
+ :param pulumi.Input[_builtins.str] token: Specifies the Nomad Management token to use.
775
+ :param pulumi.Input[_builtins.int] ttl: Specifies the ttl of the lease for the generated token.
777
776
  """
778
777
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
779
778
 
@@ -796,94 +795,94 @@ class NomadSecretBackend(pulumi.CustomResource):
796
795
  __props__.__dict__["ttl"] = ttl
797
796
  return NomadSecretBackend(resource_name, opts=opts, __props__=__props__)
798
797
 
799
- @property
798
+ @_builtins.property
800
799
  @pulumi.getter
801
- def address(self) -> pulumi.Output[Optional[builtins.str]]:
800
+ def address(self) -> pulumi.Output[Optional[_builtins.str]]:
802
801
  """
803
802
  Specifies the address of the Nomad instance, provided
804
803
  as "protocol://host:port" like "http://127.0.0.1:4646".
805
804
  """
806
805
  return pulumi.get(self, "address")
807
806
 
808
- @property
807
+ @_builtins.property
809
808
  @pulumi.getter
810
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
809
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
811
810
  """
812
811
  The unique path this backend should be mounted at. Must
813
812
  not begin or end with a `/`. Defaults to `nomad`.
814
813
  """
815
814
  return pulumi.get(self, "backend")
816
815
 
817
- @property
816
+ @_builtins.property
818
817
  @pulumi.getter(name="caCert")
819
- def ca_cert(self) -> pulumi.Output[Optional[builtins.str]]:
818
+ def ca_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
820
819
  """
821
820
  CA certificate to use when verifying the Nomad server certificate, must be
822
821
  x509 PEM encoded.
823
822
  """
824
823
  return pulumi.get(self, "ca_cert")
825
824
 
826
- @property
825
+ @_builtins.property
827
826
  @pulumi.getter(name="clientCert")
828
- def client_cert(self) -> pulumi.Output[Optional[builtins.str]]:
827
+ def client_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
829
828
  """
830
829
  Client certificate to provide to the Nomad server, must be x509 PEM encoded.
831
830
  """
832
831
  return pulumi.get(self, "client_cert")
833
832
 
834
- @property
833
+ @_builtins.property
835
834
  @pulumi.getter(name="clientKey")
836
- def client_key(self) -> pulumi.Output[Optional[builtins.str]]:
835
+ def client_key(self) -> pulumi.Output[Optional[_builtins.str]]:
837
836
  """
838
837
  Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
839
838
  """
840
839
  return pulumi.get(self, "client_key")
841
840
 
842
- @property
841
+ @_builtins.property
843
842
  @pulumi.getter(name="defaultLeaseTtlSeconds")
844
- def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
843
+ def default_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
845
844
  """
846
845
  Default lease duration for secrets in seconds.
847
846
  """
848
847
  return pulumi.get(self, "default_lease_ttl_seconds")
849
848
 
850
- @property
849
+ @_builtins.property
851
850
  @pulumi.getter
852
- def description(self) -> pulumi.Output[Optional[builtins.str]]:
851
+ def description(self) -> pulumi.Output[Optional[_builtins.str]]:
853
852
  """
854
853
  Human-friendly description of the mount for the Active Directory backend.
855
854
  """
856
855
  return pulumi.get(self, "description")
857
856
 
858
- @property
857
+ @_builtins.property
859
858
  @pulumi.getter(name="disableRemount")
860
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
859
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
861
860
  """
862
861
  If set, opts out of mount migration on path updates.
863
862
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
864
863
  """
865
864
  return pulumi.get(self, "disable_remount")
866
865
 
867
- @property
866
+ @_builtins.property
868
867
  @pulumi.getter
869
- def local(self) -> pulumi.Output[Optional[builtins.bool]]:
868
+ def local(self) -> pulumi.Output[Optional[_builtins.bool]]:
870
869
  """
871
870
  Mark the secrets engine as local-only. Local engines are not replicated or removed by
872
871
  replication.Tolerance duration to use when checking the last rotation time.
873
872
  """
874
873
  return pulumi.get(self, "local")
875
874
 
876
- @property
875
+ @_builtins.property
877
876
  @pulumi.getter(name="maxLeaseTtlSeconds")
878
- def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
877
+ def max_lease_ttl_seconds(self) -> pulumi.Output[_builtins.int]:
879
878
  """
880
879
  Maximum possible lease duration for secrets in seconds.
881
880
  """
882
881
  return pulumi.get(self, "max_lease_ttl_seconds")
883
882
 
884
- @property
883
+ @_builtins.property
885
884
  @pulumi.getter(name="maxTokenNameLength")
886
- def max_token_name_length(self) -> pulumi.Output[builtins.int]:
885
+ def max_token_name_length(self) -> pulumi.Output[_builtins.int]:
887
886
  """
888
887
  Specifies the maximum length to use for the name of the Nomad token
889
888
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -891,17 +890,17 @@ class NomadSecretBackend(pulumi.CustomResource):
891
890
  """
892
891
  return pulumi.get(self, "max_token_name_length")
893
892
 
894
- @property
893
+ @_builtins.property
895
894
  @pulumi.getter(name="maxTtl")
896
- def max_ttl(self) -> pulumi.Output[builtins.int]:
895
+ def max_ttl(self) -> pulumi.Output[_builtins.int]:
897
896
  """
898
897
  Maximum possible lease duration for secrets in seconds.
899
898
  """
900
899
  return pulumi.get(self, "max_ttl")
901
900
 
902
- @property
901
+ @_builtins.property
903
902
  @pulumi.getter
904
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
903
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
905
904
  """
906
905
  The namespace to provision the resource in.
907
906
  The value should not contain leading or trailing forward slashes.
@@ -910,17 +909,17 @@ class NomadSecretBackend(pulumi.CustomResource):
910
909
  """
911
910
  return pulumi.get(self, "namespace")
912
911
 
913
- @property
912
+ @_builtins.property
914
913
  @pulumi.getter
915
- def token(self) -> pulumi.Output[Optional[builtins.str]]:
914
+ def token(self) -> pulumi.Output[Optional[_builtins.str]]:
916
915
  """
917
916
  Specifies the Nomad Management token to use.
918
917
  """
919
918
  return pulumi.get(self, "token")
920
919
 
921
- @property
920
+ @_builtins.property
922
921
  @pulumi.getter
923
- def ttl(self) -> pulumi.Output[builtins.int]:
922
+ def ttl(self) -> pulumi.Output[_builtins.int]:
924
923
  """
925
924
  Specifies the ttl of the lease for the generated token.
926
925
  """