pulumi-vault 7.2.0a1753339763__py3-none-any.whl → 7.2.0a1753512474__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753512474.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1753339763.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1753339763.dist-info → pulumi_vault-7.2.0a1753512474.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,64 +19,64 @@ __all__ = ['AuthBackendClientArgs', 'AuthBackendClient']
20
19
  @pulumi.input_type
21
20
  class AuthBackendClientArgs:
22
21
  def __init__(__self__, *,
23
- access_key: Optional[pulumi.Input[builtins.str]] = None,
24
- backend: Optional[pulumi.Input[builtins.str]] = None,
25
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
26
- ec2_endpoint: Optional[pulumi.Input[builtins.str]] = None,
27
- iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
28
- iam_server_id_header_value: Optional[pulumi.Input[builtins.str]] = None,
29
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
30
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
31
- max_retries: Optional[pulumi.Input[builtins.int]] = None,
32
- namespace: Optional[pulumi.Input[builtins.str]] = None,
33
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
34
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
35
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
36
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
37
- secret_key: Optional[pulumi.Input[builtins.str]] = None,
38
- sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
39
- sts_region: Optional[pulumi.Input[builtins.str]] = None,
40
- use_sts_region_from_client: Optional[pulumi.Input[builtins.bool]] = None):
22
+ access_key: Optional[pulumi.Input[_builtins.str]] = None,
23
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
24
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
25
+ ec2_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
26
+ iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
27
+ iam_server_id_header_value: Optional[pulumi.Input[_builtins.str]] = None,
28
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
29
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
30
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
31
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
32
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
33
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
34
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
35
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
36
+ secret_key: Optional[pulumi.Input[_builtins.str]] = None,
37
+ sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
38
+ sts_region: Optional[pulumi.Input[_builtins.str]] = None,
39
+ use_sts_region_from_client: Optional[pulumi.Input[_builtins.bool]] = None):
41
40
  """
42
41
  The set of arguments for constructing a AuthBackendClient resource.
43
- :param pulumi.Input[builtins.str] access_key: The AWS access key that Vault should use for the
42
+ :param pulumi.Input[_builtins.str] access_key: The AWS access key that Vault should use for the
44
43
  auth backend. Mutually exclusive with `identity_token_audience`.
45
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
44
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
46
45
  mounted at. Defaults to `aws`.
47
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
48
- :param pulumi.Input[builtins.str] ec2_endpoint: Override the URL Vault uses when making EC2 API
46
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
47
+ :param pulumi.Input[_builtins.str] ec2_endpoint: Override the URL Vault uses when making EC2 API
49
48
  calls.
50
- :param pulumi.Input[builtins.str] iam_endpoint: Override the URL Vault uses when making IAM API
49
+ :param pulumi.Input[_builtins.str] iam_endpoint: Override the URL Vault uses when making IAM API
51
50
  calls.
52
- :param pulumi.Input[builtins.str] iam_server_id_header_value: The value to require in the
51
+ :param pulumi.Input[_builtins.str] iam_server_id_header_value: The value to require in the
53
52
  `X-Vault-AWS-IAM-Server-ID` header as part of `GetCallerIdentity` requests
54
53
  that are used in the IAM auth method.
55
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
54
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
56
55
  Requires Vault 1.17+. *Available only for Vault Enterprise*
57
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
56
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
58
57
  *Available only for Vault Enterprise*
59
- :param pulumi.Input[builtins.int] max_retries: Number of max retries the client should use for recoverable errors.
58
+ :param pulumi.Input[_builtins.int] max_retries: Number of max retries the client should use for recoverable errors.
60
59
  The default `-1` falls back to the AWS SDK's default behavior.
61
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
60
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
62
61
  The value should not contain leading or trailing forward slashes.
63
62
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
64
63
  *Available only for Vault Enterprise*.
65
- :param pulumi.Input[builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
64
+ :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
66
65
  *Available only for Vault Enterprise*
67
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
66
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
68
67
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
69
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
68
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
70
69
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
71
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
70
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
72
71
  a rotation when a scheduled token rotation occurs. The default rotation window is
73
72
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
74
- :param pulumi.Input[builtins.str] secret_key: The AWS secret key that Vault should use for the
73
+ :param pulumi.Input[_builtins.str] secret_key: The AWS secret key that Vault should use for the
75
74
  auth backend.
76
- :param pulumi.Input[builtins.str] sts_endpoint: Override the URL Vault uses when making STS API
75
+ :param pulumi.Input[_builtins.str] sts_endpoint: Override the URL Vault uses when making STS API
77
76
  calls.
78
- :param pulumi.Input[builtins.str] sts_region: Override the default region when making STS API
77
+ :param pulumi.Input[_builtins.str] sts_region: Override the default region when making STS API
79
78
  calls. The `sts_endpoint` argument must be set when using `sts_region`.
80
- :param pulumi.Input[builtins.bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
79
+ :param pulumi.Input[_builtins.bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
81
80
  overrides both `sts_endpoint` and `sts_region` to instead use the region
82
81
  specified in the client request headers for IAM-based authentication.
83
82
  This can be useful when you have client requests coming from different
@@ -120,9 +119,9 @@ class AuthBackendClientArgs:
120
119
  if use_sts_region_from_client is not None:
121
120
  pulumi.set(__self__, "use_sts_region_from_client", use_sts_region_from_client)
122
121
 
123
- @property
122
+ @_builtins.property
124
123
  @pulumi.getter(name="accessKey")
125
- def access_key(self) -> Optional[pulumi.Input[builtins.str]]:
124
+ def access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
126
125
  """
127
126
  The AWS access key that Vault should use for the
128
127
  auth backend. Mutually exclusive with `identity_token_audience`.
@@ -130,12 +129,12 @@ class AuthBackendClientArgs:
130
129
  return pulumi.get(self, "access_key")
131
130
 
132
131
  @access_key.setter
133
- def access_key(self, value: Optional[pulumi.Input[builtins.str]]):
132
+ def access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
134
133
  pulumi.set(self, "access_key", value)
135
134
 
136
- @property
135
+ @_builtins.property
137
136
  @pulumi.getter
138
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
137
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
139
138
  """
140
139
  The path the AWS auth backend being configured was
141
140
  mounted at. Defaults to `aws`.
@@ -143,24 +142,24 @@ class AuthBackendClientArgs:
143
142
  return pulumi.get(self, "backend")
144
143
 
145
144
  @backend.setter
146
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
145
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
147
146
  pulumi.set(self, "backend", value)
148
147
 
149
- @property
148
+ @_builtins.property
150
149
  @pulumi.getter(name="disableAutomatedRotation")
151
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
150
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
152
151
  """
153
152
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
154
153
  """
155
154
  return pulumi.get(self, "disable_automated_rotation")
156
155
 
157
156
  @disable_automated_rotation.setter
158
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
157
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
159
158
  pulumi.set(self, "disable_automated_rotation", value)
160
159
 
161
- @property
160
+ @_builtins.property
162
161
  @pulumi.getter(name="ec2Endpoint")
163
- def ec2_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
162
+ def ec2_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
164
163
  """
165
164
  Override the URL Vault uses when making EC2 API
166
165
  calls.
@@ -168,12 +167,12 @@ class AuthBackendClientArgs:
168
167
  return pulumi.get(self, "ec2_endpoint")
169
168
 
170
169
  @ec2_endpoint.setter
171
- def ec2_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
170
+ def ec2_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
172
171
  pulumi.set(self, "ec2_endpoint", value)
173
172
 
174
- @property
173
+ @_builtins.property
175
174
  @pulumi.getter(name="iamEndpoint")
176
- def iam_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
175
+ def iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
177
176
  """
178
177
  Override the URL Vault uses when making IAM API
179
178
  calls.
@@ -181,12 +180,12 @@ class AuthBackendClientArgs:
181
180
  return pulumi.get(self, "iam_endpoint")
182
181
 
183
182
  @iam_endpoint.setter
184
- def iam_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
183
+ def iam_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
185
184
  pulumi.set(self, "iam_endpoint", value)
186
185
 
187
- @property
186
+ @_builtins.property
188
187
  @pulumi.getter(name="iamServerIdHeaderValue")
189
- def iam_server_id_header_value(self) -> Optional[pulumi.Input[builtins.str]]:
188
+ def iam_server_id_header_value(self) -> Optional[pulumi.Input[_builtins.str]]:
190
189
  """
191
190
  The value to require in the
192
191
  `X-Vault-AWS-IAM-Server-ID` header as part of `GetCallerIdentity` requests
@@ -195,12 +194,12 @@ class AuthBackendClientArgs:
195
194
  return pulumi.get(self, "iam_server_id_header_value")
196
195
 
197
196
  @iam_server_id_header_value.setter
198
- def iam_server_id_header_value(self, value: Optional[pulumi.Input[builtins.str]]):
197
+ def iam_server_id_header_value(self, value: Optional[pulumi.Input[_builtins.str]]):
199
198
  pulumi.set(self, "iam_server_id_header_value", value)
200
199
 
201
- @property
200
+ @_builtins.property
202
201
  @pulumi.getter(name="identityTokenAudience")
203
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
202
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
204
203
  """
205
204
  The audience claim value. Mutually exclusive with `access_key`.
206
205
  Requires Vault 1.17+. *Available only for Vault Enterprise*
@@ -208,12 +207,12 @@ class AuthBackendClientArgs:
208
207
  return pulumi.get(self, "identity_token_audience")
209
208
 
210
209
  @identity_token_audience.setter
211
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
210
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
212
211
  pulumi.set(self, "identity_token_audience", value)
213
212
 
214
- @property
213
+ @_builtins.property
215
214
  @pulumi.getter(name="identityTokenTtl")
216
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
215
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
217
216
  """
218
217
  The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
219
218
  *Available only for Vault Enterprise*
@@ -221,12 +220,12 @@ class AuthBackendClientArgs:
221
220
  return pulumi.get(self, "identity_token_ttl")
222
221
 
223
222
  @identity_token_ttl.setter
224
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
223
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
225
224
  pulumi.set(self, "identity_token_ttl", value)
226
225
 
227
- @property
226
+ @_builtins.property
228
227
  @pulumi.getter(name="maxRetries")
229
- def max_retries(self) -> Optional[pulumi.Input[builtins.int]]:
228
+ def max_retries(self) -> Optional[pulumi.Input[_builtins.int]]:
230
229
  """
231
230
  Number of max retries the client should use for recoverable errors.
232
231
  The default `-1` falls back to the AWS SDK's default behavior.
@@ -234,12 +233,12 @@ class AuthBackendClientArgs:
234
233
  return pulumi.get(self, "max_retries")
235
234
 
236
235
  @max_retries.setter
237
- def max_retries(self, value: Optional[pulumi.Input[builtins.int]]):
236
+ def max_retries(self, value: Optional[pulumi.Input[_builtins.int]]):
238
237
  pulumi.set(self, "max_retries", value)
239
238
 
240
- @property
239
+ @_builtins.property
241
240
  @pulumi.getter
242
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
241
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
243
242
  """
244
243
  The namespace to provision the resource in.
245
244
  The value should not contain leading or trailing forward slashes.
@@ -249,12 +248,12 @@ class AuthBackendClientArgs:
249
248
  return pulumi.get(self, "namespace")
250
249
 
251
250
  @namespace.setter
252
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
251
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
253
252
  pulumi.set(self, "namespace", value)
254
253
 
255
- @property
254
+ @_builtins.property
256
255
  @pulumi.getter(name="roleArn")
257
- def role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
256
+ def role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
258
257
  """
259
258
  Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
260
259
  *Available only for Vault Enterprise*
@@ -262,12 +261,12 @@ class AuthBackendClientArgs:
262
261
  return pulumi.get(self, "role_arn")
263
262
 
264
263
  @role_arn.setter
265
- def role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
264
+ def role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
266
265
  pulumi.set(self, "role_arn", value)
267
266
 
268
- @property
267
+ @_builtins.property
269
268
  @pulumi.getter(name="rotationPeriod")
270
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
269
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
271
270
  """
272
271
  The amount of time in seconds Vault should wait before rotating the root credential.
273
272
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -275,12 +274,12 @@ class AuthBackendClientArgs:
275
274
  return pulumi.get(self, "rotation_period")
276
275
 
277
276
  @rotation_period.setter
278
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
277
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
279
278
  pulumi.set(self, "rotation_period", value)
280
279
 
281
- @property
280
+ @_builtins.property
282
281
  @pulumi.getter(name="rotationSchedule")
283
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
282
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
284
283
  """
285
284
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
286
285
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -288,12 +287,12 @@ class AuthBackendClientArgs:
288
287
  return pulumi.get(self, "rotation_schedule")
289
288
 
290
289
  @rotation_schedule.setter
291
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
290
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
292
291
  pulumi.set(self, "rotation_schedule", value)
293
292
 
294
- @property
293
+ @_builtins.property
295
294
  @pulumi.getter(name="rotationWindow")
296
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
295
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
297
296
  """
298
297
  The maximum amount of time in seconds allowed to complete
299
298
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -302,12 +301,12 @@ class AuthBackendClientArgs:
302
301
  return pulumi.get(self, "rotation_window")
303
302
 
304
303
  @rotation_window.setter
305
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
304
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
306
305
  pulumi.set(self, "rotation_window", value)
307
306
 
308
- @property
307
+ @_builtins.property
309
308
  @pulumi.getter(name="secretKey")
310
- def secret_key(self) -> Optional[pulumi.Input[builtins.str]]:
309
+ def secret_key(self) -> Optional[pulumi.Input[_builtins.str]]:
311
310
  """
312
311
  The AWS secret key that Vault should use for the
313
312
  auth backend.
@@ -315,12 +314,12 @@ class AuthBackendClientArgs:
315
314
  return pulumi.get(self, "secret_key")
316
315
 
317
316
  @secret_key.setter
318
- def secret_key(self, value: Optional[pulumi.Input[builtins.str]]):
317
+ def secret_key(self, value: Optional[pulumi.Input[_builtins.str]]):
319
318
  pulumi.set(self, "secret_key", value)
320
319
 
321
- @property
320
+ @_builtins.property
322
321
  @pulumi.getter(name="stsEndpoint")
323
- def sts_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
322
+ def sts_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
324
323
  """
325
324
  Override the URL Vault uses when making STS API
326
325
  calls.
@@ -328,12 +327,12 @@ class AuthBackendClientArgs:
328
327
  return pulumi.get(self, "sts_endpoint")
329
328
 
330
329
  @sts_endpoint.setter
331
- def sts_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
330
+ def sts_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
332
331
  pulumi.set(self, "sts_endpoint", value)
333
332
 
334
- @property
333
+ @_builtins.property
335
334
  @pulumi.getter(name="stsRegion")
336
- def sts_region(self) -> Optional[pulumi.Input[builtins.str]]:
335
+ def sts_region(self) -> Optional[pulumi.Input[_builtins.str]]:
337
336
  """
338
337
  Override the default region when making STS API
339
338
  calls. The `sts_endpoint` argument must be set when using `sts_region`.
@@ -341,12 +340,12 @@ class AuthBackendClientArgs:
341
340
  return pulumi.get(self, "sts_region")
342
341
 
343
342
  @sts_region.setter
344
- def sts_region(self, value: Optional[pulumi.Input[builtins.str]]):
343
+ def sts_region(self, value: Optional[pulumi.Input[_builtins.str]]):
345
344
  pulumi.set(self, "sts_region", value)
346
345
 
347
- @property
346
+ @_builtins.property
348
347
  @pulumi.getter(name="useStsRegionFromClient")
349
- def use_sts_region_from_client(self) -> Optional[pulumi.Input[builtins.bool]]:
348
+ def use_sts_region_from_client(self) -> Optional[pulumi.Input[_builtins.bool]]:
350
349
  """
351
350
  Available in Vault v1.15+. If set,
352
351
  overrides both `sts_endpoint` and `sts_region` to instead use the region
@@ -357,71 +356,71 @@ class AuthBackendClientArgs:
357
356
  return pulumi.get(self, "use_sts_region_from_client")
358
357
 
359
358
  @use_sts_region_from_client.setter
360
- def use_sts_region_from_client(self, value: Optional[pulumi.Input[builtins.bool]]):
359
+ def use_sts_region_from_client(self, value: Optional[pulumi.Input[_builtins.bool]]):
361
360
  pulumi.set(self, "use_sts_region_from_client", value)
362
361
 
363
362
 
364
363
  @pulumi.input_type
365
364
  class _AuthBackendClientState:
366
365
  def __init__(__self__, *,
367
- access_key: Optional[pulumi.Input[builtins.str]] = None,
368
- backend: Optional[pulumi.Input[builtins.str]] = None,
369
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
370
- ec2_endpoint: Optional[pulumi.Input[builtins.str]] = None,
371
- iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
372
- iam_server_id_header_value: Optional[pulumi.Input[builtins.str]] = None,
373
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
374
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
375
- max_retries: Optional[pulumi.Input[builtins.int]] = None,
376
- namespace: Optional[pulumi.Input[builtins.str]] = None,
377
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
378
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
379
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
380
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
381
- secret_key: Optional[pulumi.Input[builtins.str]] = None,
382
- sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
383
- sts_region: Optional[pulumi.Input[builtins.str]] = None,
384
- use_sts_region_from_client: Optional[pulumi.Input[builtins.bool]] = None):
366
+ access_key: Optional[pulumi.Input[_builtins.str]] = None,
367
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
368
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
369
+ ec2_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
370
+ iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
371
+ iam_server_id_header_value: Optional[pulumi.Input[_builtins.str]] = None,
372
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
373
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
374
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
375
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
376
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
377
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
378
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
379
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
380
+ secret_key: Optional[pulumi.Input[_builtins.str]] = None,
381
+ sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
382
+ sts_region: Optional[pulumi.Input[_builtins.str]] = None,
383
+ use_sts_region_from_client: Optional[pulumi.Input[_builtins.bool]] = None):
385
384
  """
386
385
  Input properties used for looking up and filtering AuthBackendClient resources.
387
- :param pulumi.Input[builtins.str] access_key: The AWS access key that Vault should use for the
386
+ :param pulumi.Input[_builtins.str] access_key: The AWS access key that Vault should use for the
388
387
  auth backend. Mutually exclusive with `identity_token_audience`.
389
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
388
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
390
389
  mounted at. Defaults to `aws`.
391
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
392
- :param pulumi.Input[builtins.str] ec2_endpoint: Override the URL Vault uses when making EC2 API
390
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
391
+ :param pulumi.Input[_builtins.str] ec2_endpoint: Override the URL Vault uses when making EC2 API
393
392
  calls.
394
- :param pulumi.Input[builtins.str] iam_endpoint: Override the URL Vault uses when making IAM API
393
+ :param pulumi.Input[_builtins.str] iam_endpoint: Override the URL Vault uses when making IAM API
395
394
  calls.
396
- :param pulumi.Input[builtins.str] iam_server_id_header_value: The value to require in the
395
+ :param pulumi.Input[_builtins.str] iam_server_id_header_value: The value to require in the
397
396
  `X-Vault-AWS-IAM-Server-ID` header as part of `GetCallerIdentity` requests
398
397
  that are used in the IAM auth method.
399
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
398
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
400
399
  Requires Vault 1.17+. *Available only for Vault Enterprise*
401
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
400
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
402
401
  *Available only for Vault Enterprise*
403
- :param pulumi.Input[builtins.int] max_retries: Number of max retries the client should use for recoverable errors.
402
+ :param pulumi.Input[_builtins.int] max_retries: Number of max retries the client should use for recoverable errors.
404
403
  The default `-1` falls back to the AWS SDK's default behavior.
405
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
404
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
406
405
  The value should not contain leading or trailing forward slashes.
407
406
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
408
407
  *Available only for Vault Enterprise*.
409
- :param pulumi.Input[builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
408
+ :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
410
409
  *Available only for Vault Enterprise*
411
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
410
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
412
411
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
413
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
412
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
414
413
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
415
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
414
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
416
415
  a rotation when a scheduled token rotation occurs. The default rotation window is
417
416
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
418
- :param pulumi.Input[builtins.str] secret_key: The AWS secret key that Vault should use for the
417
+ :param pulumi.Input[_builtins.str] secret_key: The AWS secret key that Vault should use for the
419
418
  auth backend.
420
- :param pulumi.Input[builtins.str] sts_endpoint: Override the URL Vault uses when making STS API
419
+ :param pulumi.Input[_builtins.str] sts_endpoint: Override the URL Vault uses when making STS API
421
420
  calls.
422
- :param pulumi.Input[builtins.str] sts_region: Override the default region when making STS API
421
+ :param pulumi.Input[_builtins.str] sts_region: Override the default region when making STS API
423
422
  calls. The `sts_endpoint` argument must be set when using `sts_region`.
424
- :param pulumi.Input[builtins.bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
423
+ :param pulumi.Input[_builtins.bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
425
424
  overrides both `sts_endpoint` and `sts_region` to instead use the region
426
425
  specified in the client request headers for IAM-based authentication.
427
426
  This can be useful when you have client requests coming from different
@@ -464,9 +463,9 @@ class _AuthBackendClientState:
464
463
  if use_sts_region_from_client is not None:
465
464
  pulumi.set(__self__, "use_sts_region_from_client", use_sts_region_from_client)
466
465
 
467
- @property
466
+ @_builtins.property
468
467
  @pulumi.getter(name="accessKey")
469
- def access_key(self) -> Optional[pulumi.Input[builtins.str]]:
468
+ def access_key(self) -> Optional[pulumi.Input[_builtins.str]]:
470
469
  """
471
470
  The AWS access key that Vault should use for the
472
471
  auth backend. Mutually exclusive with `identity_token_audience`.
@@ -474,12 +473,12 @@ class _AuthBackendClientState:
474
473
  return pulumi.get(self, "access_key")
475
474
 
476
475
  @access_key.setter
477
- def access_key(self, value: Optional[pulumi.Input[builtins.str]]):
476
+ def access_key(self, value: Optional[pulumi.Input[_builtins.str]]):
478
477
  pulumi.set(self, "access_key", value)
479
478
 
480
- @property
479
+ @_builtins.property
481
480
  @pulumi.getter
482
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
481
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
483
482
  """
484
483
  The path the AWS auth backend being configured was
485
484
  mounted at. Defaults to `aws`.
@@ -487,24 +486,24 @@ class _AuthBackendClientState:
487
486
  return pulumi.get(self, "backend")
488
487
 
489
488
  @backend.setter
490
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
489
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
491
490
  pulumi.set(self, "backend", value)
492
491
 
493
- @property
492
+ @_builtins.property
494
493
  @pulumi.getter(name="disableAutomatedRotation")
495
- def disable_automated_rotation(self) -> Optional[pulumi.Input[builtins.bool]]:
494
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
496
495
  """
497
496
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
498
497
  """
499
498
  return pulumi.get(self, "disable_automated_rotation")
500
499
 
501
500
  @disable_automated_rotation.setter
502
- def disable_automated_rotation(self, value: Optional[pulumi.Input[builtins.bool]]):
501
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
503
502
  pulumi.set(self, "disable_automated_rotation", value)
504
503
 
505
- @property
504
+ @_builtins.property
506
505
  @pulumi.getter(name="ec2Endpoint")
507
- def ec2_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
506
+ def ec2_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
508
507
  """
509
508
  Override the URL Vault uses when making EC2 API
510
509
  calls.
@@ -512,12 +511,12 @@ class _AuthBackendClientState:
512
511
  return pulumi.get(self, "ec2_endpoint")
513
512
 
514
513
  @ec2_endpoint.setter
515
- def ec2_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
514
+ def ec2_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
516
515
  pulumi.set(self, "ec2_endpoint", value)
517
516
 
518
- @property
517
+ @_builtins.property
519
518
  @pulumi.getter(name="iamEndpoint")
520
- def iam_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
519
+ def iam_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
521
520
  """
522
521
  Override the URL Vault uses when making IAM API
523
522
  calls.
@@ -525,12 +524,12 @@ class _AuthBackendClientState:
525
524
  return pulumi.get(self, "iam_endpoint")
526
525
 
527
526
  @iam_endpoint.setter
528
- def iam_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
527
+ def iam_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
529
528
  pulumi.set(self, "iam_endpoint", value)
530
529
 
531
- @property
530
+ @_builtins.property
532
531
  @pulumi.getter(name="iamServerIdHeaderValue")
533
- def iam_server_id_header_value(self) -> Optional[pulumi.Input[builtins.str]]:
532
+ def iam_server_id_header_value(self) -> Optional[pulumi.Input[_builtins.str]]:
534
533
  """
535
534
  The value to require in the
536
535
  `X-Vault-AWS-IAM-Server-ID` header as part of `GetCallerIdentity` requests
@@ -539,12 +538,12 @@ class _AuthBackendClientState:
539
538
  return pulumi.get(self, "iam_server_id_header_value")
540
539
 
541
540
  @iam_server_id_header_value.setter
542
- def iam_server_id_header_value(self, value: Optional[pulumi.Input[builtins.str]]):
541
+ def iam_server_id_header_value(self, value: Optional[pulumi.Input[_builtins.str]]):
543
542
  pulumi.set(self, "iam_server_id_header_value", value)
544
543
 
545
- @property
544
+ @_builtins.property
546
545
  @pulumi.getter(name="identityTokenAudience")
547
- def identity_token_audience(self) -> Optional[pulumi.Input[builtins.str]]:
546
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
548
547
  """
549
548
  The audience claim value. Mutually exclusive with `access_key`.
550
549
  Requires Vault 1.17+. *Available only for Vault Enterprise*
@@ -552,12 +551,12 @@ class _AuthBackendClientState:
552
551
  return pulumi.get(self, "identity_token_audience")
553
552
 
554
553
  @identity_token_audience.setter
555
- def identity_token_audience(self, value: Optional[pulumi.Input[builtins.str]]):
554
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
556
555
  pulumi.set(self, "identity_token_audience", value)
557
556
 
558
- @property
557
+ @_builtins.property
559
558
  @pulumi.getter(name="identityTokenTtl")
560
- def identity_token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
559
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
561
560
  """
562
561
  The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
563
562
  *Available only for Vault Enterprise*
@@ -565,12 +564,12 @@ class _AuthBackendClientState:
565
564
  return pulumi.get(self, "identity_token_ttl")
566
565
 
567
566
  @identity_token_ttl.setter
568
- def identity_token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
567
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
569
568
  pulumi.set(self, "identity_token_ttl", value)
570
569
 
571
- @property
570
+ @_builtins.property
572
571
  @pulumi.getter(name="maxRetries")
573
- def max_retries(self) -> Optional[pulumi.Input[builtins.int]]:
572
+ def max_retries(self) -> Optional[pulumi.Input[_builtins.int]]:
574
573
  """
575
574
  Number of max retries the client should use for recoverable errors.
576
575
  The default `-1` falls back to the AWS SDK's default behavior.
@@ -578,12 +577,12 @@ class _AuthBackendClientState:
578
577
  return pulumi.get(self, "max_retries")
579
578
 
580
579
  @max_retries.setter
581
- def max_retries(self, value: Optional[pulumi.Input[builtins.int]]):
580
+ def max_retries(self, value: Optional[pulumi.Input[_builtins.int]]):
582
581
  pulumi.set(self, "max_retries", value)
583
582
 
584
- @property
583
+ @_builtins.property
585
584
  @pulumi.getter
586
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
585
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
587
586
  """
588
587
  The namespace to provision the resource in.
589
588
  The value should not contain leading or trailing forward slashes.
@@ -593,12 +592,12 @@ class _AuthBackendClientState:
593
592
  return pulumi.get(self, "namespace")
594
593
 
595
594
  @namespace.setter
596
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
595
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
597
596
  pulumi.set(self, "namespace", value)
598
597
 
599
- @property
598
+ @_builtins.property
600
599
  @pulumi.getter(name="roleArn")
601
- def role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
600
+ def role_arn(self) -> Optional[pulumi.Input[_builtins.str]]:
602
601
  """
603
602
  Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
604
603
  *Available only for Vault Enterprise*
@@ -606,12 +605,12 @@ class _AuthBackendClientState:
606
605
  return pulumi.get(self, "role_arn")
607
606
 
608
607
  @role_arn.setter
609
- def role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
608
+ def role_arn(self, value: Optional[pulumi.Input[_builtins.str]]):
610
609
  pulumi.set(self, "role_arn", value)
611
610
 
612
- @property
611
+ @_builtins.property
613
612
  @pulumi.getter(name="rotationPeriod")
614
- def rotation_period(self) -> Optional[pulumi.Input[builtins.int]]:
613
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
615
614
  """
616
615
  The amount of time in seconds Vault should wait before rotating the root credential.
617
616
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
@@ -619,12 +618,12 @@ class _AuthBackendClientState:
619
618
  return pulumi.get(self, "rotation_period")
620
619
 
621
620
  @rotation_period.setter
622
- def rotation_period(self, value: Optional[pulumi.Input[builtins.int]]):
621
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
623
622
  pulumi.set(self, "rotation_period", value)
624
623
 
625
- @property
624
+ @_builtins.property
626
625
  @pulumi.getter(name="rotationSchedule")
627
- def rotation_schedule(self) -> Optional[pulumi.Input[builtins.str]]:
626
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
628
627
  """
629
628
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
630
629
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
@@ -632,12 +631,12 @@ class _AuthBackendClientState:
632
631
  return pulumi.get(self, "rotation_schedule")
633
632
 
634
633
  @rotation_schedule.setter
635
- def rotation_schedule(self, value: Optional[pulumi.Input[builtins.str]]):
634
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
636
635
  pulumi.set(self, "rotation_schedule", value)
637
636
 
638
- @property
637
+ @_builtins.property
639
638
  @pulumi.getter(name="rotationWindow")
640
- def rotation_window(self) -> Optional[pulumi.Input[builtins.int]]:
639
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
641
640
  """
642
641
  The maximum amount of time in seconds allowed to complete
643
642
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -646,12 +645,12 @@ class _AuthBackendClientState:
646
645
  return pulumi.get(self, "rotation_window")
647
646
 
648
647
  @rotation_window.setter
649
- def rotation_window(self, value: Optional[pulumi.Input[builtins.int]]):
648
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
650
649
  pulumi.set(self, "rotation_window", value)
651
650
 
652
- @property
651
+ @_builtins.property
653
652
  @pulumi.getter(name="secretKey")
654
- def secret_key(self) -> Optional[pulumi.Input[builtins.str]]:
653
+ def secret_key(self) -> Optional[pulumi.Input[_builtins.str]]:
655
654
  """
656
655
  The AWS secret key that Vault should use for the
657
656
  auth backend.
@@ -659,12 +658,12 @@ class _AuthBackendClientState:
659
658
  return pulumi.get(self, "secret_key")
660
659
 
661
660
  @secret_key.setter
662
- def secret_key(self, value: Optional[pulumi.Input[builtins.str]]):
661
+ def secret_key(self, value: Optional[pulumi.Input[_builtins.str]]):
663
662
  pulumi.set(self, "secret_key", value)
664
663
 
665
- @property
664
+ @_builtins.property
666
665
  @pulumi.getter(name="stsEndpoint")
667
- def sts_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
666
+ def sts_endpoint(self) -> Optional[pulumi.Input[_builtins.str]]:
668
667
  """
669
668
  Override the URL Vault uses when making STS API
670
669
  calls.
@@ -672,12 +671,12 @@ class _AuthBackendClientState:
672
671
  return pulumi.get(self, "sts_endpoint")
673
672
 
674
673
  @sts_endpoint.setter
675
- def sts_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
674
+ def sts_endpoint(self, value: Optional[pulumi.Input[_builtins.str]]):
676
675
  pulumi.set(self, "sts_endpoint", value)
677
676
 
678
- @property
677
+ @_builtins.property
679
678
  @pulumi.getter(name="stsRegion")
680
- def sts_region(self) -> Optional[pulumi.Input[builtins.str]]:
679
+ def sts_region(self) -> Optional[pulumi.Input[_builtins.str]]:
681
680
  """
682
681
  Override the default region when making STS API
683
682
  calls. The `sts_endpoint` argument must be set when using `sts_region`.
@@ -685,12 +684,12 @@ class _AuthBackendClientState:
685
684
  return pulumi.get(self, "sts_region")
686
685
 
687
686
  @sts_region.setter
688
- def sts_region(self, value: Optional[pulumi.Input[builtins.str]]):
687
+ def sts_region(self, value: Optional[pulumi.Input[_builtins.str]]):
689
688
  pulumi.set(self, "sts_region", value)
690
689
 
691
- @property
690
+ @_builtins.property
692
691
  @pulumi.getter(name="useStsRegionFromClient")
693
- def use_sts_region_from_client(self) -> Optional[pulumi.Input[builtins.bool]]:
692
+ def use_sts_region_from_client(self) -> Optional[pulumi.Input[_builtins.bool]]:
694
693
  """
695
694
  Available in Vault v1.15+. If set,
696
695
  overrides both `sts_endpoint` and `sts_region` to instead use the region
@@ -701,7 +700,7 @@ class _AuthBackendClientState:
701
700
  return pulumi.get(self, "use_sts_region_from_client")
702
701
 
703
702
  @use_sts_region_from_client.setter
704
- def use_sts_region_from_client(self, value: Optional[pulumi.Input[builtins.bool]]):
703
+ def use_sts_region_from_client(self, value: Optional[pulumi.Input[_builtins.bool]]):
705
704
  pulumi.set(self, "use_sts_region_from_client", value)
706
705
 
707
706
 
@@ -711,24 +710,24 @@ class AuthBackendClient(pulumi.CustomResource):
711
710
  def __init__(__self__,
712
711
  resource_name: str,
713
712
  opts: Optional[pulumi.ResourceOptions] = None,
714
- access_key: Optional[pulumi.Input[builtins.str]] = None,
715
- backend: Optional[pulumi.Input[builtins.str]] = None,
716
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
717
- ec2_endpoint: Optional[pulumi.Input[builtins.str]] = None,
718
- iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
719
- iam_server_id_header_value: Optional[pulumi.Input[builtins.str]] = None,
720
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
721
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
722
- max_retries: Optional[pulumi.Input[builtins.int]] = None,
723
- namespace: Optional[pulumi.Input[builtins.str]] = None,
724
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
725
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
726
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
727
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
728
- secret_key: Optional[pulumi.Input[builtins.str]] = None,
729
- sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
730
- sts_region: Optional[pulumi.Input[builtins.str]] = None,
731
- use_sts_region_from_client: Optional[pulumi.Input[builtins.bool]] = None,
713
+ access_key: Optional[pulumi.Input[_builtins.str]] = None,
714
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
715
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
716
+ ec2_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
717
+ iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
718
+ iam_server_id_header_value: Optional[pulumi.Input[_builtins.str]] = None,
719
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
720
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
721
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
722
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
723
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
724
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
725
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
726
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
727
+ secret_key: Optional[pulumi.Input[_builtins.str]] = None,
728
+ sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
729
+ sts_region: Optional[pulumi.Input[_builtins.str]] = None,
730
+ use_sts_region_from_client: Optional[pulumi.Input[_builtins.bool]] = None,
732
731
  __props__=None):
733
732
  """
734
733
  ## Example Usage
@@ -770,44 +769,44 @@ class AuthBackendClient(pulumi.CustomResource):
770
769
 
771
770
  :param str resource_name: The name of the resource.
772
771
  :param pulumi.ResourceOptions opts: Options for the resource.
773
- :param pulumi.Input[builtins.str] access_key: The AWS access key that Vault should use for the
772
+ :param pulumi.Input[_builtins.str] access_key: The AWS access key that Vault should use for the
774
773
  auth backend. Mutually exclusive with `identity_token_audience`.
775
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
774
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
776
775
  mounted at. Defaults to `aws`.
777
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
778
- :param pulumi.Input[builtins.str] ec2_endpoint: Override the URL Vault uses when making EC2 API
776
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
777
+ :param pulumi.Input[_builtins.str] ec2_endpoint: Override the URL Vault uses when making EC2 API
779
778
  calls.
780
- :param pulumi.Input[builtins.str] iam_endpoint: Override the URL Vault uses when making IAM API
779
+ :param pulumi.Input[_builtins.str] iam_endpoint: Override the URL Vault uses when making IAM API
781
780
  calls.
782
- :param pulumi.Input[builtins.str] iam_server_id_header_value: The value to require in the
781
+ :param pulumi.Input[_builtins.str] iam_server_id_header_value: The value to require in the
783
782
  `X-Vault-AWS-IAM-Server-ID` header as part of `GetCallerIdentity` requests
784
783
  that are used in the IAM auth method.
785
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
784
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
786
785
  Requires Vault 1.17+. *Available only for Vault Enterprise*
787
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
786
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
788
787
  *Available only for Vault Enterprise*
789
- :param pulumi.Input[builtins.int] max_retries: Number of max retries the client should use for recoverable errors.
788
+ :param pulumi.Input[_builtins.int] max_retries: Number of max retries the client should use for recoverable errors.
790
789
  The default `-1` falls back to the AWS SDK's default behavior.
791
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
790
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
792
791
  The value should not contain leading or trailing forward slashes.
793
792
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
794
793
  *Available only for Vault Enterprise*.
795
- :param pulumi.Input[builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
794
+ :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
796
795
  *Available only for Vault Enterprise*
797
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
796
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
798
797
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
799
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
798
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
800
799
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
801
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
800
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
802
801
  a rotation when a scheduled token rotation occurs. The default rotation window is
803
802
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
804
- :param pulumi.Input[builtins.str] secret_key: The AWS secret key that Vault should use for the
803
+ :param pulumi.Input[_builtins.str] secret_key: The AWS secret key that Vault should use for the
805
804
  auth backend.
806
- :param pulumi.Input[builtins.str] sts_endpoint: Override the URL Vault uses when making STS API
805
+ :param pulumi.Input[_builtins.str] sts_endpoint: Override the URL Vault uses when making STS API
807
806
  calls.
808
- :param pulumi.Input[builtins.str] sts_region: Override the default region when making STS API
807
+ :param pulumi.Input[_builtins.str] sts_region: Override the default region when making STS API
809
808
  calls. The `sts_endpoint` argument must be set when using `sts_region`.
810
- :param pulumi.Input[builtins.bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
809
+ :param pulumi.Input[_builtins.bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
811
810
  overrides both `sts_endpoint` and `sts_region` to instead use the region
812
811
  specified in the client request headers for IAM-based authentication.
813
812
  This can be useful when you have client requests coming from different
@@ -872,24 +871,24 @@ class AuthBackendClient(pulumi.CustomResource):
872
871
  def _internal_init(__self__,
873
872
  resource_name: str,
874
873
  opts: Optional[pulumi.ResourceOptions] = None,
875
- access_key: Optional[pulumi.Input[builtins.str]] = None,
876
- backend: Optional[pulumi.Input[builtins.str]] = None,
877
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
878
- ec2_endpoint: Optional[pulumi.Input[builtins.str]] = None,
879
- iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
880
- iam_server_id_header_value: Optional[pulumi.Input[builtins.str]] = None,
881
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
882
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
883
- max_retries: Optional[pulumi.Input[builtins.int]] = None,
884
- namespace: Optional[pulumi.Input[builtins.str]] = None,
885
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
886
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
887
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
888
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
889
- secret_key: Optional[pulumi.Input[builtins.str]] = None,
890
- sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
891
- sts_region: Optional[pulumi.Input[builtins.str]] = None,
892
- use_sts_region_from_client: Optional[pulumi.Input[builtins.bool]] = None,
874
+ access_key: Optional[pulumi.Input[_builtins.str]] = None,
875
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
876
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
877
+ ec2_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
878
+ iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
879
+ iam_server_id_header_value: Optional[pulumi.Input[_builtins.str]] = None,
880
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
881
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
882
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
883
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
884
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
885
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
886
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
887
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
888
+ secret_key: Optional[pulumi.Input[_builtins.str]] = None,
889
+ sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
890
+ sts_region: Optional[pulumi.Input[_builtins.str]] = None,
891
+ use_sts_region_from_client: Optional[pulumi.Input[_builtins.bool]] = None,
893
892
  __props__=None):
894
893
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
895
894
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -929,24 +928,24 @@ class AuthBackendClient(pulumi.CustomResource):
929
928
  def get(resource_name: str,
930
929
  id: pulumi.Input[str],
931
930
  opts: Optional[pulumi.ResourceOptions] = None,
932
- access_key: Optional[pulumi.Input[builtins.str]] = None,
933
- backend: Optional[pulumi.Input[builtins.str]] = None,
934
- disable_automated_rotation: Optional[pulumi.Input[builtins.bool]] = None,
935
- ec2_endpoint: Optional[pulumi.Input[builtins.str]] = None,
936
- iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
937
- iam_server_id_header_value: Optional[pulumi.Input[builtins.str]] = None,
938
- identity_token_audience: Optional[pulumi.Input[builtins.str]] = None,
939
- identity_token_ttl: Optional[pulumi.Input[builtins.int]] = None,
940
- max_retries: Optional[pulumi.Input[builtins.int]] = None,
941
- namespace: Optional[pulumi.Input[builtins.str]] = None,
942
- role_arn: Optional[pulumi.Input[builtins.str]] = None,
943
- rotation_period: Optional[pulumi.Input[builtins.int]] = None,
944
- rotation_schedule: Optional[pulumi.Input[builtins.str]] = None,
945
- rotation_window: Optional[pulumi.Input[builtins.int]] = None,
946
- secret_key: Optional[pulumi.Input[builtins.str]] = None,
947
- sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
948
- sts_region: Optional[pulumi.Input[builtins.str]] = None,
949
- use_sts_region_from_client: Optional[pulumi.Input[builtins.bool]] = None) -> 'AuthBackendClient':
931
+ access_key: Optional[pulumi.Input[_builtins.str]] = None,
932
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
933
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
934
+ ec2_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
935
+ iam_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
936
+ iam_server_id_header_value: Optional[pulumi.Input[_builtins.str]] = None,
937
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
938
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
939
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
940
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
941
+ role_arn: Optional[pulumi.Input[_builtins.str]] = None,
942
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
943
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
944
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
945
+ secret_key: Optional[pulumi.Input[_builtins.str]] = None,
946
+ sts_endpoint: Optional[pulumi.Input[_builtins.str]] = None,
947
+ sts_region: Optional[pulumi.Input[_builtins.str]] = None,
948
+ use_sts_region_from_client: Optional[pulumi.Input[_builtins.bool]] = None) -> 'AuthBackendClient':
950
949
  """
951
950
  Get an existing AuthBackendClient resource's state with the given name, id, and optional extra
952
951
  properties used to qualify the lookup.
@@ -954,44 +953,44 @@ class AuthBackendClient(pulumi.CustomResource):
954
953
  :param str resource_name: The unique name of the resulting resource.
955
954
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
956
955
  :param pulumi.ResourceOptions opts: Options for the resource.
957
- :param pulumi.Input[builtins.str] access_key: The AWS access key that Vault should use for the
956
+ :param pulumi.Input[_builtins.str] access_key: The AWS access key that Vault should use for the
958
957
  auth backend. Mutually exclusive with `identity_token_audience`.
959
- :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
958
+ :param pulumi.Input[_builtins.str] backend: The path the AWS auth backend being configured was
960
959
  mounted at. Defaults to `aws`.
961
- :param pulumi.Input[builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
962
- :param pulumi.Input[builtins.str] ec2_endpoint: Override the URL Vault uses when making EC2 API
960
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
961
+ :param pulumi.Input[_builtins.str] ec2_endpoint: Override the URL Vault uses when making EC2 API
963
962
  calls.
964
- :param pulumi.Input[builtins.str] iam_endpoint: Override the URL Vault uses when making IAM API
963
+ :param pulumi.Input[_builtins.str] iam_endpoint: Override the URL Vault uses when making IAM API
965
964
  calls.
966
- :param pulumi.Input[builtins.str] iam_server_id_header_value: The value to require in the
965
+ :param pulumi.Input[_builtins.str] iam_server_id_header_value: The value to require in the
967
966
  `X-Vault-AWS-IAM-Server-ID` header as part of `GetCallerIdentity` requests
968
967
  that are used in the IAM auth method.
969
- :param pulumi.Input[builtins.str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
968
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value. Mutually exclusive with `access_key`.
970
969
  Requires Vault 1.17+. *Available only for Vault Enterprise*
971
- :param pulumi.Input[builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
970
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
972
971
  *Available only for Vault Enterprise*
973
- :param pulumi.Input[builtins.int] max_retries: Number of max retries the client should use for recoverable errors.
972
+ :param pulumi.Input[_builtins.int] max_retries: Number of max retries the client should use for recoverable errors.
974
973
  The default `-1` falls back to the AWS SDK's default behavior.
975
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
974
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
976
975
  The value should not contain leading or trailing forward slashes.
977
976
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
978
977
  *Available only for Vault Enterprise*.
979
- :param pulumi.Input[builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
978
+ :param pulumi.Input[_builtins.str] role_arn: Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
980
979
  *Available only for Vault Enterprise*
981
- :param pulumi.Input[builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
980
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
982
981
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
983
- :param pulumi.Input[builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
982
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
984
983
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
985
- :param pulumi.Input[builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
984
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
986
985
  a rotation when a scheduled token rotation occurs. The default rotation window is
987
986
  unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
988
- :param pulumi.Input[builtins.str] secret_key: The AWS secret key that Vault should use for the
987
+ :param pulumi.Input[_builtins.str] secret_key: The AWS secret key that Vault should use for the
989
988
  auth backend.
990
- :param pulumi.Input[builtins.str] sts_endpoint: Override the URL Vault uses when making STS API
989
+ :param pulumi.Input[_builtins.str] sts_endpoint: Override the URL Vault uses when making STS API
991
990
  calls.
992
- :param pulumi.Input[builtins.str] sts_region: Override the default region when making STS API
991
+ :param pulumi.Input[_builtins.str] sts_region: Override the default region when making STS API
993
992
  calls. The `sts_endpoint` argument must be set when using `sts_region`.
994
- :param pulumi.Input[builtins.bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
993
+ :param pulumi.Input[_builtins.bool] use_sts_region_from_client: Available in Vault v1.15+. If set,
995
994
  overrides both `sts_endpoint` and `sts_region` to instead use the region
996
995
  specified in the client request headers for IAM-based authentication.
997
996
  This can be useful when you have client requests coming from different
@@ -1021,53 +1020,53 @@ class AuthBackendClient(pulumi.CustomResource):
1021
1020
  __props__.__dict__["use_sts_region_from_client"] = use_sts_region_from_client
1022
1021
  return AuthBackendClient(resource_name, opts=opts, __props__=__props__)
1023
1022
 
1024
- @property
1023
+ @_builtins.property
1025
1024
  @pulumi.getter(name="accessKey")
1026
- def access_key(self) -> pulumi.Output[Optional[builtins.str]]:
1025
+ def access_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1027
1026
  """
1028
1027
  The AWS access key that Vault should use for the
1029
1028
  auth backend. Mutually exclusive with `identity_token_audience`.
1030
1029
  """
1031
1030
  return pulumi.get(self, "access_key")
1032
1031
 
1033
- @property
1032
+ @_builtins.property
1034
1033
  @pulumi.getter
1035
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
1034
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
1036
1035
  """
1037
1036
  The path the AWS auth backend being configured was
1038
1037
  mounted at. Defaults to `aws`.
1039
1038
  """
1040
1039
  return pulumi.get(self, "backend")
1041
1040
 
1042
- @property
1041
+ @_builtins.property
1043
1042
  @pulumi.getter(name="disableAutomatedRotation")
1044
- def disable_automated_rotation(self) -> pulumi.Output[Optional[builtins.bool]]:
1043
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
1045
1044
  """
1046
1045
  Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
1047
1046
  """
1048
1047
  return pulumi.get(self, "disable_automated_rotation")
1049
1048
 
1050
- @property
1049
+ @_builtins.property
1051
1050
  @pulumi.getter(name="ec2Endpoint")
1052
- def ec2_endpoint(self) -> pulumi.Output[Optional[builtins.str]]:
1051
+ def ec2_endpoint(self) -> pulumi.Output[Optional[_builtins.str]]:
1053
1052
  """
1054
1053
  Override the URL Vault uses when making EC2 API
1055
1054
  calls.
1056
1055
  """
1057
1056
  return pulumi.get(self, "ec2_endpoint")
1058
1057
 
1059
- @property
1058
+ @_builtins.property
1060
1059
  @pulumi.getter(name="iamEndpoint")
1061
- def iam_endpoint(self) -> pulumi.Output[Optional[builtins.str]]:
1060
+ def iam_endpoint(self) -> pulumi.Output[Optional[_builtins.str]]:
1062
1061
  """
1063
1062
  Override the URL Vault uses when making IAM API
1064
1063
  calls.
1065
1064
  """
1066
1065
  return pulumi.get(self, "iam_endpoint")
1067
1066
 
1068
- @property
1067
+ @_builtins.property
1069
1068
  @pulumi.getter(name="iamServerIdHeaderValue")
1070
- def iam_server_id_header_value(self) -> pulumi.Output[Optional[builtins.str]]:
1069
+ def iam_server_id_header_value(self) -> pulumi.Output[Optional[_builtins.str]]:
1071
1070
  """
1072
1071
  The value to require in the
1073
1072
  `X-Vault-AWS-IAM-Server-ID` header as part of `GetCallerIdentity` requests
@@ -1075,36 +1074,36 @@ class AuthBackendClient(pulumi.CustomResource):
1075
1074
  """
1076
1075
  return pulumi.get(self, "iam_server_id_header_value")
1077
1076
 
1078
- @property
1077
+ @_builtins.property
1079
1078
  @pulumi.getter(name="identityTokenAudience")
1080
- def identity_token_audience(self) -> pulumi.Output[Optional[builtins.str]]:
1079
+ def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
1081
1080
  """
1082
1081
  The audience claim value. Mutually exclusive with `access_key`.
1083
1082
  Requires Vault 1.17+. *Available only for Vault Enterprise*
1084
1083
  """
1085
1084
  return pulumi.get(self, "identity_token_audience")
1086
1085
 
1087
- @property
1086
+ @_builtins.property
1088
1087
  @pulumi.getter(name="identityTokenTtl")
1089
- def identity_token_ttl(self) -> pulumi.Output[builtins.int]:
1088
+ def identity_token_ttl(self) -> pulumi.Output[_builtins.int]:
1090
1089
  """
1091
1090
  The TTL of generated identity tokens in seconds. Requires Vault 1.17+.
1092
1091
  *Available only for Vault Enterprise*
1093
1092
  """
1094
1093
  return pulumi.get(self, "identity_token_ttl")
1095
1094
 
1096
- @property
1095
+ @_builtins.property
1097
1096
  @pulumi.getter(name="maxRetries")
1098
- def max_retries(self) -> pulumi.Output[Optional[builtins.int]]:
1097
+ def max_retries(self) -> pulumi.Output[Optional[_builtins.int]]:
1099
1098
  """
1100
1099
  Number of max retries the client should use for recoverable errors.
1101
1100
  The default `-1` falls back to the AWS SDK's default behavior.
1102
1101
  """
1103
1102
  return pulumi.get(self, "max_retries")
1104
1103
 
1105
- @property
1104
+ @_builtins.property
1106
1105
  @pulumi.getter
1107
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1106
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1108
1107
  """
1109
1108
  The namespace to provision the resource in.
1110
1109
  The value should not contain leading or trailing forward slashes.
@@ -1113,36 +1112,36 @@ class AuthBackendClient(pulumi.CustomResource):
1113
1112
  """
1114
1113
  return pulumi.get(self, "namespace")
1115
1114
 
1116
- @property
1115
+ @_builtins.property
1117
1116
  @pulumi.getter(name="roleArn")
1118
- def role_arn(self) -> pulumi.Output[Optional[builtins.str]]:
1117
+ def role_arn(self) -> pulumi.Output[Optional[_builtins.str]]:
1119
1118
  """
1120
1119
  Role ARN to assume for plugin identity token federation. Requires Vault 1.17+.
1121
1120
  *Available only for Vault Enterprise*
1122
1121
  """
1123
1122
  return pulumi.get(self, "role_arn")
1124
1123
 
1125
- @property
1124
+ @_builtins.property
1126
1125
  @pulumi.getter(name="rotationPeriod")
1127
- def rotation_period(self) -> pulumi.Output[Optional[builtins.int]]:
1126
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1128
1127
  """
1129
1128
  The amount of time in seconds Vault should wait before rotating the root credential.
1130
1129
  A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1131
1130
  """
1132
1131
  return pulumi.get(self, "rotation_period")
1133
1132
 
1134
- @property
1133
+ @_builtins.property
1135
1134
  @pulumi.getter(name="rotationSchedule")
1136
- def rotation_schedule(self) -> pulumi.Output[Optional[builtins.str]]:
1135
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
1137
1136
  """
1138
1137
  The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1139
1138
  defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1140
1139
  """
1141
1140
  return pulumi.get(self, "rotation_schedule")
1142
1141
 
1143
- @property
1142
+ @_builtins.property
1144
1143
  @pulumi.getter(name="rotationWindow")
1145
- def rotation_window(self) -> pulumi.Output[Optional[builtins.int]]:
1144
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
1146
1145
  """
1147
1146
  The maximum amount of time in seconds allowed to complete
1148
1147
  a rotation when a scheduled token rotation occurs. The default rotation window is
@@ -1150,36 +1149,36 @@ class AuthBackendClient(pulumi.CustomResource):
1150
1149
  """
1151
1150
  return pulumi.get(self, "rotation_window")
1152
1151
 
1153
- @property
1152
+ @_builtins.property
1154
1153
  @pulumi.getter(name="secretKey")
1155
- def secret_key(self) -> pulumi.Output[Optional[builtins.str]]:
1154
+ def secret_key(self) -> pulumi.Output[Optional[_builtins.str]]:
1156
1155
  """
1157
1156
  The AWS secret key that Vault should use for the
1158
1157
  auth backend.
1159
1158
  """
1160
1159
  return pulumi.get(self, "secret_key")
1161
1160
 
1162
- @property
1161
+ @_builtins.property
1163
1162
  @pulumi.getter(name="stsEndpoint")
1164
- def sts_endpoint(self) -> pulumi.Output[Optional[builtins.str]]:
1163
+ def sts_endpoint(self) -> pulumi.Output[Optional[_builtins.str]]:
1165
1164
  """
1166
1165
  Override the URL Vault uses when making STS API
1167
1166
  calls.
1168
1167
  """
1169
1168
  return pulumi.get(self, "sts_endpoint")
1170
1169
 
1171
- @property
1170
+ @_builtins.property
1172
1171
  @pulumi.getter(name="stsRegion")
1173
- def sts_region(self) -> pulumi.Output[Optional[builtins.str]]:
1172
+ def sts_region(self) -> pulumi.Output[Optional[_builtins.str]]:
1174
1173
  """
1175
1174
  Override the default region when making STS API
1176
1175
  calls. The `sts_endpoint` argument must be set when using `sts_region`.
1177
1176
  """
1178
1177
  return pulumi.get(self, "sts_region")
1179
1178
 
1180
- @property
1179
+ @_builtins.property
1181
1180
  @pulumi.getter(name="useStsRegionFromClient")
1182
- def use_sts_region_from_client(self) -> pulumi.Output[builtins.bool]:
1181
+ def use_sts_region_from_client(self) -> pulumi.Output[_builtins.bool]:
1183
1182
  """
1184
1183
  Available in Vault v1.15+. If set,
1185
1184
  overrides both `sts_endpoint` and `sts_region` to instead use the region