pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,36 +20,36 @@ __all__ = ['AuthBackendRoleSecretIdArgs', 'AuthBackendRoleSecretId']
19
20
  @pulumi.input_type
20
21
  class AuthBackendRoleSecretIdArgs:
21
22
  def __init__(__self__, *,
22
- role_name: pulumi.Input[str],
23
- backend: Optional[pulumi.Input[str]] = None,
24
- cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
- metadata: Optional[pulumi.Input[str]] = None,
26
- namespace: Optional[pulumi.Input[str]] = None,
27
- num_uses: Optional[pulumi.Input[int]] = None,
28
- secret_id: Optional[pulumi.Input[str]] = None,
29
- ttl: Optional[pulumi.Input[int]] = None,
30
- with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
31
- wrapping_ttl: Optional[pulumi.Input[str]] = None):
23
+ role_name: pulumi.Input[builtins.str],
24
+ backend: Optional[pulumi.Input[builtins.str]] = None,
25
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
+ metadata: Optional[pulumi.Input[builtins.str]] = None,
27
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
28
+ num_uses: Optional[pulumi.Input[builtins.int]] = None,
29
+ secret_id: Optional[pulumi.Input[builtins.str]] = None,
30
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
31
+ with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
32
+ wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None):
32
33
  """
33
34
  The set of arguments for constructing a AuthBackendRoleSecretId resource.
34
- :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
35
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
36
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_lists: If set, specifies blocks of IP addresses which can
35
+ :param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
36
+ :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
37
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
37
38
  perform the login operation using this SecretID.
38
- :param pulumi.Input[str] metadata: A JSON-encoded string containing metadata in
39
+ :param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
39
40
  key-value pairs to be set on tokens issued with this SecretID.
40
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
41
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
41
42
  The value should not contain leading or trailing forward slashes.
42
43
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
43
44
  *Available only for Vault Enterprise*.
44
- :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
45
- :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
45
+ :param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
46
+ :param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
46
47
  mode. Defaults to Vault auto-generating SecretIDs.
47
- :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
48
- :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
48
+ :param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
49
+ :param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
49
50
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
50
51
  invalidated through unwrapping.
51
- :param pulumi.Input[str] wrapping_ttl: If set, the SecretID response will be
52
+ :param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
52
53
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
53
54
  and available for the duration specified. Only a single unwrapping of the
54
55
  token is allowed.
@@ -75,31 +76,31 @@ class AuthBackendRoleSecretIdArgs:
75
76
 
76
77
  @property
77
78
  @pulumi.getter(name="roleName")
78
- def role_name(self) -> pulumi.Input[str]:
79
+ def role_name(self) -> pulumi.Input[builtins.str]:
79
80
  """
80
81
  The name of the role to create the SecretID for.
81
82
  """
82
83
  return pulumi.get(self, "role_name")
83
84
 
84
85
  @role_name.setter
85
- def role_name(self, value: pulumi.Input[str]):
86
+ def role_name(self, value: pulumi.Input[builtins.str]):
86
87
  pulumi.set(self, "role_name", value)
87
88
 
88
89
  @property
89
90
  @pulumi.getter
90
- def backend(self) -> Optional[pulumi.Input[str]]:
91
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
91
92
  """
92
93
  Unique name of the auth backend to configure.
93
94
  """
94
95
  return pulumi.get(self, "backend")
95
96
 
96
97
  @backend.setter
97
- def backend(self, value: Optional[pulumi.Input[str]]):
98
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
98
99
  pulumi.set(self, "backend", value)
99
100
 
100
101
  @property
101
102
  @pulumi.getter(name="cidrLists")
102
- def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
103
+ def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
103
104
  """
104
105
  If set, specifies blocks of IP addresses which can
105
106
  perform the login operation using this SecretID.
@@ -107,12 +108,12 @@ class AuthBackendRoleSecretIdArgs:
107
108
  return pulumi.get(self, "cidr_lists")
108
109
 
109
110
  @cidr_lists.setter
110
- def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
111
+ def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
111
112
  pulumi.set(self, "cidr_lists", value)
112
113
 
113
114
  @property
114
115
  @pulumi.getter
115
- def metadata(self) -> Optional[pulumi.Input[str]]:
116
+ def metadata(self) -> Optional[pulumi.Input[builtins.str]]:
116
117
  """
117
118
  A JSON-encoded string containing metadata in
118
119
  key-value pairs to be set on tokens issued with this SecretID.
@@ -120,12 +121,12 @@ class AuthBackendRoleSecretIdArgs:
120
121
  return pulumi.get(self, "metadata")
121
122
 
122
123
  @metadata.setter
123
- def metadata(self, value: Optional[pulumi.Input[str]]):
124
+ def metadata(self, value: Optional[pulumi.Input[builtins.str]]):
124
125
  pulumi.set(self, "metadata", value)
125
126
 
126
127
  @property
127
128
  @pulumi.getter
128
- def namespace(self) -> Optional[pulumi.Input[str]]:
129
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
129
130
  """
130
131
  The namespace to provision the resource in.
131
132
  The value should not contain leading or trailing forward slashes.
@@ -135,24 +136,24 @@ class AuthBackendRoleSecretIdArgs:
135
136
  return pulumi.get(self, "namespace")
136
137
 
137
138
  @namespace.setter
138
- def namespace(self, value: Optional[pulumi.Input[str]]):
139
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
139
140
  pulumi.set(self, "namespace", value)
140
141
 
141
142
  @property
142
143
  @pulumi.getter(name="numUses")
143
- def num_uses(self) -> Optional[pulumi.Input[int]]:
144
+ def num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
144
145
  """
145
146
  The number of uses for the secret-id.
146
147
  """
147
148
  return pulumi.get(self, "num_uses")
148
149
 
149
150
  @num_uses.setter
150
- def num_uses(self, value: Optional[pulumi.Input[int]]):
151
+ def num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
151
152
  pulumi.set(self, "num_uses", value)
152
153
 
153
154
  @property
154
155
  @pulumi.getter(name="secretId")
155
- def secret_id(self) -> Optional[pulumi.Input[str]]:
156
+ def secret_id(self) -> Optional[pulumi.Input[builtins.str]]:
156
157
  """
157
158
  The SecretID to be created. If set, uses "Push"
158
159
  mode. Defaults to Vault auto-generating SecretIDs.
@@ -160,24 +161,24 @@ class AuthBackendRoleSecretIdArgs:
160
161
  return pulumi.get(self, "secret_id")
161
162
 
162
163
  @secret_id.setter
163
- def secret_id(self, value: Optional[pulumi.Input[str]]):
164
+ def secret_id(self, value: Optional[pulumi.Input[builtins.str]]):
164
165
  pulumi.set(self, "secret_id", value)
165
166
 
166
167
  @property
167
168
  @pulumi.getter
168
- def ttl(self) -> Optional[pulumi.Input[int]]:
169
+ def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
169
170
  """
170
171
  The TTL duration of the SecretID.
171
172
  """
172
173
  return pulumi.get(self, "ttl")
173
174
 
174
175
  @ttl.setter
175
- def ttl(self, value: Optional[pulumi.Input[int]]):
176
+ def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
176
177
  pulumi.set(self, "ttl", value)
177
178
 
178
179
  @property
179
180
  @pulumi.getter(name="withWrappedAccessor")
180
- def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
181
+ def with_wrapped_accessor(self) -> Optional[pulumi.Input[builtins.bool]]:
181
182
  """
182
183
  Set to `true` to use the wrapped secret-id accessor as the resource ID.
183
184
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
@@ -186,12 +187,12 @@ class AuthBackendRoleSecretIdArgs:
186
187
  return pulumi.get(self, "with_wrapped_accessor")
187
188
 
188
189
  @with_wrapped_accessor.setter
189
- def with_wrapped_accessor(self, value: Optional[pulumi.Input[bool]]):
190
+ def with_wrapped_accessor(self, value: Optional[pulumi.Input[builtins.bool]]):
190
191
  pulumi.set(self, "with_wrapped_accessor", value)
191
192
 
192
193
  @property
193
194
  @pulumi.getter(name="wrappingTtl")
194
- def wrapping_ttl(self) -> Optional[pulumi.Input[str]]:
195
+ def wrapping_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
195
196
  """
196
197
  If set, the SecretID response will be
197
198
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
@@ -201,50 +202,50 @@ class AuthBackendRoleSecretIdArgs:
201
202
  return pulumi.get(self, "wrapping_ttl")
202
203
 
203
204
  @wrapping_ttl.setter
204
- def wrapping_ttl(self, value: Optional[pulumi.Input[str]]):
205
+ def wrapping_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
205
206
  pulumi.set(self, "wrapping_ttl", value)
206
207
 
207
208
 
208
209
  @pulumi.input_type
209
210
  class _AuthBackendRoleSecretIdState:
210
211
  def __init__(__self__, *,
211
- accessor: Optional[pulumi.Input[str]] = None,
212
- backend: Optional[pulumi.Input[str]] = None,
213
- cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
214
- metadata: Optional[pulumi.Input[str]] = None,
215
- namespace: Optional[pulumi.Input[str]] = None,
216
- num_uses: Optional[pulumi.Input[int]] = None,
217
- role_name: Optional[pulumi.Input[str]] = None,
218
- secret_id: Optional[pulumi.Input[str]] = None,
219
- ttl: Optional[pulumi.Input[int]] = None,
220
- with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
221
- wrapping_accessor: Optional[pulumi.Input[str]] = None,
222
- wrapping_token: Optional[pulumi.Input[str]] = None,
223
- wrapping_ttl: Optional[pulumi.Input[str]] = None):
212
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
213
+ backend: Optional[pulumi.Input[builtins.str]] = None,
214
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
215
+ metadata: Optional[pulumi.Input[builtins.str]] = None,
216
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
217
+ num_uses: Optional[pulumi.Input[builtins.int]] = None,
218
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
219
+ secret_id: Optional[pulumi.Input[builtins.str]] = None,
220
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
221
+ with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
222
+ wrapping_accessor: Optional[pulumi.Input[builtins.str]] = None,
223
+ wrapping_token: Optional[pulumi.Input[builtins.str]] = None,
224
+ wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None):
224
225
  """
225
226
  Input properties used for looking up and filtering AuthBackendRoleSecretId resources.
226
- :param pulumi.Input[str] accessor: The unique ID for this SecretID that can be safely logged.
227
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
228
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_lists: If set, specifies blocks of IP addresses which can
227
+ :param pulumi.Input[builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
228
+ :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
229
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
229
230
  perform the login operation using this SecretID.
230
- :param pulumi.Input[str] metadata: A JSON-encoded string containing metadata in
231
+ :param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
231
232
  key-value pairs to be set on tokens issued with this SecretID.
232
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
233
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
233
234
  The value should not contain leading or trailing forward slashes.
234
235
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
235
236
  *Available only for Vault Enterprise*.
236
- :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
237
- :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
238
- :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
237
+ :param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
238
+ :param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
239
+ :param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
239
240
  mode. Defaults to Vault auto-generating SecretIDs.
240
- :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
241
- :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
241
+ :param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
242
+ :param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
242
243
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
243
244
  invalidated through unwrapping.
244
- :param pulumi.Input[str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
245
+ :param pulumi.Input[builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
245
246
  be safely logged.
246
- :param pulumi.Input[str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
247
- :param pulumi.Input[str] wrapping_ttl: If set, the SecretID response will be
247
+ :param pulumi.Input[builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
248
+ :param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
248
249
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
249
250
  and available for the duration specified. Only a single unwrapping of the
250
251
  token is allowed.
@@ -278,31 +279,31 @@ class _AuthBackendRoleSecretIdState:
278
279
 
279
280
  @property
280
281
  @pulumi.getter
281
- def accessor(self) -> Optional[pulumi.Input[str]]:
282
+ def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
282
283
  """
283
284
  The unique ID for this SecretID that can be safely logged.
284
285
  """
285
286
  return pulumi.get(self, "accessor")
286
287
 
287
288
  @accessor.setter
288
- def accessor(self, value: Optional[pulumi.Input[str]]):
289
+ def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
289
290
  pulumi.set(self, "accessor", value)
290
291
 
291
292
  @property
292
293
  @pulumi.getter
293
- def backend(self) -> Optional[pulumi.Input[str]]:
294
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
294
295
  """
295
296
  Unique name of the auth backend to configure.
296
297
  """
297
298
  return pulumi.get(self, "backend")
298
299
 
299
300
  @backend.setter
300
- def backend(self, value: Optional[pulumi.Input[str]]):
301
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
301
302
  pulumi.set(self, "backend", value)
302
303
 
303
304
  @property
304
305
  @pulumi.getter(name="cidrLists")
305
- def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
306
+ def cidr_lists(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
306
307
  """
307
308
  If set, specifies blocks of IP addresses which can
308
309
  perform the login operation using this SecretID.
@@ -310,12 +311,12 @@ class _AuthBackendRoleSecretIdState:
310
311
  return pulumi.get(self, "cidr_lists")
311
312
 
312
313
  @cidr_lists.setter
313
- def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
314
+ def cidr_lists(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
314
315
  pulumi.set(self, "cidr_lists", value)
315
316
 
316
317
  @property
317
318
  @pulumi.getter
318
- def metadata(self) -> Optional[pulumi.Input[str]]:
319
+ def metadata(self) -> Optional[pulumi.Input[builtins.str]]:
319
320
  """
320
321
  A JSON-encoded string containing metadata in
321
322
  key-value pairs to be set on tokens issued with this SecretID.
@@ -323,12 +324,12 @@ class _AuthBackendRoleSecretIdState:
323
324
  return pulumi.get(self, "metadata")
324
325
 
325
326
  @metadata.setter
326
- def metadata(self, value: Optional[pulumi.Input[str]]):
327
+ def metadata(self, value: Optional[pulumi.Input[builtins.str]]):
327
328
  pulumi.set(self, "metadata", value)
328
329
 
329
330
  @property
330
331
  @pulumi.getter
331
- def namespace(self) -> Optional[pulumi.Input[str]]:
332
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
332
333
  """
333
334
  The namespace to provision the resource in.
334
335
  The value should not contain leading or trailing forward slashes.
@@ -338,36 +339,36 @@ class _AuthBackendRoleSecretIdState:
338
339
  return pulumi.get(self, "namespace")
339
340
 
340
341
  @namespace.setter
341
- def namespace(self, value: Optional[pulumi.Input[str]]):
342
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
342
343
  pulumi.set(self, "namespace", value)
343
344
 
344
345
  @property
345
346
  @pulumi.getter(name="numUses")
346
- def num_uses(self) -> Optional[pulumi.Input[int]]:
347
+ def num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
347
348
  """
348
349
  The number of uses for the secret-id.
349
350
  """
350
351
  return pulumi.get(self, "num_uses")
351
352
 
352
353
  @num_uses.setter
353
- def num_uses(self, value: Optional[pulumi.Input[int]]):
354
+ def num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
354
355
  pulumi.set(self, "num_uses", value)
355
356
 
356
357
  @property
357
358
  @pulumi.getter(name="roleName")
358
- def role_name(self) -> Optional[pulumi.Input[str]]:
359
+ def role_name(self) -> Optional[pulumi.Input[builtins.str]]:
359
360
  """
360
361
  The name of the role to create the SecretID for.
361
362
  """
362
363
  return pulumi.get(self, "role_name")
363
364
 
364
365
  @role_name.setter
365
- def role_name(self, value: Optional[pulumi.Input[str]]):
366
+ def role_name(self, value: Optional[pulumi.Input[builtins.str]]):
366
367
  pulumi.set(self, "role_name", value)
367
368
 
368
369
  @property
369
370
  @pulumi.getter(name="secretId")
370
- def secret_id(self) -> Optional[pulumi.Input[str]]:
371
+ def secret_id(self) -> Optional[pulumi.Input[builtins.str]]:
371
372
  """
372
373
  The SecretID to be created. If set, uses "Push"
373
374
  mode. Defaults to Vault auto-generating SecretIDs.
@@ -375,24 +376,24 @@ class _AuthBackendRoleSecretIdState:
375
376
  return pulumi.get(self, "secret_id")
376
377
 
377
378
  @secret_id.setter
378
- def secret_id(self, value: Optional[pulumi.Input[str]]):
379
+ def secret_id(self, value: Optional[pulumi.Input[builtins.str]]):
379
380
  pulumi.set(self, "secret_id", value)
380
381
 
381
382
  @property
382
383
  @pulumi.getter
383
- def ttl(self) -> Optional[pulumi.Input[int]]:
384
+ def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
384
385
  """
385
386
  The TTL duration of the SecretID.
386
387
  """
387
388
  return pulumi.get(self, "ttl")
388
389
 
389
390
  @ttl.setter
390
- def ttl(self, value: Optional[pulumi.Input[int]]):
391
+ def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
391
392
  pulumi.set(self, "ttl", value)
392
393
 
393
394
  @property
394
395
  @pulumi.getter(name="withWrappedAccessor")
395
- def with_wrapped_accessor(self) -> Optional[pulumi.Input[bool]]:
396
+ def with_wrapped_accessor(self) -> Optional[pulumi.Input[builtins.bool]]:
396
397
  """
397
398
  Set to `true` to use the wrapped secret-id accessor as the resource ID.
398
399
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
@@ -401,12 +402,12 @@ class _AuthBackendRoleSecretIdState:
401
402
  return pulumi.get(self, "with_wrapped_accessor")
402
403
 
403
404
  @with_wrapped_accessor.setter
404
- def with_wrapped_accessor(self, value: Optional[pulumi.Input[bool]]):
405
+ def with_wrapped_accessor(self, value: Optional[pulumi.Input[builtins.bool]]):
405
406
  pulumi.set(self, "with_wrapped_accessor", value)
406
407
 
407
408
  @property
408
409
  @pulumi.getter(name="wrappingAccessor")
409
- def wrapping_accessor(self) -> Optional[pulumi.Input[str]]:
410
+ def wrapping_accessor(self) -> Optional[pulumi.Input[builtins.str]]:
410
411
  """
411
412
  The unique ID for the response-wrapped SecretID that can
412
413
  be safely logged.
@@ -414,24 +415,24 @@ class _AuthBackendRoleSecretIdState:
414
415
  return pulumi.get(self, "wrapping_accessor")
415
416
 
416
417
  @wrapping_accessor.setter
417
- def wrapping_accessor(self, value: Optional[pulumi.Input[str]]):
418
+ def wrapping_accessor(self, value: Optional[pulumi.Input[builtins.str]]):
418
419
  pulumi.set(self, "wrapping_accessor", value)
419
420
 
420
421
  @property
421
422
  @pulumi.getter(name="wrappingToken")
422
- def wrapping_token(self) -> Optional[pulumi.Input[str]]:
423
+ def wrapping_token(self) -> Optional[pulumi.Input[builtins.str]]:
423
424
  """
424
425
  The token used to retrieve a response-wrapped SecretID.
425
426
  """
426
427
  return pulumi.get(self, "wrapping_token")
427
428
 
428
429
  @wrapping_token.setter
429
- def wrapping_token(self, value: Optional[pulumi.Input[str]]):
430
+ def wrapping_token(self, value: Optional[pulumi.Input[builtins.str]]):
430
431
  pulumi.set(self, "wrapping_token", value)
431
432
 
432
433
  @property
433
434
  @pulumi.getter(name="wrappingTtl")
434
- def wrapping_ttl(self) -> Optional[pulumi.Input[str]]:
435
+ def wrapping_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
435
436
  """
436
437
  If set, the SecretID response will be
437
438
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
@@ -441,7 +442,7 @@ class _AuthBackendRoleSecretIdState:
441
442
  return pulumi.get(self, "wrapping_ttl")
442
443
 
443
444
  @wrapping_ttl.setter
444
- def wrapping_ttl(self, value: Optional[pulumi.Input[str]]):
445
+ def wrapping_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
445
446
  pulumi.set(self, "wrapping_ttl", value)
446
447
 
447
448
 
@@ -450,16 +451,16 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
450
451
  def __init__(__self__,
451
452
  resource_name: str,
452
453
  opts: Optional[pulumi.ResourceOptions] = None,
453
- backend: Optional[pulumi.Input[str]] = None,
454
- cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
455
- metadata: Optional[pulumi.Input[str]] = None,
456
- namespace: Optional[pulumi.Input[str]] = None,
457
- num_uses: Optional[pulumi.Input[int]] = None,
458
- role_name: Optional[pulumi.Input[str]] = None,
459
- secret_id: Optional[pulumi.Input[str]] = None,
460
- ttl: Optional[pulumi.Input[int]] = None,
461
- with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
462
- wrapping_ttl: Optional[pulumi.Input[str]] = None,
454
+ backend: Optional[pulumi.Input[builtins.str]] = None,
455
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
456
+ metadata: Optional[pulumi.Input[builtins.str]] = None,
457
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
458
+ num_uses: Optional[pulumi.Input[builtins.int]] = None,
459
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
460
+ secret_id: Optional[pulumi.Input[builtins.str]] = None,
461
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
462
+ with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
463
+ wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None,
463
464
  __props__=None):
464
465
  """
465
466
  Manages an AppRole auth backend SecretID in a Vault server. See the [Vault
@@ -492,24 +493,24 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
492
493
 
493
494
  :param str resource_name: The name of the resource.
494
495
  :param pulumi.ResourceOptions opts: Options for the resource.
495
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
496
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_lists: If set, specifies blocks of IP addresses which can
496
+ :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
497
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
497
498
  perform the login operation using this SecretID.
498
- :param pulumi.Input[str] metadata: A JSON-encoded string containing metadata in
499
+ :param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
499
500
  key-value pairs to be set on tokens issued with this SecretID.
500
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
501
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
501
502
  The value should not contain leading or trailing forward slashes.
502
503
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
503
504
  *Available only for Vault Enterprise*.
504
- :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
505
- :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
506
- :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
505
+ :param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
506
+ :param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
507
+ :param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
507
508
  mode. Defaults to Vault auto-generating SecretIDs.
508
- :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
509
- :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
509
+ :param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
510
+ :param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
510
511
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
511
512
  invalidated through unwrapping.
512
- :param pulumi.Input[str] wrapping_ttl: If set, the SecretID response will be
513
+ :param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
513
514
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
514
515
  and available for the duration specified. Only a single unwrapping of the
515
516
  token is allowed.
@@ -564,16 +565,16 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
564
565
  def _internal_init(__self__,
565
566
  resource_name: str,
566
567
  opts: Optional[pulumi.ResourceOptions] = None,
567
- backend: Optional[pulumi.Input[str]] = None,
568
- cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
569
- metadata: Optional[pulumi.Input[str]] = None,
570
- namespace: Optional[pulumi.Input[str]] = None,
571
- num_uses: Optional[pulumi.Input[int]] = None,
572
- role_name: Optional[pulumi.Input[str]] = None,
573
- secret_id: Optional[pulumi.Input[str]] = None,
574
- ttl: Optional[pulumi.Input[int]] = None,
575
- with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
576
- wrapping_ttl: Optional[pulumi.Input[str]] = None,
568
+ backend: Optional[pulumi.Input[builtins.str]] = None,
569
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
570
+ metadata: Optional[pulumi.Input[builtins.str]] = None,
571
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
572
+ num_uses: Optional[pulumi.Input[builtins.int]] = None,
573
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
574
+ secret_id: Optional[pulumi.Input[builtins.str]] = None,
575
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
576
+ with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
577
+ wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None,
577
578
  __props__=None):
578
579
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
579
580
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -612,19 +613,19 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
612
613
  def get(resource_name: str,
613
614
  id: pulumi.Input[str],
614
615
  opts: Optional[pulumi.ResourceOptions] = None,
615
- accessor: Optional[pulumi.Input[str]] = None,
616
- backend: Optional[pulumi.Input[str]] = None,
617
- cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
618
- metadata: Optional[pulumi.Input[str]] = None,
619
- namespace: Optional[pulumi.Input[str]] = None,
620
- num_uses: Optional[pulumi.Input[int]] = None,
621
- role_name: Optional[pulumi.Input[str]] = None,
622
- secret_id: Optional[pulumi.Input[str]] = None,
623
- ttl: Optional[pulumi.Input[int]] = None,
624
- with_wrapped_accessor: Optional[pulumi.Input[bool]] = None,
625
- wrapping_accessor: Optional[pulumi.Input[str]] = None,
626
- wrapping_token: Optional[pulumi.Input[str]] = None,
627
- wrapping_ttl: Optional[pulumi.Input[str]] = None) -> 'AuthBackendRoleSecretId':
616
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
617
+ backend: Optional[pulumi.Input[builtins.str]] = None,
618
+ cidr_lists: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
619
+ metadata: Optional[pulumi.Input[builtins.str]] = None,
620
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
621
+ num_uses: Optional[pulumi.Input[builtins.int]] = None,
622
+ role_name: Optional[pulumi.Input[builtins.str]] = None,
623
+ secret_id: Optional[pulumi.Input[builtins.str]] = None,
624
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
625
+ with_wrapped_accessor: Optional[pulumi.Input[builtins.bool]] = None,
626
+ wrapping_accessor: Optional[pulumi.Input[builtins.str]] = None,
627
+ wrapping_token: Optional[pulumi.Input[builtins.str]] = None,
628
+ wrapping_ttl: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendRoleSecretId':
628
629
  """
629
630
  Get an existing AuthBackendRoleSecretId resource's state with the given name, id, and optional extra
630
631
  properties used to qualify the lookup.
@@ -632,28 +633,28 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
632
633
  :param str resource_name: The unique name of the resulting resource.
633
634
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
634
635
  :param pulumi.ResourceOptions opts: Options for the resource.
635
- :param pulumi.Input[str] accessor: The unique ID for this SecretID that can be safely logged.
636
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
637
- :param pulumi.Input[Sequence[pulumi.Input[str]]] cidr_lists: If set, specifies blocks of IP addresses which can
636
+ :param pulumi.Input[builtins.str] accessor: The unique ID for this SecretID that can be safely logged.
637
+ :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
638
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] cidr_lists: If set, specifies blocks of IP addresses which can
638
639
  perform the login operation using this SecretID.
639
- :param pulumi.Input[str] metadata: A JSON-encoded string containing metadata in
640
+ :param pulumi.Input[builtins.str] metadata: A JSON-encoded string containing metadata in
640
641
  key-value pairs to be set on tokens issued with this SecretID.
641
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
642
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
642
643
  The value should not contain leading or trailing forward slashes.
643
644
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
644
645
  *Available only for Vault Enterprise*.
645
- :param pulumi.Input[int] num_uses: The number of uses for the secret-id.
646
- :param pulumi.Input[str] role_name: The name of the role to create the SecretID for.
647
- :param pulumi.Input[str] secret_id: The SecretID to be created. If set, uses "Push"
646
+ :param pulumi.Input[builtins.int] num_uses: The number of uses for the secret-id.
647
+ :param pulumi.Input[builtins.str] role_name: The name of the role to create the SecretID for.
648
+ :param pulumi.Input[builtins.str] secret_id: The SecretID to be created. If set, uses "Push"
648
649
  mode. Defaults to Vault auto-generating SecretIDs.
649
- :param pulumi.Input[int] ttl: The TTL duration of the SecretID.
650
- :param pulumi.Input[bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
650
+ :param pulumi.Input[builtins.int] ttl: The TTL duration of the SecretID.
651
+ :param pulumi.Input[builtins.bool] with_wrapped_accessor: Set to `true` to use the wrapped secret-id accessor as the resource ID.
651
652
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
652
653
  invalidated through unwrapping.
653
- :param pulumi.Input[str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
654
+ :param pulumi.Input[builtins.str] wrapping_accessor: The unique ID for the response-wrapped SecretID that can
654
655
  be safely logged.
655
- :param pulumi.Input[str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
656
- :param pulumi.Input[str] wrapping_ttl: If set, the SecretID response will be
656
+ :param pulumi.Input[builtins.str] wrapping_token: The token used to retrieve a response-wrapped SecretID.
657
+ :param pulumi.Input[builtins.str] wrapping_ttl: If set, the SecretID response will be
657
658
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)
658
659
  and available for the duration specified. Only a single unwrapping of the
659
660
  token is allowed.
@@ -679,7 +680,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
679
680
 
680
681
  @property
681
682
  @pulumi.getter
682
- def accessor(self) -> pulumi.Output[str]:
683
+ def accessor(self) -> pulumi.Output[builtins.str]:
683
684
  """
684
685
  The unique ID for this SecretID that can be safely logged.
685
686
  """
@@ -687,7 +688,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
687
688
 
688
689
  @property
689
690
  @pulumi.getter
690
- def backend(self) -> pulumi.Output[Optional[str]]:
691
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
691
692
  """
692
693
  Unique name of the auth backend to configure.
693
694
  """
@@ -695,7 +696,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
695
696
 
696
697
  @property
697
698
  @pulumi.getter(name="cidrLists")
698
- def cidr_lists(self) -> pulumi.Output[Optional[Sequence[str]]]:
699
+ def cidr_lists(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
699
700
  """
700
701
  If set, specifies blocks of IP addresses which can
701
702
  perform the login operation using this SecretID.
@@ -704,7 +705,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
704
705
 
705
706
  @property
706
707
  @pulumi.getter
707
- def metadata(self) -> pulumi.Output[Optional[str]]:
708
+ def metadata(self) -> pulumi.Output[Optional[builtins.str]]:
708
709
  """
709
710
  A JSON-encoded string containing metadata in
710
711
  key-value pairs to be set on tokens issued with this SecretID.
@@ -713,7 +714,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
713
714
 
714
715
  @property
715
716
  @pulumi.getter
716
- def namespace(self) -> pulumi.Output[Optional[str]]:
717
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
717
718
  """
718
719
  The namespace to provision the resource in.
719
720
  The value should not contain leading or trailing forward slashes.
@@ -724,7 +725,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
724
725
 
725
726
  @property
726
727
  @pulumi.getter(name="numUses")
727
- def num_uses(self) -> pulumi.Output[Optional[int]]:
728
+ def num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
728
729
  """
729
730
  The number of uses for the secret-id.
730
731
  """
@@ -732,7 +733,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
732
733
 
733
734
  @property
734
735
  @pulumi.getter(name="roleName")
735
- def role_name(self) -> pulumi.Output[str]:
736
+ def role_name(self) -> pulumi.Output[builtins.str]:
736
737
  """
737
738
  The name of the role to create the SecretID for.
738
739
  """
@@ -740,7 +741,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
740
741
 
741
742
  @property
742
743
  @pulumi.getter(name="secretId")
743
- def secret_id(self) -> pulumi.Output[str]:
744
+ def secret_id(self) -> pulumi.Output[builtins.str]:
744
745
  """
745
746
  The SecretID to be created. If set, uses "Push"
746
747
  mode. Defaults to Vault auto-generating SecretIDs.
@@ -749,7 +750,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
749
750
 
750
751
  @property
751
752
  @pulumi.getter
752
- def ttl(self) -> pulumi.Output[Optional[int]]:
753
+ def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
753
754
  """
754
755
  The TTL duration of the SecretID.
755
756
  """
@@ -757,7 +758,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
757
758
 
758
759
  @property
759
760
  @pulumi.getter(name="withWrappedAccessor")
760
- def with_wrapped_accessor(self) -> pulumi.Output[Optional[bool]]:
761
+ def with_wrapped_accessor(self) -> pulumi.Output[Optional[builtins.bool]]:
761
762
  """
762
763
  Set to `true` to use the wrapped secret-id accessor as the resource ID.
763
764
  If `false` (default value), a fresh secret ID will be regenerated whenever the wrapping token is expired or
@@ -767,7 +768,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
767
768
 
768
769
  @property
769
770
  @pulumi.getter(name="wrappingAccessor")
770
- def wrapping_accessor(self) -> pulumi.Output[str]:
771
+ def wrapping_accessor(self) -> pulumi.Output[builtins.str]:
771
772
  """
772
773
  The unique ID for the response-wrapped SecretID that can
773
774
  be safely logged.
@@ -776,7 +777,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
776
777
 
777
778
  @property
778
779
  @pulumi.getter(name="wrappingToken")
779
- def wrapping_token(self) -> pulumi.Output[str]:
780
+ def wrapping_token(self) -> pulumi.Output[builtins.str]:
780
781
  """
781
782
  The token used to retrieve a response-wrapped SecretID.
782
783
  """
@@ -784,7 +785,7 @@ class AuthBackendRoleSecretId(pulumi.CustomResource):
784
785
 
785
786
  @property
786
787
  @pulumi.getter(name="wrappingTtl")
787
- def wrapping_ttl(self) -> pulumi.Output[Optional[str]]:
788
+ def wrapping_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
788
789
  """
789
790
  If set, the SecretID response will be
790
791
  [response-wrapped](https://www.vaultproject.io/docs/concepts/response-wrapping)