pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744183682__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744183682.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744183682.dist-info}/top_level.txt +0 -0
pulumi_vault/_inputs.py CHANGED
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -57,44 +58,44 @@ MYPY = False
57
58
 
58
59
  if not MYPY:
59
60
  class AuthBackendTuneArgsDict(TypedDict):
60
- allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
61
+ allowed_response_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
61
62
  """
62
63
  List of headers to whitelist and allowing
63
64
  a plugin to include them in the response.
64
65
  """
65
- audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
66
+ audit_non_hmac_request_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
66
67
  """
67
68
  Specifies the list of keys that will
68
69
  not be HMAC'd by audit devices in the request data object.
69
70
  """
70
- audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
71
+ audit_non_hmac_response_keys: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
71
72
  """
72
73
  Specifies the list of keys that will
73
74
  not be HMAC'd by audit devices in the response data object.
74
75
  """
75
- default_lease_ttl: NotRequired[pulumi.Input[str]]
76
+ default_lease_ttl: NotRequired[pulumi.Input[builtins.str]]
76
77
  """
77
78
  Specifies the default time-to-live.
78
79
  If set, this overrides the global default.
79
80
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
80
81
  """
81
- listing_visibility: NotRequired[pulumi.Input[str]]
82
+ listing_visibility: NotRequired[pulumi.Input[builtins.str]]
82
83
  """
83
84
  Specifies whether to show this mount in
84
85
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
85
86
  """
86
- max_lease_ttl: NotRequired[pulumi.Input[str]]
87
+ max_lease_ttl: NotRequired[pulumi.Input[builtins.str]]
87
88
  """
88
89
  Specifies the maximum time-to-live.
89
90
  If set, this overrides the global default.
90
91
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
91
92
  """
92
- passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[str]]]]
93
+ passthrough_request_headers: NotRequired[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]
93
94
  """
94
95
  List of headers to whitelist and
95
96
  pass from the request to the backend.
96
97
  """
97
- token_type: NotRequired[pulumi.Input[str]]
98
+ token_type: NotRequired[pulumi.Input[builtins.str]]
98
99
  """
99
100
  Specifies the type of tokens that should be returned by
100
101
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -105,32 +106,32 @@ elif False:
105
106
  @pulumi.input_type
106
107
  class AuthBackendTuneArgs:
107
108
  def __init__(__self__, *,
108
- allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
109
- audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
110
- audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
111
- default_lease_ttl: Optional[pulumi.Input[str]] = None,
112
- listing_visibility: Optional[pulumi.Input[str]] = None,
113
- max_lease_ttl: Optional[pulumi.Input[str]] = None,
114
- passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
115
- token_type: Optional[pulumi.Input[str]] = None):
116
- """
117
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_response_headers: List of headers to whitelist and allowing
109
+ allowed_response_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
110
+ audit_non_hmac_request_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
111
+ audit_non_hmac_response_keys: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
112
+ default_lease_ttl: Optional[pulumi.Input[builtins.str]] = None,
113
+ listing_visibility: Optional[pulumi.Input[builtins.str]] = None,
114
+ max_lease_ttl: Optional[pulumi.Input[builtins.str]] = None,
115
+ passthrough_request_headers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
116
+ token_type: Optional[pulumi.Input[builtins.str]] = None):
117
+ """
118
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_response_headers: List of headers to whitelist and allowing
118
119
  a plugin to include them in the response.
119
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
120
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_request_keys: Specifies the list of keys that will
120
121
  not be HMAC'd by audit devices in the request data object.
121
- :param pulumi.Input[Sequence[pulumi.Input[str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
122
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] audit_non_hmac_response_keys: Specifies the list of keys that will
122
123
  not be HMAC'd by audit devices in the response data object.
123
- :param pulumi.Input[str] default_lease_ttl: Specifies the default time-to-live.
124
+ :param pulumi.Input[builtins.str] default_lease_ttl: Specifies the default time-to-live.
124
125
  If set, this overrides the global default.
125
126
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
126
- :param pulumi.Input[str] listing_visibility: Specifies whether to show this mount in
127
+ :param pulumi.Input[builtins.str] listing_visibility: Specifies whether to show this mount in
127
128
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
128
- :param pulumi.Input[str] max_lease_ttl: Specifies the maximum time-to-live.
129
+ :param pulumi.Input[builtins.str] max_lease_ttl: Specifies the maximum time-to-live.
129
130
  If set, this overrides the global default.
130
131
  Must be a valid [duration string](https://golang.org/pkg/time/#ParseDuration)
131
- :param pulumi.Input[Sequence[pulumi.Input[str]]] passthrough_request_headers: List of headers to whitelist and
132
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] passthrough_request_headers: List of headers to whitelist and
132
133
  pass from the request to the backend.
133
- :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
134
+ :param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
134
135
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
135
136
  """
136
137
  if allowed_response_headers is not None:
@@ -152,7 +153,7 @@ class AuthBackendTuneArgs:
152
153
 
153
154
  @property
154
155
  @pulumi.getter(name="allowedResponseHeaders")
155
- def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
156
+ def allowed_response_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
156
157
  """
157
158
  List of headers to whitelist and allowing
158
159
  a plugin to include them in the response.
@@ -160,12 +161,12 @@ class AuthBackendTuneArgs:
160
161
  return pulumi.get(self, "allowed_response_headers")
161
162
 
162
163
  @allowed_response_headers.setter
163
- def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
164
+ def allowed_response_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
164
165
  pulumi.set(self, "allowed_response_headers", value)
165
166
 
166
167
  @property
167
168
  @pulumi.getter(name="auditNonHmacRequestKeys")
168
- def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
169
+ def audit_non_hmac_request_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
169
170
  """
170
171
  Specifies the list of keys that will
171
172
  not be HMAC'd by audit devices in the request data object.
@@ -173,12 +174,12 @@ class AuthBackendTuneArgs:
173
174
  return pulumi.get(self, "audit_non_hmac_request_keys")
174
175
 
175
176
  @audit_non_hmac_request_keys.setter
176
- def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
177
+ def audit_non_hmac_request_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
177
178
  pulumi.set(self, "audit_non_hmac_request_keys", value)
178
179
 
179
180
  @property
180
181
  @pulumi.getter(name="auditNonHmacResponseKeys")
181
- def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
182
+ def audit_non_hmac_response_keys(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
182
183
  """
183
184
  Specifies the list of keys that will
184
185
  not be HMAC'd by audit devices in the response data object.
@@ -186,12 +187,12 @@ class AuthBackendTuneArgs:
186
187
  return pulumi.get(self, "audit_non_hmac_response_keys")
187
188
 
188
189
  @audit_non_hmac_response_keys.setter
189
- def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
190
+ def audit_non_hmac_response_keys(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
190
191
  pulumi.set(self, "audit_non_hmac_response_keys", value)
191
192
 
192
193
  @property
193
194
  @pulumi.getter(name="defaultLeaseTtl")
194
- def default_lease_ttl(self) -> Optional[pulumi.Input[str]]:
195
+ def default_lease_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
195
196
  """
196
197
  Specifies the default time-to-live.
197
198
  If set, this overrides the global default.
@@ -200,12 +201,12 @@ class AuthBackendTuneArgs:
200
201
  return pulumi.get(self, "default_lease_ttl")
201
202
 
202
203
  @default_lease_ttl.setter
203
- def default_lease_ttl(self, value: Optional[pulumi.Input[str]]):
204
+ def default_lease_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
204
205
  pulumi.set(self, "default_lease_ttl", value)
205
206
 
206
207
  @property
207
208
  @pulumi.getter(name="listingVisibility")
208
- def listing_visibility(self) -> Optional[pulumi.Input[str]]:
209
+ def listing_visibility(self) -> Optional[pulumi.Input[builtins.str]]:
209
210
  """
210
211
  Specifies whether to show this mount in
211
212
  the UI-specific listing endpoint. Valid values are "unauth" or "hidden".
@@ -213,12 +214,12 @@ class AuthBackendTuneArgs:
213
214
  return pulumi.get(self, "listing_visibility")
214
215
 
215
216
  @listing_visibility.setter
216
- def listing_visibility(self, value: Optional[pulumi.Input[str]]):
217
+ def listing_visibility(self, value: Optional[pulumi.Input[builtins.str]]):
217
218
  pulumi.set(self, "listing_visibility", value)
218
219
 
219
220
  @property
220
221
  @pulumi.getter(name="maxLeaseTtl")
221
- def max_lease_ttl(self) -> Optional[pulumi.Input[str]]:
222
+ def max_lease_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
222
223
  """
223
224
  Specifies the maximum time-to-live.
224
225
  If set, this overrides the global default.
@@ -227,12 +228,12 @@ class AuthBackendTuneArgs:
227
228
  return pulumi.get(self, "max_lease_ttl")
228
229
 
229
230
  @max_lease_ttl.setter
230
- def max_lease_ttl(self, value: Optional[pulumi.Input[str]]):
231
+ def max_lease_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
231
232
  pulumi.set(self, "max_lease_ttl", value)
232
233
 
233
234
  @property
234
235
  @pulumi.getter(name="passthroughRequestHeaders")
235
- def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
236
+ def passthrough_request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
236
237
  """
237
238
  List of headers to whitelist and
238
239
  pass from the request to the backend.
@@ -240,12 +241,12 @@ class AuthBackendTuneArgs:
240
241
  return pulumi.get(self, "passthrough_request_headers")
241
242
 
242
243
  @passthrough_request_headers.setter
243
- def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
244
+ def passthrough_request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
244
245
  pulumi.set(self, "passthrough_request_headers", value)
245
246
 
246
247
  @property
247
248
  @pulumi.getter(name="tokenType")
248
- def token_type(self) -> Optional[pulumi.Input[str]]:
249
+ def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
249
250
  """
250
251
  Specifies the type of tokens that should be returned by
251
252
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -253,20 +254,20 @@ class AuthBackendTuneArgs:
253
254
  return pulumi.get(self, "token_type")
254
255
 
255
256
  @token_type.setter
256
- def token_type(self, value: Optional[pulumi.Input[str]]):
257
+ def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
257
258
  pulumi.set(self, "token_type", value)
258
259
 
259
260
 
260
261
  if not MYPY:
261
262
  class ProviderAuthLoginArgsDict(TypedDict):
262
- path: pulumi.Input[str]
263
- method: NotRequired[pulumi.Input[str]]
264
- namespace: NotRequired[pulumi.Input[str]]
263
+ path: pulumi.Input[builtins.str]
264
+ method: NotRequired[pulumi.Input[builtins.str]]
265
+ namespace: NotRequired[pulumi.Input[builtins.str]]
265
266
  """
266
267
  The authentication engine's namespace. Conflicts with use_root_namespace
267
268
  """
268
- parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[str]]]]
269
- use_root_namespace: NotRequired[pulumi.Input[bool]]
269
+ parameters: NotRequired[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]
270
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
270
271
  """
271
272
  Authenticate to the root Vault namespace. Conflicts with namespace
272
273
  """
@@ -276,14 +277,14 @@ elif False:
276
277
  @pulumi.input_type
277
278
  class ProviderAuthLoginArgs:
278
279
  def __init__(__self__, *,
279
- path: pulumi.Input[str],
280
- method: Optional[pulumi.Input[str]] = None,
281
- namespace: Optional[pulumi.Input[str]] = None,
282
- parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]] = None,
283
- use_root_namespace: Optional[pulumi.Input[bool]] = None):
280
+ path: pulumi.Input[builtins.str],
281
+ method: Optional[pulumi.Input[builtins.str]] = None,
282
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
283
+ parameters: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
284
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
284
285
  """
285
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
286
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
286
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
287
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
287
288
  """
288
289
  pulumi.set(__self__, "path", path)
289
290
  if method is not None:
@@ -297,119 +298,119 @@ class ProviderAuthLoginArgs:
297
298
 
298
299
  @property
299
300
  @pulumi.getter
300
- def path(self) -> pulumi.Input[str]:
301
+ def path(self) -> pulumi.Input[builtins.str]:
301
302
  return pulumi.get(self, "path")
302
303
 
303
304
  @path.setter
304
- def path(self, value: pulumi.Input[str]):
305
+ def path(self, value: pulumi.Input[builtins.str]):
305
306
  pulumi.set(self, "path", value)
306
307
 
307
308
  @property
308
309
  @pulumi.getter
309
- def method(self) -> Optional[pulumi.Input[str]]:
310
+ def method(self) -> Optional[pulumi.Input[builtins.str]]:
310
311
  return pulumi.get(self, "method")
311
312
 
312
313
  @method.setter
313
- def method(self, value: Optional[pulumi.Input[str]]):
314
+ def method(self, value: Optional[pulumi.Input[builtins.str]]):
314
315
  pulumi.set(self, "method", value)
315
316
 
316
317
  @property
317
318
  @pulumi.getter
318
- def namespace(self) -> Optional[pulumi.Input[str]]:
319
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
319
320
  """
320
321
  The authentication engine's namespace. Conflicts with use_root_namespace
321
322
  """
322
323
  return pulumi.get(self, "namespace")
323
324
 
324
325
  @namespace.setter
325
- def namespace(self, value: Optional[pulumi.Input[str]]):
326
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
326
327
  pulumi.set(self, "namespace", value)
327
328
 
328
329
  @property
329
330
  @pulumi.getter
330
- def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]:
331
+ def parameters(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
331
332
  return pulumi.get(self, "parameters")
332
333
 
333
334
  @parameters.setter
334
- def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[str]]]]):
335
+ def parameters(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
335
336
  pulumi.set(self, "parameters", value)
336
337
 
337
338
  @property
338
339
  @pulumi.getter(name="useRootNamespace")
339
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
340
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
340
341
  """
341
342
  Authenticate to the root Vault namespace. Conflicts with namespace
342
343
  """
343
344
  return pulumi.get(self, "use_root_namespace")
344
345
 
345
346
  @use_root_namespace.setter
346
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
347
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
347
348
  pulumi.set(self, "use_root_namespace", value)
348
349
 
349
350
 
350
351
  if not MYPY:
351
352
  class ProviderAuthLoginAwsArgsDict(TypedDict):
352
- role: pulumi.Input[str]
353
+ role: pulumi.Input[builtins.str]
353
354
  """
354
355
  The Vault role to use when logging into Vault.
355
356
  """
356
- aws_access_key_id: NotRequired[pulumi.Input[str]]
357
+ aws_access_key_id: NotRequired[pulumi.Input[builtins.str]]
357
358
  """
358
359
  The AWS access key ID.
359
360
  """
360
- aws_iam_endpoint: NotRequired[pulumi.Input[str]]
361
+ aws_iam_endpoint: NotRequired[pulumi.Input[builtins.str]]
361
362
  """
362
363
  The IAM endpoint URL.
363
364
  """
364
- aws_profile: NotRequired[pulumi.Input[str]]
365
+ aws_profile: NotRequired[pulumi.Input[builtins.str]]
365
366
  """
366
367
  The name of the AWS profile.
367
368
  """
368
- aws_region: NotRequired[pulumi.Input[str]]
369
+ aws_region: NotRequired[pulumi.Input[builtins.str]]
369
370
  """
370
371
  The AWS region.
371
372
  """
372
- aws_role_arn: NotRequired[pulumi.Input[str]]
373
+ aws_role_arn: NotRequired[pulumi.Input[builtins.str]]
373
374
  """
374
375
  The ARN of the AWS Role to assume.Used during STS AssumeRole
375
376
  """
376
- aws_role_session_name: NotRequired[pulumi.Input[str]]
377
+ aws_role_session_name: NotRequired[pulumi.Input[builtins.str]]
377
378
  """
378
379
  Specifies the name to attach to the AWS role session. Used during STS AssumeRole
379
380
  """
380
- aws_secret_access_key: NotRequired[pulumi.Input[str]]
381
+ aws_secret_access_key: NotRequired[pulumi.Input[builtins.str]]
381
382
  """
382
383
  The AWS secret access key.
383
384
  """
384
- aws_session_token: NotRequired[pulumi.Input[str]]
385
+ aws_session_token: NotRequired[pulumi.Input[builtins.str]]
385
386
  """
386
387
  The AWS session token.
387
388
  """
388
- aws_shared_credentials_file: NotRequired[pulumi.Input[str]]
389
+ aws_shared_credentials_file: NotRequired[pulumi.Input[builtins.str]]
389
390
  """
390
391
  Path to the AWS shared credentials file.
391
392
  """
392
- aws_sts_endpoint: NotRequired[pulumi.Input[str]]
393
+ aws_sts_endpoint: NotRequired[pulumi.Input[builtins.str]]
393
394
  """
394
395
  The STS endpoint URL.
395
396
  """
396
- aws_web_identity_token_file: NotRequired[pulumi.Input[str]]
397
+ aws_web_identity_token_file: NotRequired[pulumi.Input[builtins.str]]
397
398
  """
398
399
  Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
399
400
  """
400
- header_value: NotRequired[pulumi.Input[str]]
401
+ header_value: NotRequired[pulumi.Input[builtins.str]]
401
402
  """
402
403
  The Vault header value to include in the STS signing request.
403
404
  """
404
- mount: NotRequired[pulumi.Input[str]]
405
+ mount: NotRequired[pulumi.Input[builtins.str]]
405
406
  """
406
407
  The path where the authentication engine is mounted.
407
408
  """
408
- namespace: NotRequired[pulumi.Input[str]]
409
+ namespace: NotRequired[pulumi.Input[builtins.str]]
409
410
  """
410
411
  The authentication engine's namespace. Conflicts with use_root_namespace
411
412
  """
412
- use_root_namespace: NotRequired[pulumi.Input[bool]]
413
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
413
414
  """
414
415
  Authenticate to the root Vault namespace. Conflicts with namespace
415
416
  """
@@ -419,39 +420,39 @@ elif False:
419
420
  @pulumi.input_type
420
421
  class ProviderAuthLoginAwsArgs:
421
422
  def __init__(__self__, *,
422
- role: pulumi.Input[str],
423
- aws_access_key_id: Optional[pulumi.Input[str]] = None,
424
- aws_iam_endpoint: Optional[pulumi.Input[str]] = None,
425
- aws_profile: Optional[pulumi.Input[str]] = None,
426
- aws_region: Optional[pulumi.Input[str]] = None,
427
- aws_role_arn: Optional[pulumi.Input[str]] = None,
428
- aws_role_session_name: Optional[pulumi.Input[str]] = None,
429
- aws_secret_access_key: Optional[pulumi.Input[str]] = None,
430
- aws_session_token: Optional[pulumi.Input[str]] = None,
431
- aws_shared_credentials_file: Optional[pulumi.Input[str]] = None,
432
- aws_sts_endpoint: Optional[pulumi.Input[str]] = None,
433
- aws_web_identity_token_file: Optional[pulumi.Input[str]] = None,
434
- header_value: Optional[pulumi.Input[str]] = None,
435
- mount: Optional[pulumi.Input[str]] = None,
436
- namespace: Optional[pulumi.Input[str]] = None,
437
- use_root_namespace: Optional[pulumi.Input[bool]] = None):
438
- """
439
- :param pulumi.Input[str] role: The Vault role to use when logging into Vault.
440
- :param pulumi.Input[str] aws_access_key_id: The AWS access key ID.
441
- :param pulumi.Input[str] aws_iam_endpoint: The IAM endpoint URL.
442
- :param pulumi.Input[str] aws_profile: The name of the AWS profile.
443
- :param pulumi.Input[str] aws_region: The AWS region.
444
- :param pulumi.Input[str] aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
445
- :param pulumi.Input[str] aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
446
- :param pulumi.Input[str] aws_secret_access_key: The AWS secret access key.
447
- :param pulumi.Input[str] aws_session_token: The AWS session token.
448
- :param pulumi.Input[str] aws_shared_credentials_file: Path to the AWS shared credentials file.
449
- :param pulumi.Input[str] aws_sts_endpoint: The STS endpoint URL.
450
- :param pulumi.Input[str] aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
451
- :param pulumi.Input[str] header_value: The Vault header value to include in the STS signing request.
452
- :param pulumi.Input[str] mount: The path where the authentication engine is mounted.
453
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
454
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
423
+ role: pulumi.Input[builtins.str],
424
+ aws_access_key_id: Optional[pulumi.Input[builtins.str]] = None,
425
+ aws_iam_endpoint: Optional[pulumi.Input[builtins.str]] = None,
426
+ aws_profile: Optional[pulumi.Input[builtins.str]] = None,
427
+ aws_region: Optional[pulumi.Input[builtins.str]] = None,
428
+ aws_role_arn: Optional[pulumi.Input[builtins.str]] = None,
429
+ aws_role_session_name: Optional[pulumi.Input[builtins.str]] = None,
430
+ aws_secret_access_key: Optional[pulumi.Input[builtins.str]] = None,
431
+ aws_session_token: Optional[pulumi.Input[builtins.str]] = None,
432
+ aws_shared_credentials_file: Optional[pulumi.Input[builtins.str]] = None,
433
+ aws_sts_endpoint: Optional[pulumi.Input[builtins.str]] = None,
434
+ aws_web_identity_token_file: Optional[pulumi.Input[builtins.str]] = None,
435
+ header_value: Optional[pulumi.Input[builtins.str]] = None,
436
+ mount: Optional[pulumi.Input[builtins.str]] = None,
437
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
438
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
439
+ """
440
+ :param pulumi.Input[builtins.str] role: The Vault role to use when logging into Vault.
441
+ :param pulumi.Input[builtins.str] aws_access_key_id: The AWS access key ID.
442
+ :param pulumi.Input[builtins.str] aws_iam_endpoint: The IAM endpoint URL.
443
+ :param pulumi.Input[builtins.str] aws_profile: The name of the AWS profile.
444
+ :param pulumi.Input[builtins.str] aws_region: The AWS region.
445
+ :param pulumi.Input[builtins.str] aws_role_arn: The ARN of the AWS Role to assume.Used during STS AssumeRole
446
+ :param pulumi.Input[builtins.str] aws_role_session_name: Specifies the name to attach to the AWS role session. Used during STS AssumeRole
447
+ :param pulumi.Input[builtins.str] aws_secret_access_key: The AWS secret access key.
448
+ :param pulumi.Input[builtins.str] aws_session_token: The AWS session token.
449
+ :param pulumi.Input[builtins.str] aws_shared_credentials_file: Path to the AWS shared credentials file.
450
+ :param pulumi.Input[builtins.str] aws_sts_endpoint: The STS endpoint URL.
451
+ :param pulumi.Input[builtins.str] aws_web_identity_token_file: Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
452
+ :param pulumi.Input[builtins.str] header_value: The Vault header value to include in the STS signing request.
453
+ :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
454
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
455
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
455
456
  """
456
457
  pulumi.set(__self__, "role", role)
457
458
  if aws_access_key_id is not None:
@@ -487,244 +488,244 @@ class ProviderAuthLoginAwsArgs:
487
488
 
488
489
  @property
489
490
  @pulumi.getter
490
- def role(self) -> pulumi.Input[str]:
491
+ def role(self) -> pulumi.Input[builtins.str]:
491
492
  """
492
493
  The Vault role to use when logging into Vault.
493
494
  """
494
495
  return pulumi.get(self, "role")
495
496
 
496
497
  @role.setter
497
- def role(self, value: pulumi.Input[str]):
498
+ def role(self, value: pulumi.Input[builtins.str]):
498
499
  pulumi.set(self, "role", value)
499
500
 
500
501
  @property
501
502
  @pulumi.getter(name="awsAccessKeyId")
502
- def aws_access_key_id(self) -> Optional[pulumi.Input[str]]:
503
+ def aws_access_key_id(self) -> Optional[pulumi.Input[builtins.str]]:
503
504
  """
504
505
  The AWS access key ID.
505
506
  """
506
507
  return pulumi.get(self, "aws_access_key_id")
507
508
 
508
509
  @aws_access_key_id.setter
509
- def aws_access_key_id(self, value: Optional[pulumi.Input[str]]):
510
+ def aws_access_key_id(self, value: Optional[pulumi.Input[builtins.str]]):
510
511
  pulumi.set(self, "aws_access_key_id", value)
511
512
 
512
513
  @property
513
514
  @pulumi.getter(name="awsIamEndpoint")
514
- def aws_iam_endpoint(self) -> Optional[pulumi.Input[str]]:
515
+ def aws_iam_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
515
516
  """
516
517
  The IAM endpoint URL.
517
518
  """
518
519
  return pulumi.get(self, "aws_iam_endpoint")
519
520
 
520
521
  @aws_iam_endpoint.setter
521
- def aws_iam_endpoint(self, value: Optional[pulumi.Input[str]]):
522
+ def aws_iam_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
522
523
  pulumi.set(self, "aws_iam_endpoint", value)
523
524
 
524
525
  @property
525
526
  @pulumi.getter(name="awsProfile")
526
- def aws_profile(self) -> Optional[pulumi.Input[str]]:
527
+ def aws_profile(self) -> Optional[pulumi.Input[builtins.str]]:
527
528
  """
528
529
  The name of the AWS profile.
529
530
  """
530
531
  return pulumi.get(self, "aws_profile")
531
532
 
532
533
  @aws_profile.setter
533
- def aws_profile(self, value: Optional[pulumi.Input[str]]):
534
+ def aws_profile(self, value: Optional[pulumi.Input[builtins.str]]):
534
535
  pulumi.set(self, "aws_profile", value)
535
536
 
536
537
  @property
537
538
  @pulumi.getter(name="awsRegion")
538
- def aws_region(self) -> Optional[pulumi.Input[str]]:
539
+ def aws_region(self) -> Optional[pulumi.Input[builtins.str]]:
539
540
  """
540
541
  The AWS region.
541
542
  """
542
543
  return pulumi.get(self, "aws_region")
543
544
 
544
545
  @aws_region.setter
545
- def aws_region(self, value: Optional[pulumi.Input[str]]):
546
+ def aws_region(self, value: Optional[pulumi.Input[builtins.str]]):
546
547
  pulumi.set(self, "aws_region", value)
547
548
 
548
549
  @property
549
550
  @pulumi.getter(name="awsRoleArn")
550
- def aws_role_arn(self) -> Optional[pulumi.Input[str]]:
551
+ def aws_role_arn(self) -> Optional[pulumi.Input[builtins.str]]:
551
552
  """
552
553
  The ARN of the AWS Role to assume.Used during STS AssumeRole
553
554
  """
554
555
  return pulumi.get(self, "aws_role_arn")
555
556
 
556
557
  @aws_role_arn.setter
557
- def aws_role_arn(self, value: Optional[pulumi.Input[str]]):
558
+ def aws_role_arn(self, value: Optional[pulumi.Input[builtins.str]]):
558
559
  pulumi.set(self, "aws_role_arn", value)
559
560
 
560
561
  @property
561
562
  @pulumi.getter(name="awsRoleSessionName")
562
- def aws_role_session_name(self) -> Optional[pulumi.Input[str]]:
563
+ def aws_role_session_name(self) -> Optional[pulumi.Input[builtins.str]]:
563
564
  """
564
565
  Specifies the name to attach to the AWS role session. Used during STS AssumeRole
565
566
  """
566
567
  return pulumi.get(self, "aws_role_session_name")
567
568
 
568
569
  @aws_role_session_name.setter
569
- def aws_role_session_name(self, value: Optional[pulumi.Input[str]]):
570
+ def aws_role_session_name(self, value: Optional[pulumi.Input[builtins.str]]):
570
571
  pulumi.set(self, "aws_role_session_name", value)
571
572
 
572
573
  @property
573
574
  @pulumi.getter(name="awsSecretAccessKey")
574
- def aws_secret_access_key(self) -> Optional[pulumi.Input[str]]:
575
+ def aws_secret_access_key(self) -> Optional[pulumi.Input[builtins.str]]:
575
576
  """
576
577
  The AWS secret access key.
577
578
  """
578
579
  return pulumi.get(self, "aws_secret_access_key")
579
580
 
580
581
  @aws_secret_access_key.setter
581
- def aws_secret_access_key(self, value: Optional[pulumi.Input[str]]):
582
+ def aws_secret_access_key(self, value: Optional[pulumi.Input[builtins.str]]):
582
583
  pulumi.set(self, "aws_secret_access_key", value)
583
584
 
584
585
  @property
585
586
  @pulumi.getter(name="awsSessionToken")
586
- def aws_session_token(self) -> Optional[pulumi.Input[str]]:
587
+ def aws_session_token(self) -> Optional[pulumi.Input[builtins.str]]:
587
588
  """
588
589
  The AWS session token.
589
590
  """
590
591
  return pulumi.get(self, "aws_session_token")
591
592
 
592
593
  @aws_session_token.setter
593
- def aws_session_token(self, value: Optional[pulumi.Input[str]]):
594
+ def aws_session_token(self, value: Optional[pulumi.Input[builtins.str]]):
594
595
  pulumi.set(self, "aws_session_token", value)
595
596
 
596
597
  @property
597
598
  @pulumi.getter(name="awsSharedCredentialsFile")
598
- def aws_shared_credentials_file(self) -> Optional[pulumi.Input[str]]:
599
+ def aws_shared_credentials_file(self) -> Optional[pulumi.Input[builtins.str]]:
599
600
  """
600
601
  Path to the AWS shared credentials file.
601
602
  """
602
603
  return pulumi.get(self, "aws_shared_credentials_file")
603
604
 
604
605
  @aws_shared_credentials_file.setter
605
- def aws_shared_credentials_file(self, value: Optional[pulumi.Input[str]]):
606
+ def aws_shared_credentials_file(self, value: Optional[pulumi.Input[builtins.str]]):
606
607
  pulumi.set(self, "aws_shared_credentials_file", value)
607
608
 
608
609
  @property
609
610
  @pulumi.getter(name="awsStsEndpoint")
610
- def aws_sts_endpoint(self) -> Optional[pulumi.Input[str]]:
611
+ def aws_sts_endpoint(self) -> Optional[pulumi.Input[builtins.str]]:
611
612
  """
612
613
  The STS endpoint URL.
613
614
  """
614
615
  return pulumi.get(self, "aws_sts_endpoint")
615
616
 
616
617
  @aws_sts_endpoint.setter
617
- def aws_sts_endpoint(self, value: Optional[pulumi.Input[str]]):
618
+ def aws_sts_endpoint(self, value: Optional[pulumi.Input[builtins.str]]):
618
619
  pulumi.set(self, "aws_sts_endpoint", value)
619
620
 
620
621
  @property
621
622
  @pulumi.getter(name="awsWebIdentityTokenFile")
622
- def aws_web_identity_token_file(self) -> Optional[pulumi.Input[str]]:
623
+ def aws_web_identity_token_file(self) -> Optional[pulumi.Input[builtins.str]]:
623
624
  """
624
625
  Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
625
626
  """
626
627
  return pulumi.get(self, "aws_web_identity_token_file")
627
628
 
628
629
  @aws_web_identity_token_file.setter
629
- def aws_web_identity_token_file(self, value: Optional[pulumi.Input[str]]):
630
+ def aws_web_identity_token_file(self, value: Optional[pulumi.Input[builtins.str]]):
630
631
  pulumi.set(self, "aws_web_identity_token_file", value)
631
632
 
632
633
  @property
633
634
  @pulumi.getter(name="headerValue")
634
- def header_value(self) -> Optional[pulumi.Input[str]]:
635
+ def header_value(self) -> Optional[pulumi.Input[builtins.str]]:
635
636
  """
636
637
  The Vault header value to include in the STS signing request.
637
638
  """
638
639
  return pulumi.get(self, "header_value")
639
640
 
640
641
  @header_value.setter
641
- def header_value(self, value: Optional[pulumi.Input[str]]):
642
+ def header_value(self, value: Optional[pulumi.Input[builtins.str]]):
642
643
  pulumi.set(self, "header_value", value)
643
644
 
644
645
  @property
645
646
  @pulumi.getter
646
- def mount(self) -> Optional[pulumi.Input[str]]:
647
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
647
648
  """
648
649
  The path where the authentication engine is mounted.
649
650
  """
650
651
  return pulumi.get(self, "mount")
651
652
 
652
653
  @mount.setter
653
- def mount(self, value: Optional[pulumi.Input[str]]):
654
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
654
655
  pulumi.set(self, "mount", value)
655
656
 
656
657
  @property
657
658
  @pulumi.getter
658
- def namespace(self) -> Optional[pulumi.Input[str]]:
659
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
659
660
  """
660
661
  The authentication engine's namespace. Conflicts with use_root_namespace
661
662
  """
662
663
  return pulumi.get(self, "namespace")
663
664
 
664
665
  @namespace.setter
665
- def namespace(self, value: Optional[pulumi.Input[str]]):
666
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
666
667
  pulumi.set(self, "namespace", value)
667
668
 
668
669
  @property
669
670
  @pulumi.getter(name="useRootNamespace")
670
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
671
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
671
672
  """
672
673
  Authenticate to the root Vault namespace. Conflicts with namespace
673
674
  """
674
675
  return pulumi.get(self, "use_root_namespace")
675
676
 
676
677
  @use_root_namespace.setter
677
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
678
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
678
679
  pulumi.set(self, "use_root_namespace", value)
679
680
 
680
681
 
681
682
  if not MYPY:
682
683
  class ProviderAuthLoginAzureArgsDict(TypedDict):
683
- resource_group_name: pulumi.Input[str]
684
+ resource_group_name: pulumi.Input[builtins.str]
684
685
  """
685
686
  The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
686
687
  """
687
- role: pulumi.Input[str]
688
+ role: pulumi.Input[builtins.str]
688
689
  """
689
690
  Name of the login role.
690
691
  """
691
- subscription_id: pulumi.Input[str]
692
+ subscription_id: pulumi.Input[builtins.str]
692
693
  """
693
694
  The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
694
695
  """
695
- client_id: NotRequired[pulumi.Input[str]]
696
+ client_id: NotRequired[pulumi.Input[builtins.str]]
696
697
  """
697
698
  The identity's client ID.
698
699
  """
699
- jwt: NotRequired[pulumi.Input[str]]
700
+ jwt: NotRequired[pulumi.Input[builtins.str]]
700
701
  """
701
702
  A signed JSON Web Token. If not specified on will be created automatically
702
703
  """
703
- mount: NotRequired[pulumi.Input[str]]
704
+ mount: NotRequired[pulumi.Input[builtins.str]]
704
705
  """
705
706
  The path where the authentication engine is mounted.
706
707
  """
707
- namespace: NotRequired[pulumi.Input[str]]
708
+ namespace: NotRequired[pulumi.Input[builtins.str]]
708
709
  """
709
710
  The authentication engine's namespace. Conflicts with use_root_namespace
710
711
  """
711
- scope: NotRequired[pulumi.Input[str]]
712
+ scope: NotRequired[pulumi.Input[builtins.str]]
712
713
  """
713
714
  The scopes to include in the token request.
714
715
  """
715
- tenant_id: NotRequired[pulumi.Input[str]]
716
+ tenant_id: NotRequired[pulumi.Input[builtins.str]]
716
717
  """
717
718
  Provides the tenant ID to use in a multi-tenant authentication scenario.
718
719
  """
719
- use_root_namespace: NotRequired[pulumi.Input[bool]]
720
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
720
721
  """
721
722
  Authenticate to the root Vault namespace. Conflicts with namespace
722
723
  """
723
- vm_name: NotRequired[pulumi.Input[str]]
724
+ vm_name: NotRequired[pulumi.Input[builtins.str]]
724
725
  """
725
726
  The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
726
727
  """
727
- vmss_name: NotRequired[pulumi.Input[str]]
728
+ vmss_name: NotRequired[pulumi.Input[builtins.str]]
728
729
  """
729
730
  The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
730
731
  """
@@ -734,31 +735,31 @@ elif False:
734
735
  @pulumi.input_type
735
736
  class ProviderAuthLoginAzureArgs:
736
737
  def __init__(__self__, *,
737
- resource_group_name: pulumi.Input[str],
738
- role: pulumi.Input[str],
739
- subscription_id: pulumi.Input[str],
740
- client_id: Optional[pulumi.Input[str]] = None,
741
- jwt: Optional[pulumi.Input[str]] = None,
742
- mount: Optional[pulumi.Input[str]] = None,
743
- namespace: Optional[pulumi.Input[str]] = None,
744
- scope: Optional[pulumi.Input[str]] = None,
745
- tenant_id: Optional[pulumi.Input[str]] = None,
746
- use_root_namespace: Optional[pulumi.Input[bool]] = None,
747
- vm_name: Optional[pulumi.Input[str]] = None,
748
- vmss_name: Optional[pulumi.Input[str]] = None):
749
- """
750
- :param pulumi.Input[str] resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
751
- :param pulumi.Input[str] role: Name of the login role.
752
- :param pulumi.Input[str] subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
753
- :param pulumi.Input[str] client_id: The identity's client ID.
754
- :param pulumi.Input[str] jwt: A signed JSON Web Token. If not specified on will be created automatically
755
- :param pulumi.Input[str] mount: The path where the authentication engine is mounted.
756
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
757
- :param pulumi.Input[str] scope: The scopes to include in the token request.
758
- :param pulumi.Input[str] tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
759
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
760
- :param pulumi.Input[str] vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
761
- :param pulumi.Input[str] vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
738
+ resource_group_name: pulumi.Input[builtins.str],
739
+ role: pulumi.Input[builtins.str],
740
+ subscription_id: pulumi.Input[builtins.str],
741
+ client_id: Optional[pulumi.Input[builtins.str]] = None,
742
+ jwt: Optional[pulumi.Input[builtins.str]] = None,
743
+ mount: Optional[pulumi.Input[builtins.str]] = None,
744
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
745
+ scope: Optional[pulumi.Input[builtins.str]] = None,
746
+ tenant_id: Optional[pulumi.Input[builtins.str]] = None,
747
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None,
748
+ vm_name: Optional[pulumi.Input[builtins.str]] = None,
749
+ vmss_name: Optional[pulumi.Input[builtins.str]] = None):
750
+ """
751
+ :param pulumi.Input[builtins.str] resource_group_name: The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
752
+ :param pulumi.Input[builtins.str] role: Name of the login role.
753
+ :param pulumi.Input[builtins.str] subscription_id: The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
754
+ :param pulumi.Input[builtins.str] client_id: The identity's client ID.
755
+ :param pulumi.Input[builtins.str] jwt: A signed JSON Web Token. If not specified on will be created automatically
756
+ :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
757
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
758
+ :param pulumi.Input[builtins.str] scope: The scopes to include in the token request.
759
+ :param pulumi.Input[builtins.str] tenant_id: Provides the tenant ID to use in a multi-tenant authentication scenario.
760
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
761
+ :param pulumi.Input[builtins.str] vm_name: The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
762
+ :param pulumi.Input[builtins.str] vmss_name: The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
762
763
  """
763
764
  pulumi.set(__self__, "resource_group_name", resource_group_name)
764
765
  pulumi.set(__self__, "role", role)
@@ -784,172 +785,172 @@ class ProviderAuthLoginAzureArgs:
784
785
 
785
786
  @property
786
787
  @pulumi.getter(name="resourceGroupName")
787
- def resource_group_name(self) -> pulumi.Input[str]:
788
+ def resource_group_name(self) -> pulumi.Input[builtins.str]:
788
789
  """
789
790
  The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
790
791
  """
791
792
  return pulumi.get(self, "resource_group_name")
792
793
 
793
794
  @resource_group_name.setter
794
- def resource_group_name(self, value: pulumi.Input[str]):
795
+ def resource_group_name(self, value: pulumi.Input[builtins.str]):
795
796
  pulumi.set(self, "resource_group_name", value)
796
797
 
797
798
  @property
798
799
  @pulumi.getter
799
- def role(self) -> pulumi.Input[str]:
800
+ def role(self) -> pulumi.Input[builtins.str]:
800
801
  """
801
802
  Name of the login role.
802
803
  """
803
804
  return pulumi.get(self, "role")
804
805
 
805
806
  @role.setter
806
- def role(self, value: pulumi.Input[str]):
807
+ def role(self, value: pulumi.Input[builtins.str]):
807
808
  pulumi.set(self, "role", value)
808
809
 
809
810
  @property
810
811
  @pulumi.getter(name="subscriptionId")
811
- def subscription_id(self) -> pulumi.Input[str]:
812
+ def subscription_id(self) -> pulumi.Input[builtins.str]:
812
813
  """
813
814
  The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
814
815
  """
815
816
  return pulumi.get(self, "subscription_id")
816
817
 
817
818
  @subscription_id.setter
818
- def subscription_id(self, value: pulumi.Input[str]):
819
+ def subscription_id(self, value: pulumi.Input[builtins.str]):
819
820
  pulumi.set(self, "subscription_id", value)
820
821
 
821
822
  @property
822
823
  @pulumi.getter(name="clientId")
823
- def client_id(self) -> Optional[pulumi.Input[str]]:
824
+ def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
824
825
  """
825
826
  The identity's client ID.
826
827
  """
827
828
  return pulumi.get(self, "client_id")
828
829
 
829
830
  @client_id.setter
830
- def client_id(self, value: Optional[pulumi.Input[str]]):
831
+ def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
831
832
  pulumi.set(self, "client_id", value)
832
833
 
833
834
  @property
834
835
  @pulumi.getter
835
- def jwt(self) -> Optional[pulumi.Input[str]]:
836
+ def jwt(self) -> Optional[pulumi.Input[builtins.str]]:
836
837
  """
837
838
  A signed JSON Web Token. If not specified on will be created automatically
838
839
  """
839
840
  return pulumi.get(self, "jwt")
840
841
 
841
842
  @jwt.setter
842
- def jwt(self, value: Optional[pulumi.Input[str]]):
843
+ def jwt(self, value: Optional[pulumi.Input[builtins.str]]):
843
844
  pulumi.set(self, "jwt", value)
844
845
 
845
846
  @property
846
847
  @pulumi.getter
847
- def mount(self) -> Optional[pulumi.Input[str]]:
848
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
848
849
  """
849
850
  The path where the authentication engine is mounted.
850
851
  """
851
852
  return pulumi.get(self, "mount")
852
853
 
853
854
  @mount.setter
854
- def mount(self, value: Optional[pulumi.Input[str]]):
855
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
855
856
  pulumi.set(self, "mount", value)
856
857
 
857
858
  @property
858
859
  @pulumi.getter
859
- def namespace(self) -> Optional[pulumi.Input[str]]:
860
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
860
861
  """
861
862
  The authentication engine's namespace. Conflicts with use_root_namespace
862
863
  """
863
864
  return pulumi.get(self, "namespace")
864
865
 
865
866
  @namespace.setter
866
- def namespace(self, value: Optional[pulumi.Input[str]]):
867
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
867
868
  pulumi.set(self, "namespace", value)
868
869
 
869
870
  @property
870
871
  @pulumi.getter
871
- def scope(self) -> Optional[pulumi.Input[str]]:
872
+ def scope(self) -> Optional[pulumi.Input[builtins.str]]:
872
873
  """
873
874
  The scopes to include in the token request.
874
875
  """
875
876
  return pulumi.get(self, "scope")
876
877
 
877
878
  @scope.setter
878
- def scope(self, value: Optional[pulumi.Input[str]]):
879
+ def scope(self, value: Optional[pulumi.Input[builtins.str]]):
879
880
  pulumi.set(self, "scope", value)
880
881
 
881
882
  @property
882
883
  @pulumi.getter(name="tenantId")
883
- def tenant_id(self) -> Optional[pulumi.Input[str]]:
884
+ def tenant_id(self) -> Optional[pulumi.Input[builtins.str]]:
884
885
  """
885
886
  Provides the tenant ID to use in a multi-tenant authentication scenario.
886
887
  """
887
888
  return pulumi.get(self, "tenant_id")
888
889
 
889
890
  @tenant_id.setter
890
- def tenant_id(self, value: Optional[pulumi.Input[str]]):
891
+ def tenant_id(self, value: Optional[pulumi.Input[builtins.str]]):
891
892
  pulumi.set(self, "tenant_id", value)
892
893
 
893
894
  @property
894
895
  @pulumi.getter(name="useRootNamespace")
895
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
896
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
896
897
  """
897
898
  Authenticate to the root Vault namespace. Conflicts with namespace
898
899
  """
899
900
  return pulumi.get(self, "use_root_namespace")
900
901
 
901
902
  @use_root_namespace.setter
902
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
903
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
903
904
  pulumi.set(self, "use_root_namespace", value)
904
905
 
905
906
  @property
906
907
  @pulumi.getter(name="vmName")
907
- def vm_name(self) -> Optional[pulumi.Input[str]]:
908
+ def vm_name(self) -> Optional[pulumi.Input[builtins.str]]:
908
909
  """
909
910
  The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
910
911
  """
911
912
  return pulumi.get(self, "vm_name")
912
913
 
913
914
  @vm_name.setter
914
- def vm_name(self, value: Optional[pulumi.Input[str]]):
915
+ def vm_name(self, value: Optional[pulumi.Input[builtins.str]]):
915
916
  pulumi.set(self, "vm_name", value)
916
917
 
917
918
  @property
918
919
  @pulumi.getter(name="vmssName")
919
- def vmss_name(self) -> Optional[pulumi.Input[str]]:
920
+ def vmss_name(self) -> Optional[pulumi.Input[builtins.str]]:
920
921
  """
921
922
  The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
922
923
  """
923
924
  return pulumi.get(self, "vmss_name")
924
925
 
925
926
  @vmss_name.setter
926
- def vmss_name(self, value: Optional[pulumi.Input[str]]):
927
+ def vmss_name(self, value: Optional[pulumi.Input[builtins.str]]):
927
928
  pulumi.set(self, "vmss_name", value)
928
929
 
929
930
 
930
931
  if not MYPY:
931
932
  class ProviderAuthLoginCertArgsDict(TypedDict):
932
- cert_file: pulumi.Input[str]
933
+ cert_file: pulumi.Input[builtins.str]
933
934
  """
934
935
  Path to a file containing the client certificate.
935
936
  """
936
- key_file: pulumi.Input[str]
937
+ key_file: pulumi.Input[builtins.str]
937
938
  """
938
939
  Path to a file containing the private key that the certificate was issued for.
939
940
  """
940
- mount: NotRequired[pulumi.Input[str]]
941
+ mount: NotRequired[pulumi.Input[builtins.str]]
941
942
  """
942
943
  The path where the authentication engine is mounted.
943
944
  """
944
- name: NotRequired[pulumi.Input[str]]
945
+ name: NotRequired[pulumi.Input[builtins.str]]
945
946
  """
946
947
  Name of the certificate's role
947
948
  """
948
- namespace: NotRequired[pulumi.Input[str]]
949
+ namespace: NotRequired[pulumi.Input[builtins.str]]
949
950
  """
950
951
  The authentication engine's namespace. Conflicts with use_root_namespace
951
952
  """
952
- use_root_namespace: NotRequired[pulumi.Input[bool]]
953
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
953
954
  """
954
955
  Authenticate to the root Vault namespace. Conflicts with namespace
955
956
  """
@@ -959,19 +960,19 @@ elif False:
959
960
  @pulumi.input_type
960
961
  class ProviderAuthLoginCertArgs:
961
962
  def __init__(__self__, *,
962
- cert_file: pulumi.Input[str],
963
- key_file: pulumi.Input[str],
964
- mount: Optional[pulumi.Input[str]] = None,
965
- name: Optional[pulumi.Input[str]] = None,
966
- namespace: Optional[pulumi.Input[str]] = None,
967
- use_root_namespace: Optional[pulumi.Input[bool]] = None):
968
- """
969
- :param pulumi.Input[str] cert_file: Path to a file containing the client certificate.
970
- :param pulumi.Input[str] key_file: Path to a file containing the private key that the certificate was issued for.
971
- :param pulumi.Input[str] mount: The path where the authentication engine is mounted.
972
- :param pulumi.Input[str] name: Name of the certificate's role
973
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
974
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
963
+ cert_file: pulumi.Input[builtins.str],
964
+ key_file: pulumi.Input[builtins.str],
965
+ mount: Optional[pulumi.Input[builtins.str]] = None,
966
+ name: Optional[pulumi.Input[builtins.str]] = None,
967
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
968
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
969
+ """
970
+ :param pulumi.Input[builtins.str] cert_file: Path to a file containing the client certificate.
971
+ :param pulumi.Input[builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
972
+ :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
973
+ :param pulumi.Input[builtins.str] name: Name of the certificate's role
974
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
975
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
975
976
  """
976
977
  pulumi.set(__self__, "cert_file", cert_file)
977
978
  pulumi.set(__self__, "key_file", key_file)
@@ -986,104 +987,104 @@ class ProviderAuthLoginCertArgs:
986
987
 
987
988
  @property
988
989
  @pulumi.getter(name="certFile")
989
- def cert_file(self) -> pulumi.Input[str]:
990
+ def cert_file(self) -> pulumi.Input[builtins.str]:
990
991
  """
991
992
  Path to a file containing the client certificate.
992
993
  """
993
994
  return pulumi.get(self, "cert_file")
994
995
 
995
996
  @cert_file.setter
996
- def cert_file(self, value: pulumi.Input[str]):
997
+ def cert_file(self, value: pulumi.Input[builtins.str]):
997
998
  pulumi.set(self, "cert_file", value)
998
999
 
999
1000
  @property
1000
1001
  @pulumi.getter(name="keyFile")
1001
- def key_file(self) -> pulumi.Input[str]:
1002
+ def key_file(self) -> pulumi.Input[builtins.str]:
1002
1003
  """
1003
1004
  Path to a file containing the private key that the certificate was issued for.
1004
1005
  """
1005
1006
  return pulumi.get(self, "key_file")
1006
1007
 
1007
1008
  @key_file.setter
1008
- def key_file(self, value: pulumi.Input[str]):
1009
+ def key_file(self, value: pulumi.Input[builtins.str]):
1009
1010
  pulumi.set(self, "key_file", value)
1010
1011
 
1011
1012
  @property
1012
1013
  @pulumi.getter
1013
- def mount(self) -> Optional[pulumi.Input[str]]:
1014
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1014
1015
  """
1015
1016
  The path where the authentication engine is mounted.
1016
1017
  """
1017
1018
  return pulumi.get(self, "mount")
1018
1019
 
1019
1020
  @mount.setter
1020
- def mount(self, value: Optional[pulumi.Input[str]]):
1021
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1021
1022
  pulumi.set(self, "mount", value)
1022
1023
 
1023
1024
  @property
1024
1025
  @pulumi.getter
1025
- def name(self) -> Optional[pulumi.Input[str]]:
1026
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
1026
1027
  """
1027
1028
  Name of the certificate's role
1028
1029
  """
1029
1030
  return pulumi.get(self, "name")
1030
1031
 
1031
1032
  @name.setter
1032
- def name(self, value: Optional[pulumi.Input[str]]):
1033
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
1033
1034
  pulumi.set(self, "name", value)
1034
1035
 
1035
1036
  @property
1036
1037
  @pulumi.getter
1037
- def namespace(self) -> Optional[pulumi.Input[str]]:
1038
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1038
1039
  """
1039
1040
  The authentication engine's namespace. Conflicts with use_root_namespace
1040
1041
  """
1041
1042
  return pulumi.get(self, "namespace")
1042
1043
 
1043
1044
  @namespace.setter
1044
- def namespace(self, value: Optional[pulumi.Input[str]]):
1045
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1045
1046
  pulumi.set(self, "namespace", value)
1046
1047
 
1047
1048
  @property
1048
1049
  @pulumi.getter(name="useRootNamespace")
1049
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
1050
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1050
1051
  """
1051
1052
  Authenticate to the root Vault namespace. Conflicts with namespace
1052
1053
  """
1053
1054
  return pulumi.get(self, "use_root_namespace")
1054
1055
 
1055
1056
  @use_root_namespace.setter
1056
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
1057
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1057
1058
  pulumi.set(self, "use_root_namespace", value)
1058
1059
 
1059
1060
 
1060
1061
  if not MYPY:
1061
1062
  class ProviderAuthLoginGcpArgsDict(TypedDict):
1062
- role: pulumi.Input[str]
1063
+ role: pulumi.Input[builtins.str]
1063
1064
  """
1064
1065
  Name of the login role.
1065
1066
  """
1066
- credentials: NotRequired[pulumi.Input[str]]
1067
+ credentials: NotRequired[pulumi.Input[builtins.str]]
1067
1068
  """
1068
1069
  Path to the Google Cloud credentials file.
1069
1070
  """
1070
- jwt: NotRequired[pulumi.Input[str]]
1071
+ jwt: NotRequired[pulumi.Input[builtins.str]]
1071
1072
  """
1072
1073
  A signed JSON Web Token.
1073
1074
  """
1074
- mount: NotRequired[pulumi.Input[str]]
1075
+ mount: NotRequired[pulumi.Input[builtins.str]]
1075
1076
  """
1076
1077
  The path where the authentication engine is mounted.
1077
1078
  """
1078
- namespace: NotRequired[pulumi.Input[str]]
1079
+ namespace: NotRequired[pulumi.Input[builtins.str]]
1079
1080
  """
1080
1081
  The authentication engine's namespace. Conflicts with use_root_namespace
1081
1082
  """
1082
- service_account: NotRequired[pulumi.Input[str]]
1083
+ service_account: NotRequired[pulumi.Input[builtins.str]]
1083
1084
  """
1084
1085
  IAM service account.
1085
1086
  """
1086
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1087
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1087
1088
  """
1088
1089
  Authenticate to the root Vault namespace. Conflicts with namespace
1089
1090
  """
@@ -1093,21 +1094,21 @@ elif False:
1093
1094
  @pulumi.input_type
1094
1095
  class ProviderAuthLoginGcpArgs:
1095
1096
  def __init__(__self__, *,
1096
- role: pulumi.Input[str],
1097
- credentials: Optional[pulumi.Input[str]] = None,
1098
- jwt: Optional[pulumi.Input[str]] = None,
1099
- mount: Optional[pulumi.Input[str]] = None,
1100
- namespace: Optional[pulumi.Input[str]] = None,
1101
- service_account: Optional[pulumi.Input[str]] = None,
1102
- use_root_namespace: Optional[pulumi.Input[bool]] = None):
1103
- """
1104
- :param pulumi.Input[str] role: Name of the login role.
1105
- :param pulumi.Input[str] credentials: Path to the Google Cloud credentials file.
1106
- :param pulumi.Input[str] jwt: A signed JSON Web Token.
1107
- :param pulumi.Input[str] mount: The path where the authentication engine is mounted.
1108
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1109
- :param pulumi.Input[str] service_account: IAM service account.
1110
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1097
+ role: pulumi.Input[builtins.str],
1098
+ credentials: Optional[pulumi.Input[builtins.str]] = None,
1099
+ jwt: Optional[pulumi.Input[builtins.str]] = None,
1100
+ mount: Optional[pulumi.Input[builtins.str]] = None,
1101
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1102
+ service_account: Optional[pulumi.Input[builtins.str]] = None,
1103
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
1104
+ """
1105
+ :param pulumi.Input[builtins.str] role: Name of the login role.
1106
+ :param pulumi.Input[builtins.str] credentials: Path to the Google Cloud credentials file.
1107
+ :param pulumi.Input[builtins.str] jwt: A signed JSON Web Token.
1108
+ :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1109
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1110
+ :param pulumi.Input[builtins.str] service_account: IAM service account.
1111
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1111
1112
  """
1112
1113
  pulumi.set(__self__, "role", role)
1113
1114
  if credentials is not None:
@@ -1125,108 +1126,108 @@ class ProviderAuthLoginGcpArgs:
1125
1126
 
1126
1127
  @property
1127
1128
  @pulumi.getter
1128
- def role(self) -> pulumi.Input[str]:
1129
+ def role(self) -> pulumi.Input[builtins.str]:
1129
1130
  """
1130
1131
  Name of the login role.
1131
1132
  """
1132
1133
  return pulumi.get(self, "role")
1133
1134
 
1134
1135
  @role.setter
1135
- def role(self, value: pulumi.Input[str]):
1136
+ def role(self, value: pulumi.Input[builtins.str]):
1136
1137
  pulumi.set(self, "role", value)
1137
1138
 
1138
1139
  @property
1139
1140
  @pulumi.getter
1140
- def credentials(self) -> Optional[pulumi.Input[str]]:
1141
+ def credentials(self) -> Optional[pulumi.Input[builtins.str]]:
1141
1142
  """
1142
1143
  Path to the Google Cloud credentials file.
1143
1144
  """
1144
1145
  return pulumi.get(self, "credentials")
1145
1146
 
1146
1147
  @credentials.setter
1147
- def credentials(self, value: Optional[pulumi.Input[str]]):
1148
+ def credentials(self, value: Optional[pulumi.Input[builtins.str]]):
1148
1149
  pulumi.set(self, "credentials", value)
1149
1150
 
1150
1151
  @property
1151
1152
  @pulumi.getter
1152
- def jwt(self) -> Optional[pulumi.Input[str]]:
1153
+ def jwt(self) -> Optional[pulumi.Input[builtins.str]]:
1153
1154
  """
1154
1155
  A signed JSON Web Token.
1155
1156
  """
1156
1157
  return pulumi.get(self, "jwt")
1157
1158
 
1158
1159
  @jwt.setter
1159
- def jwt(self, value: Optional[pulumi.Input[str]]):
1160
+ def jwt(self, value: Optional[pulumi.Input[builtins.str]]):
1160
1161
  pulumi.set(self, "jwt", value)
1161
1162
 
1162
1163
  @property
1163
1164
  @pulumi.getter
1164
- def mount(self) -> Optional[pulumi.Input[str]]:
1165
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1165
1166
  """
1166
1167
  The path where the authentication engine is mounted.
1167
1168
  """
1168
1169
  return pulumi.get(self, "mount")
1169
1170
 
1170
1171
  @mount.setter
1171
- def mount(self, value: Optional[pulumi.Input[str]]):
1172
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1172
1173
  pulumi.set(self, "mount", value)
1173
1174
 
1174
1175
  @property
1175
1176
  @pulumi.getter
1176
- def namespace(self) -> Optional[pulumi.Input[str]]:
1177
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1177
1178
  """
1178
1179
  The authentication engine's namespace. Conflicts with use_root_namespace
1179
1180
  """
1180
1181
  return pulumi.get(self, "namespace")
1181
1182
 
1182
1183
  @namespace.setter
1183
- def namespace(self, value: Optional[pulumi.Input[str]]):
1184
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1184
1185
  pulumi.set(self, "namespace", value)
1185
1186
 
1186
1187
  @property
1187
1188
  @pulumi.getter(name="serviceAccount")
1188
- def service_account(self) -> Optional[pulumi.Input[str]]:
1189
+ def service_account(self) -> Optional[pulumi.Input[builtins.str]]:
1189
1190
  """
1190
1191
  IAM service account.
1191
1192
  """
1192
1193
  return pulumi.get(self, "service_account")
1193
1194
 
1194
1195
  @service_account.setter
1195
- def service_account(self, value: Optional[pulumi.Input[str]]):
1196
+ def service_account(self, value: Optional[pulumi.Input[builtins.str]]):
1196
1197
  pulumi.set(self, "service_account", value)
1197
1198
 
1198
1199
  @property
1199
1200
  @pulumi.getter(name="useRootNamespace")
1200
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
1201
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1201
1202
  """
1202
1203
  Authenticate to the root Vault namespace. Conflicts with namespace
1203
1204
  """
1204
1205
  return pulumi.get(self, "use_root_namespace")
1205
1206
 
1206
1207
  @use_root_namespace.setter
1207
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
1208
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1208
1209
  pulumi.set(self, "use_root_namespace", value)
1209
1210
 
1210
1211
 
1211
1212
  if not MYPY:
1212
1213
  class ProviderAuthLoginJwtArgsDict(TypedDict):
1213
- jwt: pulumi.Input[str]
1214
+ jwt: pulumi.Input[builtins.str]
1214
1215
  """
1215
1216
  A signed JSON Web Token.
1216
1217
  """
1217
- role: pulumi.Input[str]
1218
+ role: pulumi.Input[builtins.str]
1218
1219
  """
1219
1220
  Name of the login role.
1220
1221
  """
1221
- mount: NotRequired[pulumi.Input[str]]
1222
+ mount: NotRequired[pulumi.Input[builtins.str]]
1222
1223
  """
1223
1224
  The path where the authentication engine is mounted.
1224
1225
  """
1225
- namespace: NotRequired[pulumi.Input[str]]
1226
+ namespace: NotRequired[pulumi.Input[builtins.str]]
1226
1227
  """
1227
1228
  The authentication engine's namespace. Conflicts with use_root_namespace
1228
1229
  """
1229
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1230
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1230
1231
  """
1231
1232
  Authenticate to the root Vault namespace. Conflicts with namespace
1232
1233
  """
@@ -1236,17 +1237,17 @@ elif False:
1236
1237
  @pulumi.input_type
1237
1238
  class ProviderAuthLoginJwtArgs:
1238
1239
  def __init__(__self__, *,
1239
- jwt: pulumi.Input[str],
1240
- role: pulumi.Input[str],
1241
- mount: Optional[pulumi.Input[str]] = None,
1242
- namespace: Optional[pulumi.Input[str]] = None,
1243
- use_root_namespace: Optional[pulumi.Input[bool]] = None):
1244
- """
1245
- :param pulumi.Input[str] jwt: A signed JSON Web Token.
1246
- :param pulumi.Input[str] role: Name of the login role.
1247
- :param pulumi.Input[str] mount: The path where the authentication engine is mounted.
1248
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1249
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1240
+ jwt: pulumi.Input[builtins.str],
1241
+ role: pulumi.Input[builtins.str],
1242
+ mount: Optional[pulumi.Input[builtins.str]] = None,
1243
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1244
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
1245
+ """
1246
+ :param pulumi.Input[builtins.str] jwt: A signed JSON Web Token.
1247
+ :param pulumi.Input[builtins.str] role: Name of the login role.
1248
+ :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1249
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1250
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1250
1251
  """
1251
1252
  pulumi.set(__self__, "jwt", jwt)
1252
1253
  pulumi.set(__self__, "role", role)
@@ -1259,108 +1260,108 @@ class ProviderAuthLoginJwtArgs:
1259
1260
 
1260
1261
  @property
1261
1262
  @pulumi.getter
1262
- def jwt(self) -> pulumi.Input[str]:
1263
+ def jwt(self) -> pulumi.Input[builtins.str]:
1263
1264
  """
1264
1265
  A signed JSON Web Token.
1265
1266
  """
1266
1267
  return pulumi.get(self, "jwt")
1267
1268
 
1268
1269
  @jwt.setter
1269
- def jwt(self, value: pulumi.Input[str]):
1270
+ def jwt(self, value: pulumi.Input[builtins.str]):
1270
1271
  pulumi.set(self, "jwt", value)
1271
1272
 
1272
1273
  @property
1273
1274
  @pulumi.getter
1274
- def role(self) -> pulumi.Input[str]:
1275
+ def role(self) -> pulumi.Input[builtins.str]:
1275
1276
  """
1276
1277
  Name of the login role.
1277
1278
  """
1278
1279
  return pulumi.get(self, "role")
1279
1280
 
1280
1281
  @role.setter
1281
- def role(self, value: pulumi.Input[str]):
1282
+ def role(self, value: pulumi.Input[builtins.str]):
1282
1283
  pulumi.set(self, "role", value)
1283
1284
 
1284
1285
  @property
1285
1286
  @pulumi.getter
1286
- def mount(self) -> Optional[pulumi.Input[str]]:
1287
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1287
1288
  """
1288
1289
  The path where the authentication engine is mounted.
1289
1290
  """
1290
1291
  return pulumi.get(self, "mount")
1291
1292
 
1292
1293
  @mount.setter
1293
- def mount(self, value: Optional[pulumi.Input[str]]):
1294
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1294
1295
  pulumi.set(self, "mount", value)
1295
1296
 
1296
1297
  @property
1297
1298
  @pulumi.getter
1298
- def namespace(self) -> Optional[pulumi.Input[str]]:
1299
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1299
1300
  """
1300
1301
  The authentication engine's namespace. Conflicts with use_root_namespace
1301
1302
  """
1302
1303
  return pulumi.get(self, "namespace")
1303
1304
 
1304
1305
  @namespace.setter
1305
- def namespace(self, value: Optional[pulumi.Input[str]]):
1306
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1306
1307
  pulumi.set(self, "namespace", value)
1307
1308
 
1308
1309
  @property
1309
1310
  @pulumi.getter(name="useRootNamespace")
1310
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
1311
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1311
1312
  """
1312
1313
  Authenticate to the root Vault namespace. Conflicts with namespace
1313
1314
  """
1314
1315
  return pulumi.get(self, "use_root_namespace")
1315
1316
 
1316
1317
  @use_root_namespace.setter
1317
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
1318
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1318
1319
  pulumi.set(self, "use_root_namespace", value)
1319
1320
 
1320
1321
 
1321
1322
  if not MYPY:
1322
1323
  class ProviderAuthLoginKerberosArgsDict(TypedDict):
1323
- disable_fast_negotiation: NotRequired[pulumi.Input[bool]]
1324
+ disable_fast_negotiation: NotRequired[pulumi.Input[builtins.bool]]
1324
1325
  """
1325
1326
  Disable the Kerberos FAST negotiation.
1326
1327
  """
1327
- keytab_path: NotRequired[pulumi.Input[str]]
1328
+ keytab_path: NotRequired[pulumi.Input[builtins.str]]
1328
1329
  """
1329
1330
  The Kerberos keytab file containing the entry of the login entity.
1330
1331
  """
1331
- krb5conf_path: NotRequired[pulumi.Input[str]]
1332
+ krb5conf_path: NotRequired[pulumi.Input[builtins.str]]
1332
1333
  """
1333
1334
  A valid Kerberos configuration file e.g. /etc/krb5.conf.
1334
1335
  """
1335
- mount: NotRequired[pulumi.Input[str]]
1336
+ mount: NotRequired[pulumi.Input[builtins.str]]
1336
1337
  """
1337
1338
  The path where the authentication engine is mounted.
1338
1339
  """
1339
- namespace: NotRequired[pulumi.Input[str]]
1340
+ namespace: NotRequired[pulumi.Input[builtins.str]]
1340
1341
  """
1341
1342
  The authentication engine's namespace. Conflicts with use_root_namespace
1342
1343
  """
1343
- realm: NotRequired[pulumi.Input[str]]
1344
+ realm: NotRequired[pulumi.Input[builtins.str]]
1344
1345
  """
1345
1346
  The Kerberos server's authoritative authentication domain
1346
1347
  """
1347
- remove_instance_name: NotRequired[pulumi.Input[bool]]
1348
+ remove_instance_name: NotRequired[pulumi.Input[builtins.bool]]
1348
1349
  """
1349
1350
  Strip the host from the username found in the keytab.
1350
1351
  """
1351
- service: NotRequired[pulumi.Input[str]]
1352
+ service: NotRequired[pulumi.Input[builtins.str]]
1352
1353
  """
1353
1354
  The service principle name.
1354
1355
  """
1355
- token: NotRequired[pulumi.Input[str]]
1356
+ token: NotRequired[pulumi.Input[builtins.str]]
1356
1357
  """
1357
1358
  Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1358
1359
  """
1359
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1360
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1360
1361
  """
1361
1362
  Authenticate to the root Vault namespace. Conflicts with namespace
1362
1363
  """
1363
- username: NotRequired[pulumi.Input[str]]
1364
+ username: NotRequired[pulumi.Input[builtins.str]]
1364
1365
  """
1365
1366
  The username to login into Kerberos with.
1366
1367
  """
@@ -1370,29 +1371,29 @@ elif False:
1370
1371
  @pulumi.input_type
1371
1372
  class ProviderAuthLoginKerberosArgs:
1372
1373
  def __init__(__self__, *,
1373
- disable_fast_negotiation: Optional[pulumi.Input[bool]] = None,
1374
- keytab_path: Optional[pulumi.Input[str]] = None,
1375
- krb5conf_path: Optional[pulumi.Input[str]] = None,
1376
- mount: Optional[pulumi.Input[str]] = None,
1377
- namespace: Optional[pulumi.Input[str]] = None,
1378
- realm: Optional[pulumi.Input[str]] = None,
1379
- remove_instance_name: Optional[pulumi.Input[bool]] = None,
1380
- service: Optional[pulumi.Input[str]] = None,
1381
- token: Optional[pulumi.Input[str]] = None,
1382
- use_root_namespace: Optional[pulumi.Input[bool]] = None,
1383
- username: Optional[pulumi.Input[str]] = None):
1384
- """
1385
- :param pulumi.Input[bool] disable_fast_negotiation: Disable the Kerberos FAST negotiation.
1386
- :param pulumi.Input[str] keytab_path: The Kerberos keytab file containing the entry of the login entity.
1387
- :param pulumi.Input[str] krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
1388
- :param pulumi.Input[str] mount: The path where the authentication engine is mounted.
1389
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1390
- :param pulumi.Input[str] realm: The Kerberos server's authoritative authentication domain
1391
- :param pulumi.Input[bool] remove_instance_name: Strip the host from the username found in the keytab.
1392
- :param pulumi.Input[str] service: The service principle name.
1393
- :param pulumi.Input[str] token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1394
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1395
- :param pulumi.Input[str] username: The username to login into Kerberos with.
1374
+ disable_fast_negotiation: Optional[pulumi.Input[builtins.bool]] = None,
1375
+ keytab_path: Optional[pulumi.Input[builtins.str]] = None,
1376
+ krb5conf_path: Optional[pulumi.Input[builtins.str]] = None,
1377
+ mount: Optional[pulumi.Input[builtins.str]] = None,
1378
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1379
+ realm: Optional[pulumi.Input[builtins.str]] = None,
1380
+ remove_instance_name: Optional[pulumi.Input[builtins.bool]] = None,
1381
+ service: Optional[pulumi.Input[builtins.str]] = None,
1382
+ token: Optional[pulumi.Input[builtins.str]] = None,
1383
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None,
1384
+ username: Optional[pulumi.Input[builtins.str]] = None):
1385
+ """
1386
+ :param pulumi.Input[builtins.bool] disable_fast_negotiation: Disable the Kerberos FAST negotiation.
1387
+ :param pulumi.Input[builtins.str] keytab_path: The Kerberos keytab file containing the entry of the login entity.
1388
+ :param pulumi.Input[builtins.str] krb5conf_path: A valid Kerberos configuration file e.g. /etc/krb5.conf.
1389
+ :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1390
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1391
+ :param pulumi.Input[builtins.str] realm: The Kerberos server's authoritative authentication domain
1392
+ :param pulumi.Input[builtins.bool] remove_instance_name: Strip the host from the username found in the keytab.
1393
+ :param pulumi.Input[builtins.str] service: The service principle name.
1394
+ :param pulumi.Input[builtins.str] token: Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1395
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1396
+ :param pulumi.Input[builtins.str] username: The username to login into Kerberos with.
1396
1397
  """
1397
1398
  if disable_fast_negotiation is not None:
1398
1399
  pulumi.set(__self__, "disable_fast_negotiation", disable_fast_negotiation)
@@ -1419,156 +1420,156 @@ class ProviderAuthLoginKerberosArgs:
1419
1420
 
1420
1421
  @property
1421
1422
  @pulumi.getter(name="disableFastNegotiation")
1422
- def disable_fast_negotiation(self) -> Optional[pulumi.Input[bool]]:
1423
+ def disable_fast_negotiation(self) -> Optional[pulumi.Input[builtins.bool]]:
1423
1424
  """
1424
1425
  Disable the Kerberos FAST negotiation.
1425
1426
  """
1426
1427
  return pulumi.get(self, "disable_fast_negotiation")
1427
1428
 
1428
1429
  @disable_fast_negotiation.setter
1429
- def disable_fast_negotiation(self, value: Optional[pulumi.Input[bool]]):
1430
+ def disable_fast_negotiation(self, value: Optional[pulumi.Input[builtins.bool]]):
1430
1431
  pulumi.set(self, "disable_fast_negotiation", value)
1431
1432
 
1432
1433
  @property
1433
1434
  @pulumi.getter(name="keytabPath")
1434
- def keytab_path(self) -> Optional[pulumi.Input[str]]:
1435
+ def keytab_path(self) -> Optional[pulumi.Input[builtins.str]]:
1435
1436
  """
1436
1437
  The Kerberos keytab file containing the entry of the login entity.
1437
1438
  """
1438
1439
  return pulumi.get(self, "keytab_path")
1439
1440
 
1440
1441
  @keytab_path.setter
1441
- def keytab_path(self, value: Optional[pulumi.Input[str]]):
1442
+ def keytab_path(self, value: Optional[pulumi.Input[builtins.str]]):
1442
1443
  pulumi.set(self, "keytab_path", value)
1443
1444
 
1444
1445
  @property
1445
1446
  @pulumi.getter(name="krb5confPath")
1446
- def krb5conf_path(self) -> Optional[pulumi.Input[str]]:
1447
+ def krb5conf_path(self) -> Optional[pulumi.Input[builtins.str]]:
1447
1448
  """
1448
1449
  A valid Kerberos configuration file e.g. /etc/krb5.conf.
1449
1450
  """
1450
1451
  return pulumi.get(self, "krb5conf_path")
1451
1452
 
1452
1453
  @krb5conf_path.setter
1453
- def krb5conf_path(self, value: Optional[pulumi.Input[str]]):
1454
+ def krb5conf_path(self, value: Optional[pulumi.Input[builtins.str]]):
1454
1455
  pulumi.set(self, "krb5conf_path", value)
1455
1456
 
1456
1457
  @property
1457
1458
  @pulumi.getter
1458
- def mount(self) -> Optional[pulumi.Input[str]]:
1459
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1459
1460
  """
1460
1461
  The path where the authentication engine is mounted.
1461
1462
  """
1462
1463
  return pulumi.get(self, "mount")
1463
1464
 
1464
1465
  @mount.setter
1465
- def mount(self, value: Optional[pulumi.Input[str]]):
1466
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1466
1467
  pulumi.set(self, "mount", value)
1467
1468
 
1468
1469
  @property
1469
1470
  @pulumi.getter
1470
- def namespace(self) -> Optional[pulumi.Input[str]]:
1471
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1471
1472
  """
1472
1473
  The authentication engine's namespace. Conflicts with use_root_namespace
1473
1474
  """
1474
1475
  return pulumi.get(self, "namespace")
1475
1476
 
1476
1477
  @namespace.setter
1477
- def namespace(self, value: Optional[pulumi.Input[str]]):
1478
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1478
1479
  pulumi.set(self, "namespace", value)
1479
1480
 
1480
1481
  @property
1481
1482
  @pulumi.getter
1482
- def realm(self) -> Optional[pulumi.Input[str]]:
1483
+ def realm(self) -> Optional[pulumi.Input[builtins.str]]:
1483
1484
  """
1484
1485
  The Kerberos server's authoritative authentication domain
1485
1486
  """
1486
1487
  return pulumi.get(self, "realm")
1487
1488
 
1488
1489
  @realm.setter
1489
- def realm(self, value: Optional[pulumi.Input[str]]):
1490
+ def realm(self, value: Optional[pulumi.Input[builtins.str]]):
1490
1491
  pulumi.set(self, "realm", value)
1491
1492
 
1492
1493
  @property
1493
1494
  @pulumi.getter(name="removeInstanceName")
1494
- def remove_instance_name(self) -> Optional[pulumi.Input[bool]]:
1495
+ def remove_instance_name(self) -> Optional[pulumi.Input[builtins.bool]]:
1495
1496
  """
1496
1497
  Strip the host from the username found in the keytab.
1497
1498
  """
1498
1499
  return pulumi.get(self, "remove_instance_name")
1499
1500
 
1500
1501
  @remove_instance_name.setter
1501
- def remove_instance_name(self, value: Optional[pulumi.Input[bool]]):
1502
+ def remove_instance_name(self, value: Optional[pulumi.Input[builtins.bool]]):
1502
1503
  pulumi.set(self, "remove_instance_name", value)
1503
1504
 
1504
1505
  @property
1505
1506
  @pulumi.getter
1506
- def service(self) -> Optional[pulumi.Input[str]]:
1507
+ def service(self) -> Optional[pulumi.Input[builtins.str]]:
1507
1508
  """
1508
1509
  The service principle name.
1509
1510
  """
1510
1511
  return pulumi.get(self, "service")
1511
1512
 
1512
1513
  @service.setter
1513
- def service(self, value: Optional[pulumi.Input[str]]):
1514
+ def service(self, value: Optional[pulumi.Input[builtins.str]]):
1514
1515
  pulumi.set(self, "service", value)
1515
1516
 
1516
1517
  @property
1517
1518
  @pulumi.getter
1518
- def token(self) -> Optional[pulumi.Input[str]]:
1519
+ def token(self) -> Optional[pulumi.Input[builtins.str]]:
1519
1520
  """
1520
1521
  Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
1521
1522
  """
1522
1523
  return pulumi.get(self, "token")
1523
1524
 
1524
1525
  @token.setter
1525
- def token(self, value: Optional[pulumi.Input[str]]):
1526
+ def token(self, value: Optional[pulumi.Input[builtins.str]]):
1526
1527
  pulumi.set(self, "token", value)
1527
1528
 
1528
1529
  @property
1529
1530
  @pulumi.getter(name="useRootNamespace")
1530
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
1531
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1531
1532
  """
1532
1533
  Authenticate to the root Vault namespace. Conflicts with namespace
1533
1534
  """
1534
1535
  return pulumi.get(self, "use_root_namespace")
1535
1536
 
1536
1537
  @use_root_namespace.setter
1537
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
1538
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1538
1539
  pulumi.set(self, "use_root_namespace", value)
1539
1540
 
1540
1541
  @property
1541
1542
  @pulumi.getter
1542
- def username(self) -> Optional[pulumi.Input[str]]:
1543
+ def username(self) -> Optional[pulumi.Input[builtins.str]]:
1543
1544
  """
1544
1545
  The username to login into Kerberos with.
1545
1546
  """
1546
1547
  return pulumi.get(self, "username")
1547
1548
 
1548
1549
  @username.setter
1549
- def username(self, value: Optional[pulumi.Input[str]]):
1550
+ def username(self, value: Optional[pulumi.Input[builtins.str]]):
1550
1551
  pulumi.set(self, "username", value)
1551
1552
 
1552
1553
 
1553
1554
  if not MYPY:
1554
1555
  class ProviderAuthLoginOciArgsDict(TypedDict):
1555
- auth_type: pulumi.Input[str]
1556
+ auth_type: pulumi.Input[builtins.str]
1556
1557
  """
1557
1558
  Authentication type to use when getting OCI credentials.
1558
1559
  """
1559
- role: pulumi.Input[str]
1560
+ role: pulumi.Input[builtins.str]
1560
1561
  """
1561
1562
  Name of the login role.
1562
1563
  """
1563
- mount: NotRequired[pulumi.Input[str]]
1564
+ mount: NotRequired[pulumi.Input[builtins.str]]
1564
1565
  """
1565
1566
  The path where the authentication engine is mounted.
1566
1567
  """
1567
- namespace: NotRequired[pulumi.Input[str]]
1568
+ namespace: NotRequired[pulumi.Input[builtins.str]]
1568
1569
  """
1569
1570
  The authentication engine's namespace. Conflicts with use_root_namespace
1570
1571
  """
1571
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1572
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1572
1573
  """
1573
1574
  Authenticate to the root Vault namespace. Conflicts with namespace
1574
1575
  """
@@ -1578,17 +1579,17 @@ elif False:
1578
1579
  @pulumi.input_type
1579
1580
  class ProviderAuthLoginOciArgs:
1580
1581
  def __init__(__self__, *,
1581
- auth_type: pulumi.Input[str],
1582
- role: pulumi.Input[str],
1583
- mount: Optional[pulumi.Input[str]] = None,
1584
- namespace: Optional[pulumi.Input[str]] = None,
1585
- use_root_namespace: Optional[pulumi.Input[bool]] = None):
1586
- """
1587
- :param pulumi.Input[str] auth_type: Authentication type to use when getting OCI credentials.
1588
- :param pulumi.Input[str] role: Name of the login role.
1589
- :param pulumi.Input[str] mount: The path where the authentication engine is mounted.
1590
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1591
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1582
+ auth_type: pulumi.Input[builtins.str],
1583
+ role: pulumi.Input[builtins.str],
1584
+ mount: Optional[pulumi.Input[builtins.str]] = None,
1585
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1586
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
1587
+ """
1588
+ :param pulumi.Input[builtins.str] auth_type: Authentication type to use when getting OCI credentials.
1589
+ :param pulumi.Input[builtins.str] role: Name of the login role.
1590
+ :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1591
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1592
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1592
1593
  """
1593
1594
  pulumi.set(__self__, "auth_type", auth_type)
1594
1595
  pulumi.set(__self__, "role", role)
@@ -1601,88 +1602,88 @@ class ProviderAuthLoginOciArgs:
1601
1602
 
1602
1603
  @property
1603
1604
  @pulumi.getter(name="authType")
1604
- def auth_type(self) -> pulumi.Input[str]:
1605
+ def auth_type(self) -> pulumi.Input[builtins.str]:
1605
1606
  """
1606
1607
  Authentication type to use when getting OCI credentials.
1607
1608
  """
1608
1609
  return pulumi.get(self, "auth_type")
1609
1610
 
1610
1611
  @auth_type.setter
1611
- def auth_type(self, value: pulumi.Input[str]):
1612
+ def auth_type(self, value: pulumi.Input[builtins.str]):
1612
1613
  pulumi.set(self, "auth_type", value)
1613
1614
 
1614
1615
  @property
1615
1616
  @pulumi.getter
1616
- def role(self) -> pulumi.Input[str]:
1617
+ def role(self) -> pulumi.Input[builtins.str]:
1617
1618
  """
1618
1619
  Name of the login role.
1619
1620
  """
1620
1621
  return pulumi.get(self, "role")
1621
1622
 
1622
1623
  @role.setter
1623
- def role(self, value: pulumi.Input[str]):
1624
+ def role(self, value: pulumi.Input[builtins.str]):
1624
1625
  pulumi.set(self, "role", value)
1625
1626
 
1626
1627
  @property
1627
1628
  @pulumi.getter
1628
- def mount(self) -> Optional[pulumi.Input[str]]:
1629
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1629
1630
  """
1630
1631
  The path where the authentication engine is mounted.
1631
1632
  """
1632
1633
  return pulumi.get(self, "mount")
1633
1634
 
1634
1635
  @mount.setter
1635
- def mount(self, value: Optional[pulumi.Input[str]]):
1636
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1636
1637
  pulumi.set(self, "mount", value)
1637
1638
 
1638
1639
  @property
1639
1640
  @pulumi.getter
1640
- def namespace(self) -> Optional[pulumi.Input[str]]:
1641
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1641
1642
  """
1642
1643
  The authentication engine's namespace. Conflicts with use_root_namespace
1643
1644
  """
1644
1645
  return pulumi.get(self, "namespace")
1645
1646
 
1646
1647
  @namespace.setter
1647
- def namespace(self, value: Optional[pulumi.Input[str]]):
1648
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1648
1649
  pulumi.set(self, "namespace", value)
1649
1650
 
1650
1651
  @property
1651
1652
  @pulumi.getter(name="useRootNamespace")
1652
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
1653
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1653
1654
  """
1654
1655
  Authenticate to the root Vault namespace. Conflicts with namespace
1655
1656
  """
1656
1657
  return pulumi.get(self, "use_root_namespace")
1657
1658
 
1658
1659
  @use_root_namespace.setter
1659
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
1660
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1660
1661
  pulumi.set(self, "use_root_namespace", value)
1661
1662
 
1662
1663
 
1663
1664
  if not MYPY:
1664
1665
  class ProviderAuthLoginOidcArgsDict(TypedDict):
1665
- role: pulumi.Input[str]
1666
+ role: pulumi.Input[builtins.str]
1666
1667
  """
1667
1668
  Name of the login role.
1668
1669
  """
1669
- callback_address: NotRequired[pulumi.Input[str]]
1670
+ callback_address: NotRequired[pulumi.Input[builtins.str]]
1670
1671
  """
1671
1672
  The callback address. Must be a valid URI without the path.
1672
1673
  """
1673
- callback_listener_address: NotRequired[pulumi.Input[str]]
1674
+ callback_listener_address: NotRequired[pulumi.Input[builtins.str]]
1674
1675
  """
1675
1676
  The callback listener's address. Must be a valid URI without the path.
1676
1677
  """
1677
- mount: NotRequired[pulumi.Input[str]]
1678
+ mount: NotRequired[pulumi.Input[builtins.str]]
1678
1679
  """
1679
1680
  The path where the authentication engine is mounted.
1680
1681
  """
1681
- namespace: NotRequired[pulumi.Input[str]]
1682
+ namespace: NotRequired[pulumi.Input[builtins.str]]
1682
1683
  """
1683
1684
  The authentication engine's namespace. Conflicts with use_root_namespace
1684
1685
  """
1685
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1686
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1686
1687
  """
1687
1688
  Authenticate to the root Vault namespace. Conflicts with namespace
1688
1689
  """
@@ -1692,19 +1693,19 @@ elif False:
1692
1693
  @pulumi.input_type
1693
1694
  class ProviderAuthLoginOidcArgs:
1694
1695
  def __init__(__self__, *,
1695
- role: pulumi.Input[str],
1696
- callback_address: Optional[pulumi.Input[str]] = None,
1697
- callback_listener_address: Optional[pulumi.Input[str]] = None,
1698
- mount: Optional[pulumi.Input[str]] = None,
1699
- namespace: Optional[pulumi.Input[str]] = None,
1700
- use_root_namespace: Optional[pulumi.Input[bool]] = None):
1701
- """
1702
- :param pulumi.Input[str] role: Name of the login role.
1703
- :param pulumi.Input[str] callback_address: The callback address. Must be a valid URI without the path.
1704
- :param pulumi.Input[str] callback_listener_address: The callback listener's address. Must be a valid URI without the path.
1705
- :param pulumi.Input[str] mount: The path where the authentication engine is mounted.
1706
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1707
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1696
+ role: pulumi.Input[builtins.str],
1697
+ callback_address: Optional[pulumi.Input[builtins.str]] = None,
1698
+ callback_listener_address: Optional[pulumi.Input[builtins.str]] = None,
1699
+ mount: Optional[pulumi.Input[builtins.str]] = None,
1700
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1701
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
1702
+ """
1703
+ :param pulumi.Input[builtins.str] role: Name of the login role.
1704
+ :param pulumi.Input[builtins.str] callback_address: The callback address. Must be a valid URI without the path.
1705
+ :param pulumi.Input[builtins.str] callback_listener_address: The callback listener's address. Must be a valid URI without the path.
1706
+ :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1707
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1708
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1708
1709
  """
1709
1710
  pulumi.set(__self__, "role", role)
1710
1711
  if callback_address is not None:
@@ -1720,96 +1721,96 @@ class ProviderAuthLoginOidcArgs:
1720
1721
 
1721
1722
  @property
1722
1723
  @pulumi.getter
1723
- def role(self) -> pulumi.Input[str]:
1724
+ def role(self) -> pulumi.Input[builtins.str]:
1724
1725
  """
1725
1726
  Name of the login role.
1726
1727
  """
1727
1728
  return pulumi.get(self, "role")
1728
1729
 
1729
1730
  @role.setter
1730
- def role(self, value: pulumi.Input[str]):
1731
+ def role(self, value: pulumi.Input[builtins.str]):
1731
1732
  pulumi.set(self, "role", value)
1732
1733
 
1733
1734
  @property
1734
1735
  @pulumi.getter(name="callbackAddress")
1735
- def callback_address(self) -> Optional[pulumi.Input[str]]:
1736
+ def callback_address(self) -> Optional[pulumi.Input[builtins.str]]:
1736
1737
  """
1737
1738
  The callback address. Must be a valid URI without the path.
1738
1739
  """
1739
1740
  return pulumi.get(self, "callback_address")
1740
1741
 
1741
1742
  @callback_address.setter
1742
- def callback_address(self, value: Optional[pulumi.Input[str]]):
1743
+ def callback_address(self, value: Optional[pulumi.Input[builtins.str]]):
1743
1744
  pulumi.set(self, "callback_address", value)
1744
1745
 
1745
1746
  @property
1746
1747
  @pulumi.getter(name="callbackListenerAddress")
1747
- def callback_listener_address(self) -> Optional[pulumi.Input[str]]:
1748
+ def callback_listener_address(self) -> Optional[pulumi.Input[builtins.str]]:
1748
1749
  """
1749
1750
  The callback listener's address. Must be a valid URI without the path.
1750
1751
  """
1751
1752
  return pulumi.get(self, "callback_listener_address")
1752
1753
 
1753
1754
  @callback_listener_address.setter
1754
- def callback_listener_address(self, value: Optional[pulumi.Input[str]]):
1755
+ def callback_listener_address(self, value: Optional[pulumi.Input[builtins.str]]):
1755
1756
  pulumi.set(self, "callback_listener_address", value)
1756
1757
 
1757
1758
  @property
1758
1759
  @pulumi.getter
1759
- def mount(self) -> Optional[pulumi.Input[str]]:
1760
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1760
1761
  """
1761
1762
  The path where the authentication engine is mounted.
1762
1763
  """
1763
1764
  return pulumi.get(self, "mount")
1764
1765
 
1765
1766
  @mount.setter
1766
- def mount(self, value: Optional[pulumi.Input[str]]):
1767
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1767
1768
  pulumi.set(self, "mount", value)
1768
1769
 
1769
1770
  @property
1770
1771
  @pulumi.getter
1771
- def namespace(self) -> Optional[pulumi.Input[str]]:
1772
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1772
1773
  """
1773
1774
  The authentication engine's namespace. Conflicts with use_root_namespace
1774
1775
  """
1775
1776
  return pulumi.get(self, "namespace")
1776
1777
 
1777
1778
  @namespace.setter
1778
- def namespace(self, value: Optional[pulumi.Input[str]]):
1779
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1779
1780
  pulumi.set(self, "namespace", value)
1780
1781
 
1781
1782
  @property
1782
1783
  @pulumi.getter(name="useRootNamespace")
1783
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
1784
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1784
1785
  """
1785
1786
  Authenticate to the root Vault namespace. Conflicts with namespace
1786
1787
  """
1787
1788
  return pulumi.get(self, "use_root_namespace")
1788
1789
 
1789
1790
  @use_root_namespace.setter
1790
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
1791
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1791
1792
  pulumi.set(self, "use_root_namespace", value)
1792
1793
 
1793
1794
 
1794
1795
  if not MYPY:
1795
1796
  class ProviderAuthLoginRadiusArgsDict(TypedDict):
1796
- password: pulumi.Input[str]
1797
+ password: pulumi.Input[builtins.str]
1797
1798
  """
1798
1799
  The Radius password for username.
1799
1800
  """
1800
- username: pulumi.Input[str]
1801
+ username: pulumi.Input[builtins.str]
1801
1802
  """
1802
1803
  The Radius username.
1803
1804
  """
1804
- mount: NotRequired[pulumi.Input[str]]
1805
+ mount: NotRequired[pulumi.Input[builtins.str]]
1805
1806
  """
1806
1807
  The path where the authentication engine is mounted.
1807
1808
  """
1808
- namespace: NotRequired[pulumi.Input[str]]
1809
+ namespace: NotRequired[pulumi.Input[builtins.str]]
1809
1810
  """
1810
1811
  The authentication engine's namespace. Conflicts with use_root_namespace
1811
1812
  """
1812
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1813
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1813
1814
  """
1814
1815
  Authenticate to the root Vault namespace. Conflicts with namespace
1815
1816
  """
@@ -1819,17 +1820,17 @@ elif False:
1819
1820
  @pulumi.input_type
1820
1821
  class ProviderAuthLoginRadiusArgs:
1821
1822
  def __init__(__self__, *,
1822
- password: pulumi.Input[str],
1823
- username: pulumi.Input[str],
1824
- mount: Optional[pulumi.Input[str]] = None,
1825
- namespace: Optional[pulumi.Input[str]] = None,
1826
- use_root_namespace: Optional[pulumi.Input[bool]] = None):
1827
- """
1828
- :param pulumi.Input[str] password: The Radius password for username.
1829
- :param pulumi.Input[str] username: The Radius username.
1830
- :param pulumi.Input[str] mount: The path where the authentication engine is mounted.
1831
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1832
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1823
+ password: pulumi.Input[builtins.str],
1824
+ username: pulumi.Input[builtins.str],
1825
+ mount: Optional[pulumi.Input[builtins.str]] = None,
1826
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1827
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
1828
+ """
1829
+ :param pulumi.Input[builtins.str] password: The Radius password for username.
1830
+ :param pulumi.Input[builtins.str] username: The Radius username.
1831
+ :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
1832
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1833
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1833
1834
  """
1834
1835
  pulumi.set(__self__, "password", password)
1835
1836
  pulumi.set(__self__, "username", username)
@@ -1842,76 +1843,76 @@ class ProviderAuthLoginRadiusArgs:
1842
1843
 
1843
1844
  @property
1844
1845
  @pulumi.getter
1845
- def password(self) -> pulumi.Input[str]:
1846
+ def password(self) -> pulumi.Input[builtins.str]:
1846
1847
  """
1847
1848
  The Radius password for username.
1848
1849
  """
1849
1850
  return pulumi.get(self, "password")
1850
1851
 
1851
1852
  @password.setter
1852
- def password(self, value: pulumi.Input[str]):
1853
+ def password(self, value: pulumi.Input[builtins.str]):
1853
1854
  pulumi.set(self, "password", value)
1854
1855
 
1855
1856
  @property
1856
1857
  @pulumi.getter
1857
- def username(self) -> pulumi.Input[str]:
1858
+ def username(self) -> pulumi.Input[builtins.str]:
1858
1859
  """
1859
1860
  The Radius username.
1860
1861
  """
1861
1862
  return pulumi.get(self, "username")
1862
1863
 
1863
1864
  @username.setter
1864
- def username(self, value: pulumi.Input[str]):
1865
+ def username(self, value: pulumi.Input[builtins.str]):
1865
1866
  pulumi.set(self, "username", value)
1866
1867
 
1867
1868
  @property
1868
1869
  @pulumi.getter
1869
- def mount(self) -> Optional[pulumi.Input[str]]:
1870
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
1870
1871
  """
1871
1872
  The path where the authentication engine is mounted.
1872
1873
  """
1873
1874
  return pulumi.get(self, "mount")
1874
1875
 
1875
1876
  @mount.setter
1876
- def mount(self, value: Optional[pulumi.Input[str]]):
1877
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
1877
1878
  pulumi.set(self, "mount", value)
1878
1879
 
1879
1880
  @property
1880
1881
  @pulumi.getter
1881
- def namespace(self) -> Optional[pulumi.Input[str]]:
1882
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1882
1883
  """
1883
1884
  The authentication engine's namespace. Conflicts with use_root_namespace
1884
1885
  """
1885
1886
  return pulumi.get(self, "namespace")
1886
1887
 
1887
1888
  @namespace.setter
1888
- def namespace(self, value: Optional[pulumi.Input[str]]):
1889
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1889
1890
  pulumi.set(self, "namespace", value)
1890
1891
 
1891
1892
  @property
1892
1893
  @pulumi.getter(name="useRootNamespace")
1893
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
1894
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1894
1895
  """
1895
1896
  Authenticate to the root Vault namespace. Conflicts with namespace
1896
1897
  """
1897
1898
  return pulumi.get(self, "use_root_namespace")
1898
1899
 
1899
1900
  @use_root_namespace.setter
1900
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
1901
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1901
1902
  pulumi.set(self, "use_root_namespace", value)
1902
1903
 
1903
1904
 
1904
1905
  if not MYPY:
1905
1906
  class ProviderAuthLoginTokenFileArgsDict(TypedDict):
1906
- filename: pulumi.Input[str]
1907
+ filename: pulumi.Input[builtins.str]
1907
1908
  """
1908
1909
  The name of a file containing a single line that is a valid Vault token
1909
1910
  """
1910
- namespace: NotRequired[pulumi.Input[str]]
1911
+ namespace: NotRequired[pulumi.Input[builtins.str]]
1911
1912
  """
1912
1913
  The authentication engine's namespace. Conflicts with use_root_namespace
1913
1914
  """
1914
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1915
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1915
1916
  """
1916
1917
  Authenticate to the root Vault namespace. Conflicts with namespace
1917
1918
  """
@@ -1921,13 +1922,13 @@ elif False:
1921
1922
  @pulumi.input_type
1922
1923
  class ProviderAuthLoginTokenFileArgs:
1923
1924
  def __init__(__self__, *,
1924
- filename: pulumi.Input[str],
1925
- namespace: Optional[pulumi.Input[str]] = None,
1926
- use_root_namespace: Optional[pulumi.Input[bool]] = None):
1925
+ filename: pulumi.Input[builtins.str],
1926
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
1927
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
1927
1928
  """
1928
- :param pulumi.Input[str] filename: The name of a file containing a single line that is a valid Vault token
1929
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1930
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1929
+ :param pulumi.Input[builtins.str] filename: The name of a file containing a single line that is a valid Vault token
1930
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
1931
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
1931
1932
  """
1932
1933
  pulumi.set(__self__, "filename", filename)
1933
1934
  if namespace is not None:
@@ -1937,64 +1938,64 @@ class ProviderAuthLoginTokenFileArgs:
1937
1938
 
1938
1939
  @property
1939
1940
  @pulumi.getter
1940
- def filename(self) -> pulumi.Input[str]:
1941
+ def filename(self) -> pulumi.Input[builtins.str]:
1941
1942
  """
1942
1943
  The name of a file containing a single line that is a valid Vault token
1943
1944
  """
1944
1945
  return pulumi.get(self, "filename")
1945
1946
 
1946
1947
  @filename.setter
1947
- def filename(self, value: pulumi.Input[str]):
1948
+ def filename(self, value: pulumi.Input[builtins.str]):
1948
1949
  pulumi.set(self, "filename", value)
1949
1950
 
1950
1951
  @property
1951
1952
  @pulumi.getter
1952
- def namespace(self) -> Optional[pulumi.Input[str]]:
1953
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
1953
1954
  """
1954
1955
  The authentication engine's namespace. Conflicts with use_root_namespace
1955
1956
  """
1956
1957
  return pulumi.get(self, "namespace")
1957
1958
 
1958
1959
  @namespace.setter
1959
- def namespace(self, value: Optional[pulumi.Input[str]]):
1960
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
1960
1961
  pulumi.set(self, "namespace", value)
1961
1962
 
1962
1963
  @property
1963
1964
  @pulumi.getter(name="useRootNamespace")
1964
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
1965
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
1965
1966
  """
1966
1967
  Authenticate to the root Vault namespace. Conflicts with namespace
1967
1968
  """
1968
1969
  return pulumi.get(self, "use_root_namespace")
1969
1970
 
1970
1971
  @use_root_namespace.setter
1971
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
1972
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
1972
1973
  pulumi.set(self, "use_root_namespace", value)
1973
1974
 
1974
1975
 
1975
1976
  if not MYPY:
1976
1977
  class ProviderAuthLoginUserpassArgsDict(TypedDict):
1977
- username: pulumi.Input[str]
1978
+ username: pulumi.Input[builtins.str]
1978
1979
  """
1979
1980
  Login with username
1980
1981
  """
1981
- mount: NotRequired[pulumi.Input[str]]
1982
+ mount: NotRequired[pulumi.Input[builtins.str]]
1982
1983
  """
1983
1984
  The path where the authentication engine is mounted.
1984
1985
  """
1985
- namespace: NotRequired[pulumi.Input[str]]
1986
+ namespace: NotRequired[pulumi.Input[builtins.str]]
1986
1987
  """
1987
1988
  The authentication engine's namespace. Conflicts with use_root_namespace
1988
1989
  """
1989
- password: NotRequired[pulumi.Input[str]]
1990
+ password: NotRequired[pulumi.Input[builtins.str]]
1990
1991
  """
1991
1992
  Login with password
1992
1993
  """
1993
- password_file: NotRequired[pulumi.Input[str]]
1994
+ password_file: NotRequired[pulumi.Input[builtins.str]]
1994
1995
  """
1995
1996
  Login with password from a file
1996
1997
  """
1997
- use_root_namespace: NotRequired[pulumi.Input[bool]]
1998
+ use_root_namespace: NotRequired[pulumi.Input[builtins.bool]]
1998
1999
  """
1999
2000
  Authenticate to the root Vault namespace. Conflicts with namespace
2000
2001
  """
@@ -2004,19 +2005,19 @@ elif False:
2004
2005
  @pulumi.input_type
2005
2006
  class ProviderAuthLoginUserpassArgs:
2006
2007
  def __init__(__self__, *,
2007
- username: pulumi.Input[str],
2008
- mount: Optional[pulumi.Input[str]] = None,
2009
- namespace: Optional[pulumi.Input[str]] = None,
2010
- password: Optional[pulumi.Input[str]] = None,
2011
- password_file: Optional[pulumi.Input[str]] = None,
2012
- use_root_namespace: Optional[pulumi.Input[bool]] = None):
2013
- """
2014
- :param pulumi.Input[str] username: Login with username
2015
- :param pulumi.Input[str] mount: The path where the authentication engine is mounted.
2016
- :param pulumi.Input[str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
2017
- :param pulumi.Input[str] password: Login with password
2018
- :param pulumi.Input[str] password_file: Login with password from a file
2019
- :param pulumi.Input[bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
2008
+ username: pulumi.Input[builtins.str],
2009
+ mount: Optional[pulumi.Input[builtins.str]] = None,
2010
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
2011
+ password: Optional[pulumi.Input[builtins.str]] = None,
2012
+ password_file: Optional[pulumi.Input[builtins.str]] = None,
2013
+ use_root_namespace: Optional[pulumi.Input[builtins.bool]] = None):
2014
+ """
2015
+ :param pulumi.Input[builtins.str] username: Login with username
2016
+ :param pulumi.Input[builtins.str] mount: The path where the authentication engine is mounted.
2017
+ :param pulumi.Input[builtins.str] namespace: The authentication engine's namespace. Conflicts with use_root_namespace
2018
+ :param pulumi.Input[builtins.str] password: Login with password
2019
+ :param pulumi.Input[builtins.str] password_file: Login with password from a file
2020
+ :param pulumi.Input[builtins.bool] use_root_namespace: Authenticate to the root Vault namespace. Conflicts with namespace
2020
2021
  """
2021
2022
  pulumi.set(__self__, "username", username)
2022
2023
  if mount is not None:
@@ -2032,84 +2033,84 @@ class ProviderAuthLoginUserpassArgs:
2032
2033
 
2033
2034
  @property
2034
2035
  @pulumi.getter
2035
- def username(self) -> pulumi.Input[str]:
2036
+ def username(self) -> pulumi.Input[builtins.str]:
2036
2037
  """
2037
2038
  Login with username
2038
2039
  """
2039
2040
  return pulumi.get(self, "username")
2040
2041
 
2041
2042
  @username.setter
2042
- def username(self, value: pulumi.Input[str]):
2043
+ def username(self, value: pulumi.Input[builtins.str]):
2043
2044
  pulumi.set(self, "username", value)
2044
2045
 
2045
2046
  @property
2046
2047
  @pulumi.getter
2047
- def mount(self) -> Optional[pulumi.Input[str]]:
2048
+ def mount(self) -> Optional[pulumi.Input[builtins.str]]:
2048
2049
  """
2049
2050
  The path where the authentication engine is mounted.
2050
2051
  """
2051
2052
  return pulumi.get(self, "mount")
2052
2053
 
2053
2054
  @mount.setter
2054
- def mount(self, value: Optional[pulumi.Input[str]]):
2055
+ def mount(self, value: Optional[pulumi.Input[builtins.str]]):
2055
2056
  pulumi.set(self, "mount", value)
2056
2057
 
2057
2058
  @property
2058
2059
  @pulumi.getter
2059
- def namespace(self) -> Optional[pulumi.Input[str]]:
2060
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
2060
2061
  """
2061
2062
  The authentication engine's namespace. Conflicts with use_root_namespace
2062
2063
  """
2063
2064
  return pulumi.get(self, "namespace")
2064
2065
 
2065
2066
  @namespace.setter
2066
- def namespace(self, value: Optional[pulumi.Input[str]]):
2067
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
2067
2068
  pulumi.set(self, "namespace", value)
2068
2069
 
2069
2070
  @property
2070
2071
  @pulumi.getter
2071
- def password(self) -> Optional[pulumi.Input[str]]:
2072
+ def password(self) -> Optional[pulumi.Input[builtins.str]]:
2072
2073
  """
2073
2074
  Login with password
2074
2075
  """
2075
2076
  return pulumi.get(self, "password")
2076
2077
 
2077
2078
  @password.setter
2078
- def password(self, value: Optional[pulumi.Input[str]]):
2079
+ def password(self, value: Optional[pulumi.Input[builtins.str]]):
2079
2080
  pulumi.set(self, "password", value)
2080
2081
 
2081
2082
  @property
2082
2083
  @pulumi.getter(name="passwordFile")
2083
- def password_file(self) -> Optional[pulumi.Input[str]]:
2084
+ def password_file(self) -> Optional[pulumi.Input[builtins.str]]:
2084
2085
  """
2085
2086
  Login with password from a file
2086
2087
  """
2087
2088
  return pulumi.get(self, "password_file")
2088
2089
 
2089
2090
  @password_file.setter
2090
- def password_file(self, value: Optional[pulumi.Input[str]]):
2091
+ def password_file(self, value: Optional[pulumi.Input[builtins.str]]):
2091
2092
  pulumi.set(self, "password_file", value)
2092
2093
 
2093
2094
  @property
2094
2095
  @pulumi.getter(name="useRootNamespace")
2095
- def use_root_namespace(self) -> Optional[pulumi.Input[bool]]:
2096
+ def use_root_namespace(self) -> Optional[pulumi.Input[builtins.bool]]:
2096
2097
  """
2097
2098
  Authenticate to the root Vault namespace. Conflicts with namespace
2098
2099
  """
2099
2100
  return pulumi.get(self, "use_root_namespace")
2100
2101
 
2101
2102
  @use_root_namespace.setter
2102
- def use_root_namespace(self, value: Optional[pulumi.Input[bool]]):
2103
+ def use_root_namespace(self, value: Optional[pulumi.Input[builtins.bool]]):
2103
2104
  pulumi.set(self, "use_root_namespace", value)
2104
2105
 
2105
2106
 
2106
2107
  if not MYPY:
2107
2108
  class ProviderClientAuthArgsDict(TypedDict):
2108
- cert_file: pulumi.Input[str]
2109
+ cert_file: pulumi.Input[builtins.str]
2109
2110
  """
2110
2111
  Path to a file containing the client certificate.
2111
2112
  """
2112
- key_file: pulumi.Input[str]
2113
+ key_file: pulumi.Input[builtins.str]
2113
2114
  """
2114
2115
  Path to a file containing the private key that the certificate was issued for.
2115
2116
  """
@@ -2119,47 +2120,47 @@ elif False:
2119
2120
  @pulumi.input_type
2120
2121
  class ProviderClientAuthArgs:
2121
2122
  def __init__(__self__, *,
2122
- cert_file: pulumi.Input[str],
2123
- key_file: pulumi.Input[str]):
2123
+ cert_file: pulumi.Input[builtins.str],
2124
+ key_file: pulumi.Input[builtins.str]):
2124
2125
  """
2125
- :param pulumi.Input[str] cert_file: Path to a file containing the client certificate.
2126
- :param pulumi.Input[str] key_file: Path to a file containing the private key that the certificate was issued for.
2126
+ :param pulumi.Input[builtins.str] cert_file: Path to a file containing the client certificate.
2127
+ :param pulumi.Input[builtins.str] key_file: Path to a file containing the private key that the certificate was issued for.
2127
2128
  """
2128
2129
  pulumi.set(__self__, "cert_file", cert_file)
2129
2130
  pulumi.set(__self__, "key_file", key_file)
2130
2131
 
2131
2132
  @property
2132
2133
  @pulumi.getter(name="certFile")
2133
- def cert_file(self) -> pulumi.Input[str]:
2134
+ def cert_file(self) -> pulumi.Input[builtins.str]:
2134
2135
  """
2135
2136
  Path to a file containing the client certificate.
2136
2137
  """
2137
2138
  return pulumi.get(self, "cert_file")
2138
2139
 
2139
2140
  @cert_file.setter
2140
- def cert_file(self, value: pulumi.Input[str]):
2141
+ def cert_file(self, value: pulumi.Input[builtins.str]):
2141
2142
  pulumi.set(self, "cert_file", value)
2142
2143
 
2143
2144
  @property
2144
2145
  @pulumi.getter(name="keyFile")
2145
- def key_file(self) -> pulumi.Input[str]:
2146
+ def key_file(self) -> pulumi.Input[builtins.str]:
2146
2147
  """
2147
2148
  Path to a file containing the private key that the certificate was issued for.
2148
2149
  """
2149
2150
  return pulumi.get(self, "key_file")
2150
2151
 
2151
2152
  @key_file.setter
2152
- def key_file(self, value: pulumi.Input[str]):
2153
+ def key_file(self, value: pulumi.Input[builtins.str]):
2153
2154
  pulumi.set(self, "key_file", value)
2154
2155
 
2155
2156
 
2156
2157
  if not MYPY:
2157
2158
  class ProviderHeaderArgsDict(TypedDict):
2158
- name: pulumi.Input[str]
2159
+ name: pulumi.Input[builtins.str]
2159
2160
  """
2160
2161
  The header name
2161
2162
  """
2162
- value: pulumi.Input[str]
2163
+ value: pulumi.Input[builtins.str]
2163
2164
  """
2164
2165
  The header value
2165
2166
  """
@@ -2169,47 +2170,47 @@ elif False:
2169
2170
  @pulumi.input_type
2170
2171
  class ProviderHeaderArgs:
2171
2172
  def __init__(__self__, *,
2172
- name: pulumi.Input[str],
2173
- value: pulumi.Input[str]):
2173
+ name: pulumi.Input[builtins.str],
2174
+ value: pulumi.Input[builtins.str]):
2174
2175
  """
2175
- :param pulumi.Input[str] name: The header name
2176
- :param pulumi.Input[str] value: The header value
2176
+ :param pulumi.Input[builtins.str] name: The header name
2177
+ :param pulumi.Input[builtins.str] value: The header value
2177
2178
  """
2178
2179
  pulumi.set(__self__, "name", name)
2179
2180
  pulumi.set(__self__, "value", value)
2180
2181
 
2181
2182
  @property
2182
2183
  @pulumi.getter
2183
- def name(self) -> pulumi.Input[str]:
2184
+ def name(self) -> pulumi.Input[builtins.str]:
2184
2185
  """
2185
2186
  The header name
2186
2187
  """
2187
2188
  return pulumi.get(self, "name")
2188
2189
 
2189
2190
  @name.setter
2190
- def name(self, value: pulumi.Input[str]):
2191
+ def name(self, value: pulumi.Input[builtins.str]):
2191
2192
  pulumi.set(self, "name", value)
2192
2193
 
2193
2194
  @property
2194
2195
  @pulumi.getter
2195
- def value(self) -> pulumi.Input[str]:
2196
+ def value(self) -> pulumi.Input[builtins.str]:
2196
2197
  """
2197
2198
  The header value
2198
2199
  """
2199
2200
  return pulumi.get(self, "value")
2200
2201
 
2201
2202
  @value.setter
2202
- def value(self, value: pulumi.Input[str]):
2203
+ def value(self, value: pulumi.Input[builtins.str]):
2203
2204
  pulumi.set(self, "value", value)
2204
2205
 
2205
2206
 
2206
2207
  if not MYPY:
2207
2208
  class GetPolicyDocumentRuleArgsDict(TypedDict):
2208
- capabilities: Sequence[str]
2209
+ capabilities: Sequence[builtins.str]
2209
2210
  """
2210
2211
  A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2211
2212
  """
2212
- path: str
2213
+ path: builtins.str
2213
2214
  """
2214
2215
  A path in Vault that this rule applies to.
2215
2216
  """
@@ -2221,19 +2222,19 @@ if not MYPY:
2221
2222
  """
2222
2223
  Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
2223
2224
  """
2224
- description: NotRequired[str]
2225
+ description: NotRequired[builtins.str]
2225
2226
  """
2226
2227
  Description of the rule. Will be added as a comment to rendered rule.
2227
2228
  """
2228
- max_wrapping_ttl: NotRequired[str]
2229
+ max_wrapping_ttl: NotRequired[builtins.str]
2229
2230
  """
2230
2231
  The maximum allowed TTL that clients can specify for a wrapped response.
2231
2232
  """
2232
- min_wrapping_ttl: NotRequired[str]
2233
+ min_wrapping_ttl: NotRequired[builtins.str]
2233
2234
  """
2234
2235
  The minimum allowed TTL that clients can specify for a wrapped response.
2235
2236
  """
2236
- required_parameters: NotRequired[Sequence[str]]
2237
+ required_parameters: NotRequired[Sequence[builtins.str]]
2237
2238
  """
2238
2239
  A list of parameters that must be specified.
2239
2240
  """
@@ -2243,23 +2244,23 @@ elif False:
2243
2244
  @pulumi.input_type
2244
2245
  class GetPolicyDocumentRuleArgs:
2245
2246
  def __init__(__self__, *,
2246
- capabilities: Sequence[str],
2247
- path: str,
2247
+ capabilities: Sequence[builtins.str],
2248
+ path: builtins.str,
2248
2249
  allowed_parameters: Optional[Sequence['GetPolicyDocumentRuleAllowedParameterArgs']] = None,
2249
2250
  denied_parameters: Optional[Sequence['GetPolicyDocumentRuleDeniedParameterArgs']] = None,
2250
- description: Optional[str] = None,
2251
- max_wrapping_ttl: Optional[str] = None,
2252
- min_wrapping_ttl: Optional[str] = None,
2253
- required_parameters: Optional[Sequence[str]] = None):
2251
+ description: Optional[builtins.str] = None,
2252
+ max_wrapping_ttl: Optional[builtins.str] = None,
2253
+ min_wrapping_ttl: Optional[builtins.str] = None,
2254
+ required_parameters: Optional[Sequence[builtins.str]] = None):
2254
2255
  """
2255
- :param Sequence[str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2256
- :param str path: A path in Vault that this rule applies to.
2256
+ :param Sequence[builtins.str] capabilities: A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2257
+ :param builtins.str path: A path in Vault that this rule applies to.
2257
2258
  :param Sequence['GetPolicyDocumentRuleAllowedParameterArgs'] allowed_parameters: Whitelists a list of keys and values that are permitted on the given path. See Parameters below.
2258
2259
  :param Sequence['GetPolicyDocumentRuleDeniedParameterArgs'] denied_parameters: Blacklists a list of parameter and values. Any values specified here take precedence over `allowed_parameter`. See Parameters below.
2259
- :param str description: Description of the rule. Will be added as a comment to rendered rule.
2260
- :param str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
2261
- :param str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
2262
- :param Sequence[str] required_parameters: A list of parameters that must be specified.
2260
+ :param builtins.str description: Description of the rule. Will be added as a comment to rendered rule.
2261
+ :param builtins.str max_wrapping_ttl: The maximum allowed TTL that clients can specify for a wrapped response.
2262
+ :param builtins.str min_wrapping_ttl: The minimum allowed TTL that clients can specify for a wrapped response.
2263
+ :param Sequence[builtins.str] required_parameters: A list of parameters that must be specified.
2263
2264
  """
2264
2265
  pulumi.set(__self__, "capabilities", capabilities)
2265
2266
  pulumi.set(__self__, "path", path)
@@ -2278,26 +2279,26 @@ class GetPolicyDocumentRuleArgs:
2278
2279
 
2279
2280
  @property
2280
2281
  @pulumi.getter
2281
- def capabilities(self) -> Sequence[str]:
2282
+ def capabilities(self) -> Sequence[builtins.str]:
2282
2283
  """
2283
2284
  A list of capabilities that this rule apply to `path`. For example, ["read", "write"].
2284
2285
  """
2285
2286
  return pulumi.get(self, "capabilities")
2286
2287
 
2287
2288
  @capabilities.setter
2288
- def capabilities(self, value: Sequence[str]):
2289
+ def capabilities(self, value: Sequence[builtins.str]):
2289
2290
  pulumi.set(self, "capabilities", value)
2290
2291
 
2291
2292
  @property
2292
2293
  @pulumi.getter
2293
- def path(self) -> str:
2294
+ def path(self) -> builtins.str:
2294
2295
  """
2295
2296
  A path in Vault that this rule applies to.
2296
2297
  """
2297
2298
  return pulumi.get(self, "path")
2298
2299
 
2299
2300
  @path.setter
2300
- def path(self, value: str):
2301
+ def path(self, value: builtins.str):
2301
2302
  pulumi.set(self, "path", value)
2302
2303
 
2303
2304
  @property
@@ -2326,60 +2327,60 @@ class GetPolicyDocumentRuleArgs:
2326
2327
 
2327
2328
  @property
2328
2329
  @pulumi.getter
2329
- def description(self) -> Optional[str]:
2330
+ def description(self) -> Optional[builtins.str]:
2330
2331
  """
2331
2332
  Description of the rule. Will be added as a comment to rendered rule.
2332
2333
  """
2333
2334
  return pulumi.get(self, "description")
2334
2335
 
2335
2336
  @description.setter
2336
- def description(self, value: Optional[str]):
2337
+ def description(self, value: Optional[builtins.str]):
2337
2338
  pulumi.set(self, "description", value)
2338
2339
 
2339
2340
  @property
2340
2341
  @pulumi.getter(name="maxWrappingTtl")
2341
- def max_wrapping_ttl(self) -> Optional[str]:
2342
+ def max_wrapping_ttl(self) -> Optional[builtins.str]:
2342
2343
  """
2343
2344
  The maximum allowed TTL that clients can specify for a wrapped response.
2344
2345
  """
2345
2346
  return pulumi.get(self, "max_wrapping_ttl")
2346
2347
 
2347
2348
  @max_wrapping_ttl.setter
2348
- def max_wrapping_ttl(self, value: Optional[str]):
2349
+ def max_wrapping_ttl(self, value: Optional[builtins.str]):
2349
2350
  pulumi.set(self, "max_wrapping_ttl", value)
2350
2351
 
2351
2352
  @property
2352
2353
  @pulumi.getter(name="minWrappingTtl")
2353
- def min_wrapping_ttl(self) -> Optional[str]:
2354
+ def min_wrapping_ttl(self) -> Optional[builtins.str]:
2354
2355
  """
2355
2356
  The minimum allowed TTL that clients can specify for a wrapped response.
2356
2357
  """
2357
2358
  return pulumi.get(self, "min_wrapping_ttl")
2358
2359
 
2359
2360
  @min_wrapping_ttl.setter
2360
- def min_wrapping_ttl(self, value: Optional[str]):
2361
+ def min_wrapping_ttl(self, value: Optional[builtins.str]):
2361
2362
  pulumi.set(self, "min_wrapping_ttl", value)
2362
2363
 
2363
2364
  @property
2364
2365
  @pulumi.getter(name="requiredParameters")
2365
- def required_parameters(self) -> Optional[Sequence[str]]:
2366
+ def required_parameters(self) -> Optional[Sequence[builtins.str]]:
2366
2367
  """
2367
2368
  A list of parameters that must be specified.
2368
2369
  """
2369
2370
  return pulumi.get(self, "required_parameters")
2370
2371
 
2371
2372
  @required_parameters.setter
2372
- def required_parameters(self, value: Optional[Sequence[str]]):
2373
+ def required_parameters(self, value: Optional[Sequence[builtins.str]]):
2373
2374
  pulumi.set(self, "required_parameters", value)
2374
2375
 
2375
2376
 
2376
2377
  if not MYPY:
2377
2378
  class GetPolicyDocumentRuleAllowedParameterArgsDict(TypedDict):
2378
- key: str
2379
+ key: builtins.str
2379
2380
  """
2380
2381
  name of permitted or denied parameter.
2381
2382
  """
2382
- values: Sequence[str]
2383
+ values: Sequence[builtins.str]
2383
2384
  """
2384
2385
  list of values what are permitted or denied by policy rule.
2385
2386
  """
@@ -2389,47 +2390,47 @@ elif False:
2389
2390
  @pulumi.input_type
2390
2391
  class GetPolicyDocumentRuleAllowedParameterArgs:
2391
2392
  def __init__(__self__, *,
2392
- key: str,
2393
- values: Sequence[str]):
2393
+ key: builtins.str,
2394
+ values: Sequence[builtins.str]):
2394
2395
  """
2395
- :param str key: name of permitted or denied parameter.
2396
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
2396
+ :param builtins.str key: name of permitted or denied parameter.
2397
+ :param Sequence[builtins.str] values: list of values what are permitted or denied by policy rule.
2397
2398
  """
2398
2399
  pulumi.set(__self__, "key", key)
2399
2400
  pulumi.set(__self__, "values", values)
2400
2401
 
2401
2402
  @property
2402
2403
  @pulumi.getter
2403
- def key(self) -> str:
2404
+ def key(self) -> builtins.str:
2404
2405
  """
2405
2406
  name of permitted or denied parameter.
2406
2407
  """
2407
2408
  return pulumi.get(self, "key")
2408
2409
 
2409
2410
  @key.setter
2410
- def key(self, value: str):
2411
+ def key(self, value: builtins.str):
2411
2412
  pulumi.set(self, "key", value)
2412
2413
 
2413
2414
  @property
2414
2415
  @pulumi.getter
2415
- def values(self) -> Sequence[str]:
2416
+ def values(self) -> Sequence[builtins.str]:
2416
2417
  """
2417
2418
  list of values what are permitted or denied by policy rule.
2418
2419
  """
2419
2420
  return pulumi.get(self, "values")
2420
2421
 
2421
2422
  @values.setter
2422
- def values(self, value: Sequence[str]):
2423
+ def values(self, value: Sequence[builtins.str]):
2423
2424
  pulumi.set(self, "values", value)
2424
2425
 
2425
2426
 
2426
2427
  if not MYPY:
2427
2428
  class GetPolicyDocumentRuleDeniedParameterArgsDict(TypedDict):
2428
- key: str
2429
+ key: builtins.str
2429
2430
  """
2430
2431
  name of permitted or denied parameter.
2431
2432
  """
2432
- values: Sequence[str]
2433
+ values: Sequence[builtins.str]
2433
2434
  """
2434
2435
  list of values what are permitted or denied by policy rule.
2435
2436
  """
@@ -2439,37 +2440,37 @@ elif False:
2439
2440
  @pulumi.input_type
2440
2441
  class GetPolicyDocumentRuleDeniedParameterArgs:
2441
2442
  def __init__(__self__, *,
2442
- key: str,
2443
- values: Sequence[str]):
2443
+ key: builtins.str,
2444
+ values: Sequence[builtins.str]):
2444
2445
  """
2445
- :param str key: name of permitted or denied parameter.
2446
- :param Sequence[str] values: list of values what are permitted or denied by policy rule.
2446
+ :param builtins.str key: name of permitted or denied parameter.
2447
+ :param Sequence[builtins.str] values: list of values what are permitted or denied by policy rule.
2447
2448
  """
2448
2449
  pulumi.set(__self__, "key", key)
2449
2450
  pulumi.set(__self__, "values", values)
2450
2451
 
2451
2452
  @property
2452
2453
  @pulumi.getter
2453
- def key(self) -> str:
2454
+ def key(self) -> builtins.str:
2454
2455
  """
2455
2456
  name of permitted or denied parameter.
2456
2457
  """
2457
2458
  return pulumi.get(self, "key")
2458
2459
 
2459
2460
  @key.setter
2460
- def key(self, value: str):
2461
+ def key(self, value: builtins.str):
2461
2462
  pulumi.set(self, "key", value)
2462
2463
 
2463
2464
  @property
2464
2465
  @pulumi.getter
2465
- def values(self) -> Sequence[str]:
2466
+ def values(self) -> Sequence[builtins.str]:
2466
2467
  """
2467
2468
  list of values what are permitted or denied by policy rule.
2468
2469
  """
2469
2470
  return pulumi.get(self, "values")
2470
2471
 
2471
2472
  @values.setter
2472
- def values(self, value: Sequence[str]):
2473
+ def values(self, value: Sequence[builtins.str]):
2473
2474
  pulumi.set(self, "values", value)
2474
2475
 
2475
2476