pulumi-vault 6.6.0a1741415971__py3-none-any.whl → 6.7.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +9 -0
  2. pulumi_vault/_inputs.py +583 -562
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +425 -200
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +523 -306
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +288 -70
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +383 -130
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +432 -186
  38. pulumi_vault/azure/backend_role.py +188 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +3857 -2200
  53. pulumi_vault/database/outputs.py +2483 -1330
  54. pulumi_vault/database/secret_backend_connection.py +333 -112
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +283 -140
  57. pulumi_vault/database/secrets_mount.py +275 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +426 -205
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +420 -179
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +68 -18
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +754 -533
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +720 -499
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +73 -60
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +3 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -36
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +174 -126
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1377 -0
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +152 -104
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +278 -0
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +35 -17
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +139 -25
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -31
  191. pulumi_vault/pkisecret/secret_backend_cert.py +439 -297
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +237 -182
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +520 -378
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +441 -175
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +894 -644
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +851 -427
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +936 -357
  203. pulumi_vault/pkisecret/secret_backend_sign.py +347 -252
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +2 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +295 -0
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +96 -95
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +3 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +325 -0
  257. pulumi_vault/transit/get_verify.py +355 -0
  258. pulumi_vault/transit/secret_backend_key.py +394 -231
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/METADATA +2 -2
  261. pulumi_vault-6.7.0.dist-info/RECORD +265 -0
  262. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/WHEEL +1 -1
  263. pulumi_vault-6.6.0a1741415971.dist-info/RECORD +0 -260
  264. {pulumi_vault-6.6.0a1741415971.dist-info → pulumi_vault-6.7.0.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,49 +20,49 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
19
20
  @pulumi.input_type
20
21
  class AuthBackendRoleArgs:
21
22
  def __init__(__self__, *,
22
- role_name: pulumi.Input[str],
23
- allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
24
- allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
- allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
26
- disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
27
- disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
28
- namespace: Optional[pulumi.Input[str]] = None,
29
- orphan: Optional[pulumi.Input[bool]] = None,
30
- path_suffix: Optional[pulumi.Input[str]] = None,
31
- renewable: Optional[pulumi.Input[bool]] = None,
32
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
33
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
34
- token_max_ttl: Optional[pulumi.Input[int]] = None,
35
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
36
- token_num_uses: Optional[pulumi.Input[int]] = None,
37
- token_period: Optional[pulumi.Input[int]] = None,
38
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
39
- token_ttl: Optional[pulumi.Input[int]] = None,
40
- token_type: Optional[pulumi.Input[str]] = None):
23
+ role_name: pulumi.Input[builtins.str],
24
+ allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
25
+ allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
+ allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
+ disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
+ disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
29
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
30
+ orphan: Optional[pulumi.Input[builtins.bool]] = None,
31
+ path_suffix: Optional[pulumi.Input[builtins.str]] = None,
32
+ renewable: Optional[pulumi.Input[builtins.bool]] = None,
33
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
34
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
35
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
36
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
37
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
38
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
39
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
40
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
41
+ token_type: Optional[pulumi.Input[builtins.str]] = None):
41
42
  """
42
43
  The set of arguments for constructing a AuthBackendRole resource.
43
- :param pulumi.Input[str] role_name: The name of the role.
44
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_entity_aliases: List of allowed entity aliases.
45
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies: List of allowed policies for given role.
46
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
47
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies: List of disallowed policies for given role.
48
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
49
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
44
+ :param pulumi.Input[builtins.str] role_name: The name of the role.
45
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
46
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies: List of allowed policies for given role.
47
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
48
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies: List of disallowed policies for given role.
49
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
50
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
50
51
  The value should not contain leading or trailing forward slashes.
51
52
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
52
53
  *Available only for Vault Enterprise*.
53
- :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
54
- :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
55
- :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
56
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
57
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
58
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
59
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
60
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
61
- :param pulumi.Input[int] token_period: Generated Token's Period
62
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
63
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
64
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
54
+ :param pulumi.Input[builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
55
+ :param pulumi.Input[builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
56
+ :param pulumi.Input[builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
57
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
58
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
59
+ :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
60
+ :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
61
+ :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
62
+ :param pulumi.Input[builtins.int] token_period: Generated Token's Period
63
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
64
+ :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
65
+ :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
65
66
  """
66
67
  pulumi.set(__self__, "role_name", role_name)
67
68
  if allowed_entity_aliases is not None:
@@ -103,79 +104,79 @@ class AuthBackendRoleArgs:
103
104
 
104
105
  @property
105
106
  @pulumi.getter(name="roleName")
106
- def role_name(self) -> pulumi.Input[str]:
107
+ def role_name(self) -> pulumi.Input[builtins.str]:
107
108
  """
108
109
  The name of the role.
109
110
  """
110
111
  return pulumi.get(self, "role_name")
111
112
 
112
113
  @role_name.setter
113
- def role_name(self, value: pulumi.Input[str]):
114
+ def role_name(self, value: pulumi.Input[builtins.str]):
114
115
  pulumi.set(self, "role_name", value)
115
116
 
116
117
  @property
117
118
  @pulumi.getter(name="allowedEntityAliases")
118
- def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
119
+ def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
119
120
  """
120
121
  List of allowed entity aliases.
121
122
  """
122
123
  return pulumi.get(self, "allowed_entity_aliases")
123
124
 
124
125
  @allowed_entity_aliases.setter
125
- def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
126
+ def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
126
127
  pulumi.set(self, "allowed_entity_aliases", value)
127
128
 
128
129
  @property
129
130
  @pulumi.getter(name="allowedPolicies")
130
- def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
131
+ def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
131
132
  """
132
133
  List of allowed policies for given role.
133
134
  """
134
135
  return pulumi.get(self, "allowed_policies")
135
136
 
136
137
  @allowed_policies.setter
137
- def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
138
+ def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
138
139
  pulumi.set(self, "allowed_policies", value)
139
140
 
140
141
  @property
141
142
  @pulumi.getter(name="allowedPoliciesGlobs")
142
- def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
143
+ def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
143
144
  """
144
145
  Set of allowed policies with glob match for given role.
145
146
  """
146
147
  return pulumi.get(self, "allowed_policies_globs")
147
148
 
148
149
  @allowed_policies_globs.setter
149
- def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
150
+ def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
150
151
  pulumi.set(self, "allowed_policies_globs", value)
151
152
 
152
153
  @property
153
154
  @pulumi.getter(name="disallowedPolicies")
154
- def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
155
+ def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
155
156
  """
156
157
  List of disallowed policies for given role.
157
158
  """
158
159
  return pulumi.get(self, "disallowed_policies")
159
160
 
160
161
  @disallowed_policies.setter
161
- def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
162
+ def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
162
163
  pulumi.set(self, "disallowed_policies", value)
163
164
 
164
165
  @property
165
166
  @pulumi.getter(name="disallowedPoliciesGlobs")
166
- def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
167
+ def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
167
168
  """
168
169
  Set of disallowed policies with glob match for given role.
169
170
  """
170
171
  return pulumi.get(self, "disallowed_policies_globs")
171
172
 
172
173
  @disallowed_policies_globs.setter
173
- def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
174
+ def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
174
175
  pulumi.set(self, "disallowed_policies_globs", value)
175
176
 
176
177
  @property
177
178
  @pulumi.getter
178
- def namespace(self) -> Optional[pulumi.Input[str]]:
179
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
179
180
  """
180
181
  The namespace to provision the resource in.
181
182
  The value should not contain leading or trailing forward slashes.
@@ -185,200 +186,200 @@ class AuthBackendRoleArgs:
185
186
  return pulumi.get(self, "namespace")
186
187
 
187
188
  @namespace.setter
188
- def namespace(self, value: Optional[pulumi.Input[str]]):
189
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
189
190
  pulumi.set(self, "namespace", value)
190
191
 
191
192
  @property
192
193
  @pulumi.getter
193
- def orphan(self) -> Optional[pulumi.Input[bool]]:
194
+ def orphan(self) -> Optional[pulumi.Input[builtins.bool]]:
194
195
  """
195
196
  If true, tokens created against this policy will be orphan tokens.
196
197
  """
197
198
  return pulumi.get(self, "orphan")
198
199
 
199
200
  @orphan.setter
200
- def orphan(self, value: Optional[pulumi.Input[bool]]):
201
+ def orphan(self, value: Optional[pulumi.Input[builtins.bool]]):
201
202
  pulumi.set(self, "orphan", value)
202
203
 
203
204
  @property
204
205
  @pulumi.getter(name="pathSuffix")
205
- def path_suffix(self) -> Optional[pulumi.Input[str]]:
206
+ def path_suffix(self) -> Optional[pulumi.Input[builtins.str]]:
206
207
  """
207
208
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
208
209
  """
209
210
  return pulumi.get(self, "path_suffix")
210
211
 
211
212
  @path_suffix.setter
212
- def path_suffix(self, value: Optional[pulumi.Input[str]]):
213
+ def path_suffix(self, value: Optional[pulumi.Input[builtins.str]]):
213
214
  pulumi.set(self, "path_suffix", value)
214
215
 
215
216
  @property
216
217
  @pulumi.getter
217
- def renewable(self) -> Optional[pulumi.Input[bool]]:
218
+ def renewable(self) -> Optional[pulumi.Input[builtins.bool]]:
218
219
  """
219
220
  Whether to disable the ability of the token to be renewed past its initial TTL.
220
221
  """
221
222
  return pulumi.get(self, "renewable")
222
223
 
223
224
  @renewable.setter
224
- def renewable(self, value: Optional[pulumi.Input[bool]]):
225
+ def renewable(self, value: Optional[pulumi.Input[builtins.bool]]):
225
226
  pulumi.set(self, "renewable", value)
226
227
 
227
228
  @property
228
229
  @pulumi.getter(name="tokenBoundCidrs")
229
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
230
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
230
231
  """
231
232
  Specifies the blocks of IP addresses which are allowed to use the generated token
232
233
  """
233
234
  return pulumi.get(self, "token_bound_cidrs")
234
235
 
235
236
  @token_bound_cidrs.setter
236
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
237
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
237
238
  pulumi.set(self, "token_bound_cidrs", value)
238
239
 
239
240
  @property
240
241
  @pulumi.getter(name="tokenExplicitMaxTtl")
241
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
242
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
242
243
  """
243
244
  Generated Token's Explicit Maximum TTL in seconds
244
245
  """
245
246
  return pulumi.get(self, "token_explicit_max_ttl")
246
247
 
247
248
  @token_explicit_max_ttl.setter
248
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
249
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
249
250
  pulumi.set(self, "token_explicit_max_ttl", value)
250
251
 
251
252
  @property
252
253
  @pulumi.getter(name="tokenMaxTtl")
253
- def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
254
+ def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
254
255
  """
255
256
  The maximum lifetime of the generated token
256
257
  """
257
258
  return pulumi.get(self, "token_max_ttl")
258
259
 
259
260
  @token_max_ttl.setter
260
- def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
261
+ def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
261
262
  pulumi.set(self, "token_max_ttl", value)
262
263
 
263
264
  @property
264
265
  @pulumi.getter(name="tokenNoDefaultPolicy")
265
- def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
266
+ def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
266
267
  """
267
268
  If true, the 'default' policy will not automatically be added to generated tokens
268
269
  """
269
270
  return pulumi.get(self, "token_no_default_policy")
270
271
 
271
272
  @token_no_default_policy.setter
272
- def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
273
+ def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
273
274
  pulumi.set(self, "token_no_default_policy", value)
274
275
 
275
276
  @property
276
277
  @pulumi.getter(name="tokenNumUses")
277
- def token_num_uses(self) -> Optional[pulumi.Input[int]]:
278
+ def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
278
279
  """
279
280
  The maximum number of times a token may be used, a value of zero means unlimited
280
281
  """
281
282
  return pulumi.get(self, "token_num_uses")
282
283
 
283
284
  @token_num_uses.setter
284
- def token_num_uses(self, value: Optional[pulumi.Input[int]]):
285
+ def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
285
286
  pulumi.set(self, "token_num_uses", value)
286
287
 
287
288
  @property
288
289
  @pulumi.getter(name="tokenPeriod")
289
- def token_period(self) -> Optional[pulumi.Input[int]]:
290
+ def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
290
291
  """
291
292
  Generated Token's Period
292
293
  """
293
294
  return pulumi.get(self, "token_period")
294
295
 
295
296
  @token_period.setter
296
- def token_period(self, value: Optional[pulumi.Input[int]]):
297
+ def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
297
298
  pulumi.set(self, "token_period", value)
298
299
 
299
300
  @property
300
301
  @pulumi.getter(name="tokenPolicies")
301
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
302
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
302
303
  """
303
304
  Generated Token's Policies
304
305
  """
305
306
  return pulumi.get(self, "token_policies")
306
307
 
307
308
  @token_policies.setter
308
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
309
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
309
310
  pulumi.set(self, "token_policies", value)
310
311
 
311
312
  @property
312
313
  @pulumi.getter(name="tokenTtl")
313
- def token_ttl(self) -> Optional[pulumi.Input[int]]:
314
+ def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
314
315
  """
315
316
  The initial ttl of the token to generate in seconds
316
317
  """
317
318
  return pulumi.get(self, "token_ttl")
318
319
 
319
320
  @token_ttl.setter
320
- def token_ttl(self, value: Optional[pulumi.Input[int]]):
321
+ def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
321
322
  pulumi.set(self, "token_ttl", value)
322
323
 
323
324
  @property
324
325
  @pulumi.getter(name="tokenType")
325
- def token_type(self) -> Optional[pulumi.Input[str]]:
326
+ def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
326
327
  """
327
328
  The type of token to generate, service or batch
328
329
  """
329
330
  return pulumi.get(self, "token_type")
330
331
 
331
332
  @token_type.setter
332
- def token_type(self, value: Optional[pulumi.Input[str]]):
333
+ def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
333
334
  pulumi.set(self, "token_type", value)
334
335
 
335
336
 
336
337
  @pulumi.input_type
337
338
  class _AuthBackendRoleState:
338
339
  def __init__(__self__, *,
339
- allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
340
- allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
341
- allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
342
- disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
343
- disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
344
- namespace: Optional[pulumi.Input[str]] = None,
345
- orphan: Optional[pulumi.Input[bool]] = None,
346
- path_suffix: Optional[pulumi.Input[str]] = None,
347
- renewable: Optional[pulumi.Input[bool]] = None,
348
- role_name: Optional[pulumi.Input[str]] = None,
349
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
350
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
351
- token_max_ttl: Optional[pulumi.Input[int]] = None,
352
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
353
- token_num_uses: Optional[pulumi.Input[int]] = None,
354
- token_period: Optional[pulumi.Input[int]] = None,
355
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
356
- token_ttl: Optional[pulumi.Input[int]] = None,
357
- token_type: Optional[pulumi.Input[str]] = None):
340
+ allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
341
+ allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
342
+ allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
343
+ disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
344
+ disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
345
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
346
+ orphan: Optional[pulumi.Input[builtins.bool]] = None,
347
+ path_suffix: Optional[pulumi.Input[builtins.str]] = None,
348
+ renewable: Optional[pulumi.Input[builtins.bool]] = None,
349
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
350
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
351
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
352
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
353
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
354
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
355
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
356
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
357
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
358
+ token_type: Optional[pulumi.Input[builtins.str]] = None):
358
359
  """
359
360
  Input properties used for looking up and filtering AuthBackendRole resources.
360
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_entity_aliases: List of allowed entity aliases.
361
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies: List of allowed policies for given role.
362
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
363
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies: List of disallowed policies for given role.
364
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
365
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
361
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
362
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies: List of allowed policies for given role.
363
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
364
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies: List of disallowed policies for given role.
365
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
366
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
366
367
  The value should not contain leading or trailing forward slashes.
367
368
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
368
369
  *Available only for Vault Enterprise*.
369
- :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
370
- :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
371
- :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
372
- :param pulumi.Input[str] role_name: The name of the role.
373
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
374
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
375
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
376
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
377
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
378
- :param pulumi.Input[int] token_period: Generated Token's Period
379
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
380
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
381
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
370
+ :param pulumi.Input[builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
371
+ :param pulumi.Input[builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
372
+ :param pulumi.Input[builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
373
+ :param pulumi.Input[builtins.str] role_name: The name of the role.
374
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
375
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
376
+ :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
377
+ :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
378
+ :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
379
+ :param pulumi.Input[builtins.int] token_period: Generated Token's Period
380
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
381
+ :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
382
+ :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
382
383
  """
383
384
  if allowed_entity_aliases is not None:
384
385
  pulumi.set(__self__, "allowed_entity_aliases", allowed_entity_aliases)
@@ -421,67 +422,67 @@ class _AuthBackendRoleState:
421
422
 
422
423
  @property
423
424
  @pulumi.getter(name="allowedEntityAliases")
424
- def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
425
+ def allowed_entity_aliases(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
425
426
  """
426
427
  List of allowed entity aliases.
427
428
  """
428
429
  return pulumi.get(self, "allowed_entity_aliases")
429
430
 
430
431
  @allowed_entity_aliases.setter
431
- def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
432
+ def allowed_entity_aliases(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
432
433
  pulumi.set(self, "allowed_entity_aliases", value)
433
434
 
434
435
  @property
435
436
  @pulumi.getter(name="allowedPolicies")
436
- def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
437
+ def allowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
437
438
  """
438
439
  List of allowed policies for given role.
439
440
  """
440
441
  return pulumi.get(self, "allowed_policies")
441
442
 
442
443
  @allowed_policies.setter
443
- def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
444
+ def allowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
444
445
  pulumi.set(self, "allowed_policies", value)
445
446
 
446
447
  @property
447
448
  @pulumi.getter(name="allowedPoliciesGlobs")
448
- def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
449
+ def allowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
449
450
  """
450
451
  Set of allowed policies with glob match for given role.
451
452
  """
452
453
  return pulumi.get(self, "allowed_policies_globs")
453
454
 
454
455
  @allowed_policies_globs.setter
455
- def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
456
+ def allowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
456
457
  pulumi.set(self, "allowed_policies_globs", value)
457
458
 
458
459
  @property
459
460
  @pulumi.getter(name="disallowedPolicies")
460
- def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
461
+ def disallowed_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
461
462
  """
462
463
  List of disallowed policies for given role.
463
464
  """
464
465
  return pulumi.get(self, "disallowed_policies")
465
466
 
466
467
  @disallowed_policies.setter
467
- def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
468
+ def disallowed_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
468
469
  pulumi.set(self, "disallowed_policies", value)
469
470
 
470
471
  @property
471
472
  @pulumi.getter(name="disallowedPoliciesGlobs")
472
- def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
473
+ def disallowed_policies_globs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
473
474
  """
474
475
  Set of disallowed policies with glob match for given role.
475
476
  """
476
477
  return pulumi.get(self, "disallowed_policies_globs")
477
478
 
478
479
  @disallowed_policies_globs.setter
479
- def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
480
+ def disallowed_policies_globs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
480
481
  pulumi.set(self, "disallowed_policies_globs", value)
481
482
 
482
483
  @property
483
484
  @pulumi.getter
484
- def namespace(self) -> Optional[pulumi.Input[str]]:
485
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
485
486
  """
486
487
  The namespace to provision the resource in.
487
488
  The value should not contain leading or trailing forward slashes.
@@ -491,163 +492,163 @@ class _AuthBackendRoleState:
491
492
  return pulumi.get(self, "namespace")
492
493
 
493
494
  @namespace.setter
494
- def namespace(self, value: Optional[pulumi.Input[str]]):
495
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
495
496
  pulumi.set(self, "namespace", value)
496
497
 
497
498
  @property
498
499
  @pulumi.getter
499
- def orphan(self) -> Optional[pulumi.Input[bool]]:
500
+ def orphan(self) -> Optional[pulumi.Input[builtins.bool]]:
500
501
  """
501
502
  If true, tokens created against this policy will be orphan tokens.
502
503
  """
503
504
  return pulumi.get(self, "orphan")
504
505
 
505
506
  @orphan.setter
506
- def orphan(self, value: Optional[pulumi.Input[bool]]):
507
+ def orphan(self, value: Optional[pulumi.Input[builtins.bool]]):
507
508
  pulumi.set(self, "orphan", value)
508
509
 
509
510
  @property
510
511
  @pulumi.getter(name="pathSuffix")
511
- def path_suffix(self) -> Optional[pulumi.Input[str]]:
512
+ def path_suffix(self) -> Optional[pulumi.Input[builtins.str]]:
512
513
  """
513
514
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
514
515
  """
515
516
  return pulumi.get(self, "path_suffix")
516
517
 
517
518
  @path_suffix.setter
518
- def path_suffix(self, value: Optional[pulumi.Input[str]]):
519
+ def path_suffix(self, value: Optional[pulumi.Input[builtins.str]]):
519
520
  pulumi.set(self, "path_suffix", value)
520
521
 
521
522
  @property
522
523
  @pulumi.getter
523
- def renewable(self) -> Optional[pulumi.Input[bool]]:
524
+ def renewable(self) -> Optional[pulumi.Input[builtins.bool]]:
524
525
  """
525
526
  Whether to disable the ability of the token to be renewed past its initial TTL.
526
527
  """
527
528
  return pulumi.get(self, "renewable")
528
529
 
529
530
  @renewable.setter
530
- def renewable(self, value: Optional[pulumi.Input[bool]]):
531
+ def renewable(self, value: Optional[pulumi.Input[builtins.bool]]):
531
532
  pulumi.set(self, "renewable", value)
532
533
 
533
534
  @property
534
535
  @pulumi.getter(name="roleName")
535
- def role_name(self) -> Optional[pulumi.Input[str]]:
536
+ def role_name(self) -> Optional[pulumi.Input[builtins.str]]:
536
537
  """
537
538
  The name of the role.
538
539
  """
539
540
  return pulumi.get(self, "role_name")
540
541
 
541
542
  @role_name.setter
542
- def role_name(self, value: Optional[pulumi.Input[str]]):
543
+ def role_name(self, value: Optional[pulumi.Input[builtins.str]]):
543
544
  pulumi.set(self, "role_name", value)
544
545
 
545
546
  @property
546
547
  @pulumi.getter(name="tokenBoundCidrs")
547
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
548
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
548
549
  """
549
550
  Specifies the blocks of IP addresses which are allowed to use the generated token
550
551
  """
551
552
  return pulumi.get(self, "token_bound_cidrs")
552
553
 
553
554
  @token_bound_cidrs.setter
554
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
555
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
555
556
  pulumi.set(self, "token_bound_cidrs", value)
556
557
 
557
558
  @property
558
559
  @pulumi.getter(name="tokenExplicitMaxTtl")
559
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
560
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
560
561
  """
561
562
  Generated Token's Explicit Maximum TTL in seconds
562
563
  """
563
564
  return pulumi.get(self, "token_explicit_max_ttl")
564
565
 
565
566
  @token_explicit_max_ttl.setter
566
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
567
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
567
568
  pulumi.set(self, "token_explicit_max_ttl", value)
568
569
 
569
570
  @property
570
571
  @pulumi.getter(name="tokenMaxTtl")
571
- def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
572
+ def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
572
573
  """
573
574
  The maximum lifetime of the generated token
574
575
  """
575
576
  return pulumi.get(self, "token_max_ttl")
576
577
 
577
578
  @token_max_ttl.setter
578
- def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
579
+ def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
579
580
  pulumi.set(self, "token_max_ttl", value)
580
581
 
581
582
  @property
582
583
  @pulumi.getter(name="tokenNoDefaultPolicy")
583
- def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
584
+ def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
584
585
  """
585
586
  If true, the 'default' policy will not automatically be added to generated tokens
586
587
  """
587
588
  return pulumi.get(self, "token_no_default_policy")
588
589
 
589
590
  @token_no_default_policy.setter
590
- def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
591
+ def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
591
592
  pulumi.set(self, "token_no_default_policy", value)
592
593
 
593
594
  @property
594
595
  @pulumi.getter(name="tokenNumUses")
595
- def token_num_uses(self) -> Optional[pulumi.Input[int]]:
596
+ def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
596
597
  """
597
598
  The maximum number of times a token may be used, a value of zero means unlimited
598
599
  """
599
600
  return pulumi.get(self, "token_num_uses")
600
601
 
601
602
  @token_num_uses.setter
602
- def token_num_uses(self, value: Optional[pulumi.Input[int]]):
603
+ def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
603
604
  pulumi.set(self, "token_num_uses", value)
604
605
 
605
606
  @property
606
607
  @pulumi.getter(name="tokenPeriod")
607
- def token_period(self) -> Optional[pulumi.Input[int]]:
608
+ def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
608
609
  """
609
610
  Generated Token's Period
610
611
  """
611
612
  return pulumi.get(self, "token_period")
612
613
 
613
614
  @token_period.setter
614
- def token_period(self, value: Optional[pulumi.Input[int]]):
615
+ def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
615
616
  pulumi.set(self, "token_period", value)
616
617
 
617
618
  @property
618
619
  @pulumi.getter(name="tokenPolicies")
619
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
620
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
620
621
  """
621
622
  Generated Token's Policies
622
623
  """
623
624
  return pulumi.get(self, "token_policies")
624
625
 
625
626
  @token_policies.setter
626
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
627
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
627
628
  pulumi.set(self, "token_policies", value)
628
629
 
629
630
  @property
630
631
  @pulumi.getter(name="tokenTtl")
631
- def token_ttl(self) -> Optional[pulumi.Input[int]]:
632
+ def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
632
633
  """
633
634
  The initial ttl of the token to generate in seconds
634
635
  """
635
636
  return pulumi.get(self, "token_ttl")
636
637
 
637
638
  @token_ttl.setter
638
- def token_ttl(self, value: Optional[pulumi.Input[int]]):
639
+ def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
639
640
  pulumi.set(self, "token_ttl", value)
640
641
 
641
642
  @property
642
643
  @pulumi.getter(name="tokenType")
643
- def token_type(self) -> Optional[pulumi.Input[str]]:
644
+ def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
644
645
  """
645
646
  The type of token to generate, service or batch
646
647
  """
647
648
  return pulumi.get(self, "token_type")
648
649
 
649
650
  @token_type.setter
650
- def token_type(self, value: Optional[pulumi.Input[str]]):
651
+ def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
651
652
  pulumi.set(self, "token_type", value)
652
653
 
653
654
 
@@ -656,25 +657,25 @@ class AuthBackendRole(pulumi.CustomResource):
656
657
  def __init__(__self__,
657
658
  resource_name: str,
658
659
  opts: Optional[pulumi.ResourceOptions] = None,
659
- allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
660
- allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
661
- allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
662
- disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
663
- disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
664
- namespace: Optional[pulumi.Input[str]] = None,
665
- orphan: Optional[pulumi.Input[bool]] = None,
666
- path_suffix: Optional[pulumi.Input[str]] = None,
667
- renewable: Optional[pulumi.Input[bool]] = None,
668
- role_name: Optional[pulumi.Input[str]] = None,
669
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
670
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
671
- token_max_ttl: Optional[pulumi.Input[int]] = None,
672
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
673
- token_num_uses: Optional[pulumi.Input[int]] = None,
674
- token_period: Optional[pulumi.Input[int]] = None,
675
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
676
- token_ttl: Optional[pulumi.Input[int]] = None,
677
- token_type: Optional[pulumi.Input[str]] = None,
660
+ allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
661
+ allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
662
+ allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
663
+ disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
664
+ disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
665
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
666
+ orphan: Optional[pulumi.Input[builtins.bool]] = None,
667
+ path_suffix: Optional[pulumi.Input[builtins.str]] = None,
668
+ renewable: Optional[pulumi.Input[builtins.bool]] = None,
669
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
670
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
671
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
672
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
673
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
674
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
675
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
676
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
677
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
678
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
678
679
  __props__=None):
679
680
  """
680
681
  Manages Token auth backend role in a Vault server. See the [Vault
@@ -712,28 +713,28 @@ class AuthBackendRole(pulumi.CustomResource):
712
713
 
713
714
  :param str resource_name: The name of the resource.
714
715
  :param pulumi.ResourceOptions opts: Options for the resource.
715
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_entity_aliases: List of allowed entity aliases.
716
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies: List of allowed policies for given role.
717
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
718
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies: List of disallowed policies for given role.
719
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
720
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
716
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
717
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies: List of allowed policies for given role.
718
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
719
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies: List of disallowed policies for given role.
720
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
721
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
721
722
  The value should not contain leading or trailing forward slashes.
722
723
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
723
724
  *Available only for Vault Enterprise*.
724
- :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
725
- :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
726
- :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
727
- :param pulumi.Input[str] role_name: The name of the role.
728
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
729
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
730
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
731
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
732
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
733
- :param pulumi.Input[int] token_period: Generated Token's Period
734
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
735
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
736
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
725
+ :param pulumi.Input[builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
726
+ :param pulumi.Input[builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
727
+ :param pulumi.Input[builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
728
+ :param pulumi.Input[builtins.str] role_name: The name of the role.
729
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
730
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
731
+ :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
732
+ :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
733
+ :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
734
+ :param pulumi.Input[builtins.int] token_period: Generated Token's Period
735
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
736
+ :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
737
+ :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
737
738
  """
738
739
  ...
739
740
  @overload
@@ -790,25 +791,25 @@ class AuthBackendRole(pulumi.CustomResource):
790
791
  def _internal_init(__self__,
791
792
  resource_name: str,
792
793
  opts: Optional[pulumi.ResourceOptions] = None,
793
- allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
794
- allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
795
- allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
796
- disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
797
- disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
798
- namespace: Optional[pulumi.Input[str]] = None,
799
- orphan: Optional[pulumi.Input[bool]] = None,
800
- path_suffix: Optional[pulumi.Input[str]] = None,
801
- renewable: Optional[pulumi.Input[bool]] = None,
802
- role_name: Optional[pulumi.Input[str]] = None,
803
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
804
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
805
- token_max_ttl: Optional[pulumi.Input[int]] = None,
806
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
807
- token_num_uses: Optional[pulumi.Input[int]] = None,
808
- token_period: Optional[pulumi.Input[int]] = None,
809
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
810
- token_ttl: Optional[pulumi.Input[int]] = None,
811
- token_type: Optional[pulumi.Input[str]] = None,
794
+ allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
795
+ allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
796
+ allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
797
+ disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
798
+ disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
799
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
800
+ orphan: Optional[pulumi.Input[builtins.bool]] = None,
801
+ path_suffix: Optional[pulumi.Input[builtins.str]] = None,
802
+ renewable: Optional[pulumi.Input[builtins.bool]] = None,
803
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
804
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
805
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
806
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
807
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
808
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
809
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
810
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
811
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
812
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
812
813
  __props__=None):
813
814
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
814
815
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -849,25 +850,25 @@ class AuthBackendRole(pulumi.CustomResource):
849
850
  def get(resource_name: str,
850
851
  id: pulumi.Input[str],
851
852
  opts: Optional[pulumi.ResourceOptions] = None,
852
- allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
853
- allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
854
- allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
855
- disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
856
- disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
857
- namespace: Optional[pulumi.Input[str]] = None,
858
- orphan: Optional[pulumi.Input[bool]] = None,
859
- path_suffix: Optional[pulumi.Input[str]] = None,
860
- renewable: Optional[pulumi.Input[bool]] = None,
861
- role_name: Optional[pulumi.Input[str]] = None,
862
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
863
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
864
- token_max_ttl: Optional[pulumi.Input[int]] = None,
865
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
866
- token_num_uses: Optional[pulumi.Input[int]] = None,
867
- token_period: Optional[pulumi.Input[int]] = None,
868
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
869
- token_ttl: Optional[pulumi.Input[int]] = None,
870
- token_type: Optional[pulumi.Input[str]] = None) -> 'AuthBackendRole':
853
+ allowed_entity_aliases: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
854
+ allowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
855
+ allowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
856
+ disallowed_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
857
+ disallowed_policies_globs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
858
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
859
+ orphan: Optional[pulumi.Input[builtins.bool]] = None,
860
+ path_suffix: Optional[pulumi.Input[builtins.str]] = None,
861
+ renewable: Optional[pulumi.Input[builtins.bool]] = None,
862
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
863
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
864
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
865
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
866
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
867
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
868
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
869
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
870
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
871
+ token_type: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendRole':
871
872
  """
872
873
  Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
873
874
  properties used to qualify the lookup.
@@ -875,28 +876,28 @@ class AuthBackendRole(pulumi.CustomResource):
875
876
  :param str resource_name: The unique name of the resulting resource.
876
877
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
877
878
  :param pulumi.ResourceOptions opts: Options for the resource.
878
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_entity_aliases: List of allowed entity aliases.
879
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies: List of allowed policies for given role.
880
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
881
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies: List of disallowed policies for given role.
882
- :param pulumi.Input[Sequence[pulumi.Input[str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
883
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
879
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_entity_aliases: List of allowed entity aliases.
880
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies: List of allowed policies for given role.
881
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_policies_globs: Set of allowed policies with glob match for given role.
882
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies: List of disallowed policies for given role.
883
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] disallowed_policies_globs: Set of disallowed policies with glob match for given role.
884
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
884
885
  The value should not contain leading or trailing forward slashes.
885
886
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
886
887
  *Available only for Vault Enterprise*.
887
- :param pulumi.Input[bool] orphan: If true, tokens created against this policy will be orphan tokens.
888
- :param pulumi.Input[str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
889
- :param pulumi.Input[bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
890
- :param pulumi.Input[str] role_name: The name of the role.
891
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
892
- :param pulumi.Input[int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
893
- :param pulumi.Input[int] token_max_ttl: The maximum lifetime of the generated token
894
- :param pulumi.Input[bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
895
- :param pulumi.Input[int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
896
- :param pulumi.Input[int] token_period: Generated Token's Period
897
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: Generated Token's Policies
898
- :param pulumi.Input[int] token_ttl: The initial ttl of the token to generate in seconds
899
- :param pulumi.Input[str] token_type: The type of token to generate, service or batch
888
+ :param pulumi.Input[builtins.bool] orphan: If true, tokens created against this policy will be orphan tokens.
889
+ :param pulumi.Input[builtins.str] path_suffix: Tokens created against this role will have the given suffix as part of their path in addition to the role name.
890
+ :param pulumi.Input[builtins.bool] renewable: Whether to disable the ability of the token to be renewed past its initial TTL.
891
+ :param pulumi.Input[builtins.str] role_name: The name of the role.
892
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
893
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
894
+ :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
895
+ :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
896
+ :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
897
+ :param pulumi.Input[builtins.int] token_period: Generated Token's Period
898
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
899
+ :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
900
+ :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
900
901
  """
901
902
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
902
903
 
@@ -925,7 +926,7 @@ class AuthBackendRole(pulumi.CustomResource):
925
926
 
926
927
  @property
927
928
  @pulumi.getter(name="allowedEntityAliases")
928
- def allowed_entity_aliases(self) -> pulumi.Output[Optional[Sequence[str]]]:
929
+ def allowed_entity_aliases(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
929
930
  """
930
931
  List of allowed entity aliases.
931
932
  """
@@ -933,7 +934,7 @@ class AuthBackendRole(pulumi.CustomResource):
933
934
 
934
935
  @property
935
936
  @pulumi.getter(name="allowedPolicies")
936
- def allowed_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
937
+ def allowed_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
937
938
  """
938
939
  List of allowed policies for given role.
939
940
  """
@@ -941,7 +942,7 @@ class AuthBackendRole(pulumi.CustomResource):
941
942
 
942
943
  @property
943
944
  @pulumi.getter(name="allowedPoliciesGlobs")
944
- def allowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[str]]]:
945
+ def allowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
945
946
  """
946
947
  Set of allowed policies with glob match for given role.
947
948
  """
@@ -949,7 +950,7 @@ class AuthBackendRole(pulumi.CustomResource):
949
950
 
950
951
  @property
951
952
  @pulumi.getter(name="disallowedPolicies")
952
- def disallowed_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
953
+ def disallowed_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
953
954
  """
954
955
  List of disallowed policies for given role.
955
956
  """
@@ -957,7 +958,7 @@ class AuthBackendRole(pulumi.CustomResource):
957
958
 
958
959
  @property
959
960
  @pulumi.getter(name="disallowedPoliciesGlobs")
960
- def disallowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[str]]]:
961
+ def disallowed_policies_globs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
961
962
  """
962
963
  Set of disallowed policies with glob match for given role.
963
964
  """
@@ -965,7 +966,7 @@ class AuthBackendRole(pulumi.CustomResource):
965
966
 
966
967
  @property
967
968
  @pulumi.getter
968
- def namespace(self) -> pulumi.Output[Optional[str]]:
969
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
969
970
  """
970
971
  The namespace to provision the resource in.
971
972
  The value should not contain leading or trailing forward slashes.
@@ -976,7 +977,7 @@ class AuthBackendRole(pulumi.CustomResource):
976
977
 
977
978
  @property
978
979
  @pulumi.getter
979
- def orphan(self) -> pulumi.Output[Optional[bool]]:
980
+ def orphan(self) -> pulumi.Output[Optional[builtins.bool]]:
980
981
  """
981
982
  If true, tokens created against this policy will be orphan tokens.
982
983
  """
@@ -984,7 +985,7 @@ class AuthBackendRole(pulumi.CustomResource):
984
985
 
985
986
  @property
986
987
  @pulumi.getter(name="pathSuffix")
987
- def path_suffix(self) -> pulumi.Output[Optional[str]]:
988
+ def path_suffix(self) -> pulumi.Output[Optional[builtins.str]]:
988
989
  """
989
990
  Tokens created against this role will have the given suffix as part of their path in addition to the role name.
990
991
  """
@@ -992,7 +993,7 @@ class AuthBackendRole(pulumi.CustomResource):
992
993
 
993
994
  @property
994
995
  @pulumi.getter
995
- def renewable(self) -> pulumi.Output[Optional[bool]]:
996
+ def renewable(self) -> pulumi.Output[Optional[builtins.bool]]:
996
997
  """
997
998
  Whether to disable the ability of the token to be renewed past its initial TTL.
998
999
  """
@@ -1000,7 +1001,7 @@ class AuthBackendRole(pulumi.CustomResource):
1000
1001
 
1001
1002
  @property
1002
1003
  @pulumi.getter(name="roleName")
1003
- def role_name(self) -> pulumi.Output[str]:
1004
+ def role_name(self) -> pulumi.Output[builtins.str]:
1004
1005
  """
1005
1006
  The name of the role.
1006
1007
  """
@@ -1008,7 +1009,7 @@ class AuthBackendRole(pulumi.CustomResource):
1008
1009
 
1009
1010
  @property
1010
1011
  @pulumi.getter(name="tokenBoundCidrs")
1011
- def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1012
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1012
1013
  """
1013
1014
  Specifies the blocks of IP addresses which are allowed to use the generated token
1014
1015
  """
@@ -1016,7 +1017,7 @@ class AuthBackendRole(pulumi.CustomResource):
1016
1017
 
1017
1018
  @property
1018
1019
  @pulumi.getter(name="tokenExplicitMaxTtl")
1019
- def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1020
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1020
1021
  """
1021
1022
  Generated Token's Explicit Maximum TTL in seconds
1022
1023
  """
@@ -1024,7 +1025,7 @@ class AuthBackendRole(pulumi.CustomResource):
1024
1025
 
1025
1026
  @property
1026
1027
  @pulumi.getter(name="tokenMaxTtl")
1027
- def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1028
+ def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1028
1029
  """
1029
1030
  The maximum lifetime of the generated token
1030
1031
  """
@@ -1032,7 +1033,7 @@ class AuthBackendRole(pulumi.CustomResource):
1032
1033
 
1033
1034
  @property
1034
1035
  @pulumi.getter(name="tokenNoDefaultPolicy")
1035
- def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1036
+ def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
1036
1037
  """
1037
1038
  If true, the 'default' policy will not automatically be added to generated tokens
1038
1039
  """
@@ -1040,7 +1041,7 @@ class AuthBackendRole(pulumi.CustomResource):
1040
1041
 
1041
1042
  @property
1042
1043
  @pulumi.getter(name="tokenNumUses")
1043
- def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1044
+ def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
1044
1045
  """
1045
1046
  The maximum number of times a token may be used, a value of zero means unlimited
1046
1047
  """
@@ -1048,7 +1049,7 @@ class AuthBackendRole(pulumi.CustomResource):
1048
1049
 
1049
1050
  @property
1050
1051
  @pulumi.getter(name="tokenPeriod")
1051
- def token_period(self) -> pulumi.Output[Optional[int]]:
1052
+ def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
1052
1053
  """
1053
1054
  Generated Token's Period
1054
1055
  """
@@ -1056,7 +1057,7 @@ class AuthBackendRole(pulumi.CustomResource):
1056
1057
 
1057
1058
  @property
1058
1059
  @pulumi.getter(name="tokenPolicies")
1059
- def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1060
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1060
1061
  """
1061
1062
  Generated Token's Policies
1062
1063
  """
@@ -1064,7 +1065,7 @@ class AuthBackendRole(pulumi.CustomResource):
1064
1065
 
1065
1066
  @property
1066
1067
  @pulumi.getter(name="tokenTtl")
1067
- def token_ttl(self) -> pulumi.Output[Optional[int]]:
1068
+ def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1068
1069
  """
1069
1070
  The initial ttl of the token to generate in seconds
1070
1071
  """
@@ -1072,7 +1073,7 @@ class AuthBackendRole(pulumi.CustomResource):
1072
1073
 
1073
1074
  @property
1074
1075
  @pulumi.getter(name="tokenType")
1075
- def token_type(self) -> pulumi.Output[Optional[str]]:
1076
+ def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
1076
1077
  """
1077
1078
  The type of token to generate, service or batch
1078
1079
  """