pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,48 +20,48 @@ __all__ = ['NomadSecretBackendArgs', 'NomadSecretBackend']
19
20
  @pulumi.input_type
20
21
  class NomadSecretBackendArgs:
21
22
  def __init__(__self__, *,
22
- address: Optional[pulumi.Input[str]] = None,
23
- backend: Optional[pulumi.Input[str]] = None,
24
- ca_cert: Optional[pulumi.Input[str]] = None,
25
- client_cert: Optional[pulumi.Input[str]] = None,
26
- client_key: Optional[pulumi.Input[str]] = None,
27
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
28
- description: Optional[pulumi.Input[str]] = None,
29
- disable_remount: Optional[pulumi.Input[bool]] = None,
30
- local: Optional[pulumi.Input[bool]] = None,
31
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
32
- max_token_name_length: Optional[pulumi.Input[int]] = None,
33
- max_ttl: Optional[pulumi.Input[int]] = None,
34
- namespace: Optional[pulumi.Input[str]] = None,
35
- token: Optional[pulumi.Input[str]] = None,
36
- ttl: Optional[pulumi.Input[int]] = None):
23
+ address: Optional[pulumi.Input[builtins.str]] = None,
24
+ backend: Optional[pulumi.Input[builtins.str]] = None,
25
+ ca_cert: Optional[pulumi.Input[builtins.str]] = None,
26
+ client_cert: Optional[pulumi.Input[builtins.str]] = None,
27
+ client_key: Optional[pulumi.Input[builtins.str]] = None,
28
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
29
+ description: Optional[pulumi.Input[builtins.str]] = None,
30
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
31
+ local: Optional[pulumi.Input[builtins.bool]] = None,
32
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
33
+ max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
34
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
35
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
36
+ token: Optional[pulumi.Input[builtins.str]] = None,
37
+ ttl: Optional[pulumi.Input[builtins.int]] = None):
37
38
  """
38
39
  The set of arguments for constructing a NomadSecretBackend resource.
39
- :param pulumi.Input[str] address: Specifies the address of the Nomad instance, provided
40
+ :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
40
41
  as "protocol://host:port" like "http://127.0.0.1:4646".
41
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
42
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
42
43
  not begin or end with a `/`. Defaults to `nomad`.
43
- :param pulumi.Input[str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
44
+ :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
44
45
  x509 PEM encoded.
45
- :param pulumi.Input[str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
46
- :param pulumi.Input[str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
47
- :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
48
- :param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
49
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
46
+ :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
47
+ :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
48
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
49
+ :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
50
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
50
51
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
51
- :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
52
+ :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
52
53
  replication.Tolerance duration to use when checking the last rotation time.
53
- :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
54
- :param pulumi.Input[int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
54
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
55
+ :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
55
56
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
56
57
  by the Nomad version.
57
- :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
58
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
58
+ :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
59
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
59
60
  The value should not contain leading or trailing forward slashes.
60
61
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
61
62
  *Available only for Vault Enterprise*.
62
- :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
63
- :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
63
+ :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
64
+ :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
64
65
  """
65
66
  if address is not None:
66
67
  pulumi.set(__self__, "address", address)
@@ -95,7 +96,7 @@ class NomadSecretBackendArgs:
95
96
 
96
97
  @property
97
98
  @pulumi.getter
98
- def address(self) -> Optional[pulumi.Input[str]]:
99
+ def address(self) -> Optional[pulumi.Input[builtins.str]]:
99
100
  """
100
101
  Specifies the address of the Nomad instance, provided
101
102
  as "protocol://host:port" like "http://127.0.0.1:4646".
@@ -103,12 +104,12 @@ class NomadSecretBackendArgs:
103
104
  return pulumi.get(self, "address")
104
105
 
105
106
  @address.setter
106
- def address(self, value: Optional[pulumi.Input[str]]):
107
+ def address(self, value: Optional[pulumi.Input[builtins.str]]):
107
108
  pulumi.set(self, "address", value)
108
109
 
109
110
  @property
110
111
  @pulumi.getter
111
- def backend(self) -> Optional[pulumi.Input[str]]:
112
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
112
113
  """
113
114
  The unique path this backend should be mounted at. Must
114
115
  not begin or end with a `/`. Defaults to `nomad`.
@@ -116,12 +117,12 @@ class NomadSecretBackendArgs:
116
117
  return pulumi.get(self, "backend")
117
118
 
118
119
  @backend.setter
119
- def backend(self, value: Optional[pulumi.Input[str]]):
120
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
120
121
  pulumi.set(self, "backend", value)
121
122
 
122
123
  @property
123
124
  @pulumi.getter(name="caCert")
124
- def ca_cert(self) -> Optional[pulumi.Input[str]]:
125
+ def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
125
126
  """
126
127
  CA certificate to use when verifying the Nomad server certificate, must be
127
128
  x509 PEM encoded.
@@ -129,60 +130,60 @@ class NomadSecretBackendArgs:
129
130
  return pulumi.get(self, "ca_cert")
130
131
 
131
132
  @ca_cert.setter
132
- def ca_cert(self, value: Optional[pulumi.Input[str]]):
133
+ def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
133
134
  pulumi.set(self, "ca_cert", value)
134
135
 
135
136
  @property
136
137
  @pulumi.getter(name="clientCert")
137
- def client_cert(self) -> Optional[pulumi.Input[str]]:
138
+ def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
138
139
  """
139
140
  Client certificate to provide to the Nomad server, must be x509 PEM encoded.
140
141
  """
141
142
  return pulumi.get(self, "client_cert")
142
143
 
143
144
  @client_cert.setter
144
- def client_cert(self, value: Optional[pulumi.Input[str]]):
145
+ def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
145
146
  pulumi.set(self, "client_cert", value)
146
147
 
147
148
  @property
148
149
  @pulumi.getter(name="clientKey")
149
- def client_key(self) -> Optional[pulumi.Input[str]]:
150
+ def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
150
151
  """
151
152
  Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
152
153
  """
153
154
  return pulumi.get(self, "client_key")
154
155
 
155
156
  @client_key.setter
156
- def client_key(self, value: Optional[pulumi.Input[str]]):
157
+ def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
157
158
  pulumi.set(self, "client_key", value)
158
159
 
159
160
  @property
160
161
  @pulumi.getter(name="defaultLeaseTtlSeconds")
161
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
162
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
162
163
  """
163
164
  Default lease duration for secrets in seconds.
164
165
  """
165
166
  return pulumi.get(self, "default_lease_ttl_seconds")
166
167
 
167
168
  @default_lease_ttl_seconds.setter
168
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
169
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
169
170
  pulumi.set(self, "default_lease_ttl_seconds", value)
170
171
 
171
172
  @property
172
173
  @pulumi.getter
173
- def description(self) -> Optional[pulumi.Input[str]]:
174
+ def description(self) -> Optional[pulumi.Input[builtins.str]]:
174
175
  """
175
176
  Human-friendly description of the mount for the Active Directory backend.
176
177
  """
177
178
  return pulumi.get(self, "description")
178
179
 
179
180
  @description.setter
180
- def description(self, value: Optional[pulumi.Input[str]]):
181
+ def description(self, value: Optional[pulumi.Input[builtins.str]]):
181
182
  pulumi.set(self, "description", value)
182
183
 
183
184
  @property
184
185
  @pulumi.getter(name="disableRemount")
185
- def disable_remount(self) -> Optional[pulumi.Input[bool]]:
186
+ def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
186
187
  """
187
188
  If set, opts out of mount migration on path updates.
188
189
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -190,12 +191,12 @@ class NomadSecretBackendArgs:
190
191
  return pulumi.get(self, "disable_remount")
191
192
 
192
193
  @disable_remount.setter
193
- def disable_remount(self, value: Optional[pulumi.Input[bool]]):
194
+ def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
194
195
  pulumi.set(self, "disable_remount", value)
195
196
 
196
197
  @property
197
198
  @pulumi.getter
198
- def local(self) -> Optional[pulumi.Input[bool]]:
199
+ def local(self) -> Optional[pulumi.Input[builtins.bool]]:
199
200
  """
200
201
  Mark the secrets engine as local-only. Local engines are not replicated or removed by
201
202
  replication.Tolerance duration to use when checking the last rotation time.
@@ -203,24 +204,24 @@ class NomadSecretBackendArgs:
203
204
  return pulumi.get(self, "local")
204
205
 
205
206
  @local.setter
206
- def local(self, value: Optional[pulumi.Input[bool]]):
207
+ def local(self, value: Optional[pulumi.Input[builtins.bool]]):
207
208
  pulumi.set(self, "local", value)
208
209
 
209
210
  @property
210
211
  @pulumi.getter(name="maxLeaseTtlSeconds")
211
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
212
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
212
213
  """
213
214
  Maximum possible lease duration for secrets in seconds.
214
215
  """
215
216
  return pulumi.get(self, "max_lease_ttl_seconds")
216
217
 
217
218
  @max_lease_ttl_seconds.setter
218
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
219
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
219
220
  pulumi.set(self, "max_lease_ttl_seconds", value)
220
221
 
221
222
  @property
222
223
  @pulumi.getter(name="maxTokenNameLength")
223
- def max_token_name_length(self) -> Optional[pulumi.Input[int]]:
224
+ def max_token_name_length(self) -> Optional[pulumi.Input[builtins.int]]:
224
225
  """
225
226
  Specifies the maximum length to use for the name of the Nomad token
226
227
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -229,24 +230,24 @@ class NomadSecretBackendArgs:
229
230
  return pulumi.get(self, "max_token_name_length")
230
231
 
231
232
  @max_token_name_length.setter
232
- def max_token_name_length(self, value: Optional[pulumi.Input[int]]):
233
+ def max_token_name_length(self, value: Optional[pulumi.Input[builtins.int]]):
233
234
  pulumi.set(self, "max_token_name_length", value)
234
235
 
235
236
  @property
236
237
  @pulumi.getter(name="maxTtl")
237
- def max_ttl(self) -> Optional[pulumi.Input[int]]:
238
+ def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
238
239
  """
239
240
  Maximum possible lease duration for secrets in seconds.
240
241
  """
241
242
  return pulumi.get(self, "max_ttl")
242
243
 
243
244
  @max_ttl.setter
244
- def max_ttl(self, value: Optional[pulumi.Input[int]]):
245
+ def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
245
246
  pulumi.set(self, "max_ttl", value)
246
247
 
247
248
  @property
248
249
  @pulumi.getter
249
- def namespace(self) -> Optional[pulumi.Input[str]]:
250
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
250
251
  """
251
252
  The namespace to provision the resource in.
252
253
  The value should not contain leading or trailing forward slashes.
@@ -256,79 +257,79 @@ class NomadSecretBackendArgs:
256
257
  return pulumi.get(self, "namespace")
257
258
 
258
259
  @namespace.setter
259
- def namespace(self, value: Optional[pulumi.Input[str]]):
260
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
260
261
  pulumi.set(self, "namespace", value)
261
262
 
262
263
  @property
263
264
  @pulumi.getter
264
- def token(self) -> Optional[pulumi.Input[str]]:
265
+ def token(self) -> Optional[pulumi.Input[builtins.str]]:
265
266
  """
266
267
  Specifies the Nomad Management token to use.
267
268
  """
268
269
  return pulumi.get(self, "token")
269
270
 
270
271
  @token.setter
271
- def token(self, value: Optional[pulumi.Input[str]]):
272
+ def token(self, value: Optional[pulumi.Input[builtins.str]]):
272
273
  pulumi.set(self, "token", value)
273
274
 
274
275
  @property
275
276
  @pulumi.getter
276
- def ttl(self) -> Optional[pulumi.Input[int]]:
277
+ def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
277
278
  """
278
279
  Specifies the ttl of the lease for the generated token.
279
280
  """
280
281
  return pulumi.get(self, "ttl")
281
282
 
282
283
  @ttl.setter
283
- def ttl(self, value: Optional[pulumi.Input[int]]):
284
+ def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
284
285
  pulumi.set(self, "ttl", value)
285
286
 
286
287
 
287
288
  @pulumi.input_type
288
289
  class _NomadSecretBackendState:
289
290
  def __init__(__self__, *,
290
- address: Optional[pulumi.Input[str]] = None,
291
- backend: Optional[pulumi.Input[str]] = None,
292
- ca_cert: Optional[pulumi.Input[str]] = None,
293
- client_cert: Optional[pulumi.Input[str]] = None,
294
- client_key: Optional[pulumi.Input[str]] = None,
295
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
296
- description: Optional[pulumi.Input[str]] = None,
297
- disable_remount: Optional[pulumi.Input[bool]] = None,
298
- local: Optional[pulumi.Input[bool]] = None,
299
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
300
- max_token_name_length: Optional[pulumi.Input[int]] = None,
301
- max_ttl: Optional[pulumi.Input[int]] = None,
302
- namespace: Optional[pulumi.Input[str]] = None,
303
- token: Optional[pulumi.Input[str]] = None,
304
- ttl: Optional[pulumi.Input[int]] = None):
291
+ address: Optional[pulumi.Input[builtins.str]] = None,
292
+ backend: Optional[pulumi.Input[builtins.str]] = None,
293
+ ca_cert: Optional[pulumi.Input[builtins.str]] = None,
294
+ client_cert: Optional[pulumi.Input[builtins.str]] = None,
295
+ client_key: Optional[pulumi.Input[builtins.str]] = None,
296
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
297
+ description: Optional[pulumi.Input[builtins.str]] = None,
298
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
299
+ local: Optional[pulumi.Input[builtins.bool]] = None,
300
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
301
+ max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
302
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
303
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
304
+ token: Optional[pulumi.Input[builtins.str]] = None,
305
+ ttl: Optional[pulumi.Input[builtins.int]] = None):
305
306
  """
306
307
  Input properties used for looking up and filtering NomadSecretBackend resources.
307
- :param pulumi.Input[str] address: Specifies the address of the Nomad instance, provided
308
+ :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
308
309
  as "protocol://host:port" like "http://127.0.0.1:4646".
309
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
310
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
310
311
  not begin or end with a `/`. Defaults to `nomad`.
311
- :param pulumi.Input[str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
312
+ :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
312
313
  x509 PEM encoded.
313
- :param pulumi.Input[str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
314
- :param pulumi.Input[str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
315
- :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
316
- :param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
317
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
314
+ :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
315
+ :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
316
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
317
+ :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
318
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
318
319
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
319
- :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
320
+ :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
320
321
  replication.Tolerance duration to use when checking the last rotation time.
321
- :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
322
- :param pulumi.Input[int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
322
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
323
+ :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
323
324
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
324
325
  by the Nomad version.
325
- :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
326
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
326
+ :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
327
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
327
328
  The value should not contain leading or trailing forward slashes.
328
329
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
329
330
  *Available only for Vault Enterprise*.
330
- :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
331
- :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
331
+ :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
332
+ :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
332
333
  """
333
334
  if address is not None:
334
335
  pulumi.set(__self__, "address", address)
@@ -363,7 +364,7 @@ class _NomadSecretBackendState:
363
364
 
364
365
  @property
365
366
  @pulumi.getter
366
- def address(self) -> Optional[pulumi.Input[str]]:
367
+ def address(self) -> Optional[pulumi.Input[builtins.str]]:
367
368
  """
368
369
  Specifies the address of the Nomad instance, provided
369
370
  as "protocol://host:port" like "http://127.0.0.1:4646".
@@ -371,12 +372,12 @@ class _NomadSecretBackendState:
371
372
  return pulumi.get(self, "address")
372
373
 
373
374
  @address.setter
374
- def address(self, value: Optional[pulumi.Input[str]]):
375
+ def address(self, value: Optional[pulumi.Input[builtins.str]]):
375
376
  pulumi.set(self, "address", value)
376
377
 
377
378
  @property
378
379
  @pulumi.getter
379
- def backend(self) -> Optional[pulumi.Input[str]]:
380
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
380
381
  """
381
382
  The unique path this backend should be mounted at. Must
382
383
  not begin or end with a `/`. Defaults to `nomad`.
@@ -384,12 +385,12 @@ class _NomadSecretBackendState:
384
385
  return pulumi.get(self, "backend")
385
386
 
386
387
  @backend.setter
387
- def backend(self, value: Optional[pulumi.Input[str]]):
388
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
388
389
  pulumi.set(self, "backend", value)
389
390
 
390
391
  @property
391
392
  @pulumi.getter(name="caCert")
392
- def ca_cert(self) -> Optional[pulumi.Input[str]]:
393
+ def ca_cert(self) -> Optional[pulumi.Input[builtins.str]]:
393
394
  """
394
395
  CA certificate to use when verifying the Nomad server certificate, must be
395
396
  x509 PEM encoded.
@@ -397,60 +398,60 @@ class _NomadSecretBackendState:
397
398
  return pulumi.get(self, "ca_cert")
398
399
 
399
400
  @ca_cert.setter
400
- def ca_cert(self, value: Optional[pulumi.Input[str]]):
401
+ def ca_cert(self, value: Optional[pulumi.Input[builtins.str]]):
401
402
  pulumi.set(self, "ca_cert", value)
402
403
 
403
404
  @property
404
405
  @pulumi.getter(name="clientCert")
405
- def client_cert(self) -> Optional[pulumi.Input[str]]:
406
+ def client_cert(self) -> Optional[pulumi.Input[builtins.str]]:
406
407
  """
407
408
  Client certificate to provide to the Nomad server, must be x509 PEM encoded.
408
409
  """
409
410
  return pulumi.get(self, "client_cert")
410
411
 
411
412
  @client_cert.setter
412
- def client_cert(self, value: Optional[pulumi.Input[str]]):
413
+ def client_cert(self, value: Optional[pulumi.Input[builtins.str]]):
413
414
  pulumi.set(self, "client_cert", value)
414
415
 
415
416
  @property
416
417
  @pulumi.getter(name="clientKey")
417
- def client_key(self) -> Optional[pulumi.Input[str]]:
418
+ def client_key(self) -> Optional[pulumi.Input[builtins.str]]:
418
419
  """
419
420
  Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
420
421
  """
421
422
  return pulumi.get(self, "client_key")
422
423
 
423
424
  @client_key.setter
424
- def client_key(self, value: Optional[pulumi.Input[str]]):
425
+ def client_key(self, value: Optional[pulumi.Input[builtins.str]]):
425
426
  pulumi.set(self, "client_key", value)
426
427
 
427
428
  @property
428
429
  @pulumi.getter(name="defaultLeaseTtlSeconds")
429
- def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
430
+ def default_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
430
431
  """
431
432
  Default lease duration for secrets in seconds.
432
433
  """
433
434
  return pulumi.get(self, "default_lease_ttl_seconds")
434
435
 
435
436
  @default_lease_ttl_seconds.setter
436
- def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
437
+ def default_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
437
438
  pulumi.set(self, "default_lease_ttl_seconds", value)
438
439
 
439
440
  @property
440
441
  @pulumi.getter
441
- def description(self) -> Optional[pulumi.Input[str]]:
442
+ def description(self) -> Optional[pulumi.Input[builtins.str]]:
442
443
  """
443
444
  Human-friendly description of the mount for the Active Directory backend.
444
445
  """
445
446
  return pulumi.get(self, "description")
446
447
 
447
448
  @description.setter
448
- def description(self, value: Optional[pulumi.Input[str]]):
449
+ def description(self, value: Optional[pulumi.Input[builtins.str]]):
449
450
  pulumi.set(self, "description", value)
450
451
 
451
452
  @property
452
453
  @pulumi.getter(name="disableRemount")
453
- def disable_remount(self) -> Optional[pulumi.Input[bool]]:
454
+ def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
454
455
  """
455
456
  If set, opts out of mount migration on path updates.
456
457
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -458,12 +459,12 @@ class _NomadSecretBackendState:
458
459
  return pulumi.get(self, "disable_remount")
459
460
 
460
461
  @disable_remount.setter
461
- def disable_remount(self, value: Optional[pulumi.Input[bool]]):
462
+ def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
462
463
  pulumi.set(self, "disable_remount", value)
463
464
 
464
465
  @property
465
466
  @pulumi.getter
466
- def local(self) -> Optional[pulumi.Input[bool]]:
467
+ def local(self) -> Optional[pulumi.Input[builtins.bool]]:
467
468
  """
468
469
  Mark the secrets engine as local-only. Local engines are not replicated or removed by
469
470
  replication.Tolerance duration to use when checking the last rotation time.
@@ -471,24 +472,24 @@ class _NomadSecretBackendState:
471
472
  return pulumi.get(self, "local")
472
473
 
473
474
  @local.setter
474
- def local(self, value: Optional[pulumi.Input[bool]]):
475
+ def local(self, value: Optional[pulumi.Input[builtins.bool]]):
475
476
  pulumi.set(self, "local", value)
476
477
 
477
478
  @property
478
479
  @pulumi.getter(name="maxLeaseTtlSeconds")
479
- def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[int]]:
480
+ def max_lease_ttl_seconds(self) -> Optional[pulumi.Input[builtins.int]]:
480
481
  """
481
482
  Maximum possible lease duration for secrets in seconds.
482
483
  """
483
484
  return pulumi.get(self, "max_lease_ttl_seconds")
484
485
 
485
486
  @max_lease_ttl_seconds.setter
486
- def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[int]]):
487
+ def max_lease_ttl_seconds(self, value: Optional[pulumi.Input[builtins.int]]):
487
488
  pulumi.set(self, "max_lease_ttl_seconds", value)
488
489
 
489
490
  @property
490
491
  @pulumi.getter(name="maxTokenNameLength")
491
- def max_token_name_length(self) -> Optional[pulumi.Input[int]]:
492
+ def max_token_name_length(self) -> Optional[pulumi.Input[builtins.int]]:
492
493
  """
493
494
  Specifies the maximum length to use for the name of the Nomad token
494
495
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -497,24 +498,24 @@ class _NomadSecretBackendState:
497
498
  return pulumi.get(self, "max_token_name_length")
498
499
 
499
500
  @max_token_name_length.setter
500
- def max_token_name_length(self, value: Optional[pulumi.Input[int]]):
501
+ def max_token_name_length(self, value: Optional[pulumi.Input[builtins.int]]):
501
502
  pulumi.set(self, "max_token_name_length", value)
502
503
 
503
504
  @property
504
505
  @pulumi.getter(name="maxTtl")
505
- def max_ttl(self) -> Optional[pulumi.Input[int]]:
506
+ def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
506
507
  """
507
508
  Maximum possible lease duration for secrets in seconds.
508
509
  """
509
510
  return pulumi.get(self, "max_ttl")
510
511
 
511
512
  @max_ttl.setter
512
- def max_ttl(self, value: Optional[pulumi.Input[int]]):
513
+ def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
513
514
  pulumi.set(self, "max_ttl", value)
514
515
 
515
516
  @property
516
517
  @pulumi.getter
517
- def namespace(self) -> Optional[pulumi.Input[str]]:
518
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
518
519
  """
519
520
  The namespace to provision the resource in.
520
521
  The value should not contain leading or trailing forward slashes.
@@ -524,31 +525,31 @@ class _NomadSecretBackendState:
524
525
  return pulumi.get(self, "namespace")
525
526
 
526
527
  @namespace.setter
527
- def namespace(self, value: Optional[pulumi.Input[str]]):
528
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
528
529
  pulumi.set(self, "namespace", value)
529
530
 
530
531
  @property
531
532
  @pulumi.getter
532
- def token(self) -> Optional[pulumi.Input[str]]:
533
+ def token(self) -> Optional[pulumi.Input[builtins.str]]:
533
534
  """
534
535
  Specifies the Nomad Management token to use.
535
536
  """
536
537
  return pulumi.get(self, "token")
537
538
 
538
539
  @token.setter
539
- def token(self, value: Optional[pulumi.Input[str]]):
540
+ def token(self, value: Optional[pulumi.Input[builtins.str]]):
540
541
  pulumi.set(self, "token", value)
541
542
 
542
543
  @property
543
544
  @pulumi.getter
544
- def ttl(self) -> Optional[pulumi.Input[int]]:
545
+ def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
545
546
  """
546
547
  Specifies the ttl of the lease for the generated token.
547
548
  """
548
549
  return pulumi.get(self, "ttl")
549
550
 
550
551
  @ttl.setter
551
- def ttl(self, value: Optional[pulumi.Input[int]]):
552
+ def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
552
553
  pulumi.set(self, "ttl", value)
553
554
 
554
555
 
@@ -557,21 +558,21 @@ class NomadSecretBackend(pulumi.CustomResource):
557
558
  def __init__(__self__,
558
559
  resource_name: str,
559
560
  opts: Optional[pulumi.ResourceOptions] = None,
560
- address: Optional[pulumi.Input[str]] = None,
561
- backend: Optional[pulumi.Input[str]] = None,
562
- ca_cert: Optional[pulumi.Input[str]] = None,
563
- client_cert: Optional[pulumi.Input[str]] = None,
564
- client_key: Optional[pulumi.Input[str]] = None,
565
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
566
- description: Optional[pulumi.Input[str]] = None,
567
- disable_remount: Optional[pulumi.Input[bool]] = None,
568
- local: Optional[pulumi.Input[bool]] = None,
569
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
570
- max_token_name_length: Optional[pulumi.Input[int]] = None,
571
- max_ttl: Optional[pulumi.Input[int]] = None,
572
- namespace: Optional[pulumi.Input[str]] = None,
573
- token: Optional[pulumi.Input[str]] = None,
574
- ttl: Optional[pulumi.Input[int]] = None,
561
+ address: Optional[pulumi.Input[builtins.str]] = None,
562
+ backend: Optional[pulumi.Input[builtins.str]] = None,
563
+ ca_cert: Optional[pulumi.Input[builtins.str]] = None,
564
+ client_cert: Optional[pulumi.Input[builtins.str]] = None,
565
+ client_key: Optional[pulumi.Input[builtins.str]] = None,
566
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
567
+ description: Optional[pulumi.Input[builtins.str]] = None,
568
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
569
+ local: Optional[pulumi.Input[builtins.bool]] = None,
570
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
571
+ max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
572
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
573
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
574
+ token: Optional[pulumi.Input[builtins.str]] = None,
575
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
575
576
  __props__=None):
576
577
  """
577
578
  ## Example Usage
@@ -601,31 +602,31 @@ class NomadSecretBackend(pulumi.CustomResource):
601
602
 
602
603
  :param str resource_name: The name of the resource.
603
604
  :param pulumi.ResourceOptions opts: Options for the resource.
604
- :param pulumi.Input[str] address: Specifies the address of the Nomad instance, provided
605
+ :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
605
606
  as "protocol://host:port" like "http://127.0.0.1:4646".
606
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
607
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
607
608
  not begin or end with a `/`. Defaults to `nomad`.
608
- :param pulumi.Input[str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
609
+ :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
609
610
  x509 PEM encoded.
610
- :param pulumi.Input[str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
611
- :param pulumi.Input[str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
612
- :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
613
- :param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
614
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
611
+ :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
612
+ :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
613
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
614
+ :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
615
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
615
616
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
616
- :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
617
+ :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
617
618
  replication.Tolerance duration to use when checking the last rotation time.
618
- :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
619
- :param pulumi.Input[int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
619
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
620
+ :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
620
621
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
621
622
  by the Nomad version.
622
- :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
623
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
623
+ :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
624
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
624
625
  The value should not contain leading or trailing forward slashes.
625
626
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
626
627
  *Available only for Vault Enterprise*.
627
- :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
628
- :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
628
+ :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
629
+ :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
629
630
  """
630
631
  ...
631
632
  @overload
@@ -674,21 +675,21 @@ class NomadSecretBackend(pulumi.CustomResource):
674
675
  def _internal_init(__self__,
675
676
  resource_name: str,
676
677
  opts: Optional[pulumi.ResourceOptions] = None,
677
- address: Optional[pulumi.Input[str]] = None,
678
- backend: Optional[pulumi.Input[str]] = None,
679
- ca_cert: Optional[pulumi.Input[str]] = None,
680
- client_cert: Optional[pulumi.Input[str]] = None,
681
- client_key: Optional[pulumi.Input[str]] = None,
682
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
683
- description: Optional[pulumi.Input[str]] = None,
684
- disable_remount: Optional[pulumi.Input[bool]] = None,
685
- local: Optional[pulumi.Input[bool]] = None,
686
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
687
- max_token_name_length: Optional[pulumi.Input[int]] = None,
688
- max_ttl: Optional[pulumi.Input[int]] = None,
689
- namespace: Optional[pulumi.Input[str]] = None,
690
- token: Optional[pulumi.Input[str]] = None,
691
- ttl: Optional[pulumi.Input[int]] = None,
678
+ address: Optional[pulumi.Input[builtins.str]] = None,
679
+ backend: Optional[pulumi.Input[builtins.str]] = None,
680
+ ca_cert: Optional[pulumi.Input[builtins.str]] = None,
681
+ client_cert: Optional[pulumi.Input[builtins.str]] = None,
682
+ client_key: Optional[pulumi.Input[builtins.str]] = None,
683
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
684
+ description: Optional[pulumi.Input[builtins.str]] = None,
685
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
686
+ local: Optional[pulumi.Input[builtins.bool]] = None,
687
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
688
+ max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
689
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
690
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
691
+ token: Optional[pulumi.Input[builtins.str]] = None,
692
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
692
693
  __props__=None):
693
694
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
694
695
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -725,21 +726,21 @@ class NomadSecretBackend(pulumi.CustomResource):
725
726
  def get(resource_name: str,
726
727
  id: pulumi.Input[str],
727
728
  opts: Optional[pulumi.ResourceOptions] = None,
728
- address: Optional[pulumi.Input[str]] = None,
729
- backend: Optional[pulumi.Input[str]] = None,
730
- ca_cert: Optional[pulumi.Input[str]] = None,
731
- client_cert: Optional[pulumi.Input[str]] = None,
732
- client_key: Optional[pulumi.Input[str]] = None,
733
- default_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
734
- description: Optional[pulumi.Input[str]] = None,
735
- disable_remount: Optional[pulumi.Input[bool]] = None,
736
- local: Optional[pulumi.Input[bool]] = None,
737
- max_lease_ttl_seconds: Optional[pulumi.Input[int]] = None,
738
- max_token_name_length: Optional[pulumi.Input[int]] = None,
739
- max_ttl: Optional[pulumi.Input[int]] = None,
740
- namespace: Optional[pulumi.Input[str]] = None,
741
- token: Optional[pulumi.Input[str]] = None,
742
- ttl: Optional[pulumi.Input[int]] = None) -> 'NomadSecretBackend':
729
+ address: Optional[pulumi.Input[builtins.str]] = None,
730
+ backend: Optional[pulumi.Input[builtins.str]] = None,
731
+ ca_cert: Optional[pulumi.Input[builtins.str]] = None,
732
+ client_cert: Optional[pulumi.Input[builtins.str]] = None,
733
+ client_key: Optional[pulumi.Input[builtins.str]] = None,
734
+ default_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
735
+ description: Optional[pulumi.Input[builtins.str]] = None,
736
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
737
+ local: Optional[pulumi.Input[builtins.bool]] = None,
738
+ max_lease_ttl_seconds: Optional[pulumi.Input[builtins.int]] = None,
739
+ max_token_name_length: Optional[pulumi.Input[builtins.int]] = None,
740
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
741
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
742
+ token: Optional[pulumi.Input[builtins.str]] = None,
743
+ ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'NomadSecretBackend':
743
744
  """
744
745
  Get an existing NomadSecretBackend resource's state with the given name, id, and optional extra
745
746
  properties used to qualify the lookup.
@@ -747,31 +748,31 @@ class NomadSecretBackend(pulumi.CustomResource):
747
748
  :param str resource_name: The unique name of the resulting resource.
748
749
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
749
750
  :param pulumi.ResourceOptions opts: Options for the resource.
750
- :param pulumi.Input[str] address: Specifies the address of the Nomad instance, provided
751
+ :param pulumi.Input[builtins.str] address: Specifies the address of the Nomad instance, provided
751
752
  as "protocol://host:port" like "http://127.0.0.1:4646".
752
- :param pulumi.Input[str] backend: The unique path this backend should be mounted at. Must
753
+ :param pulumi.Input[builtins.str] backend: The unique path this backend should be mounted at. Must
753
754
  not begin or end with a `/`. Defaults to `nomad`.
754
- :param pulumi.Input[str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
755
+ :param pulumi.Input[builtins.str] ca_cert: CA certificate to use when verifying the Nomad server certificate, must be
755
756
  x509 PEM encoded.
756
- :param pulumi.Input[str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
757
- :param pulumi.Input[str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
758
- :param pulumi.Input[int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
759
- :param pulumi.Input[str] description: Human-friendly description of the mount for the Active Directory backend.
760
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
757
+ :param pulumi.Input[builtins.str] client_cert: Client certificate to provide to the Nomad server, must be x509 PEM encoded.
758
+ :param pulumi.Input[builtins.str] client_key: Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
759
+ :param pulumi.Input[builtins.int] default_lease_ttl_seconds: Default lease duration for secrets in seconds.
760
+ :param pulumi.Input[builtins.str] description: Human-friendly description of the mount for the Active Directory backend.
761
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
761
762
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
762
- :param pulumi.Input[bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
763
+ :param pulumi.Input[builtins.bool] local: Mark the secrets engine as local-only. Local engines are not replicated or removed by
763
764
  replication.Tolerance duration to use when checking the last rotation time.
764
- :param pulumi.Input[int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
765
- :param pulumi.Input[int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
765
+ :param pulumi.Input[builtins.int] max_lease_ttl_seconds: Maximum possible lease duration for secrets in seconds.
766
+ :param pulumi.Input[builtins.int] max_token_name_length: Specifies the maximum length to use for the name of the Nomad token
766
767
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
767
768
  by the Nomad version.
768
- :param pulumi.Input[int] max_ttl: Maximum possible lease duration for secrets in seconds.
769
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
769
+ :param pulumi.Input[builtins.int] max_ttl: Maximum possible lease duration for secrets in seconds.
770
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
770
771
  The value should not contain leading or trailing forward slashes.
771
772
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
772
773
  *Available only for Vault Enterprise*.
773
- :param pulumi.Input[str] token: Specifies the Nomad Management token to use.
774
- :param pulumi.Input[int] ttl: Specifies the ttl of the lease for the generated token.
774
+ :param pulumi.Input[builtins.str] token: Specifies the Nomad Management token to use.
775
+ :param pulumi.Input[builtins.int] ttl: Specifies the ttl of the lease for the generated token.
775
776
  """
776
777
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
777
778
 
@@ -796,7 +797,7 @@ class NomadSecretBackend(pulumi.CustomResource):
796
797
 
797
798
  @property
798
799
  @pulumi.getter
799
- def address(self) -> pulumi.Output[Optional[str]]:
800
+ def address(self) -> pulumi.Output[Optional[builtins.str]]:
800
801
  """
801
802
  Specifies the address of the Nomad instance, provided
802
803
  as "protocol://host:port" like "http://127.0.0.1:4646".
@@ -805,7 +806,7 @@ class NomadSecretBackend(pulumi.CustomResource):
805
806
 
806
807
  @property
807
808
  @pulumi.getter
808
- def backend(self) -> pulumi.Output[Optional[str]]:
809
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
809
810
  """
810
811
  The unique path this backend should be mounted at. Must
811
812
  not begin or end with a `/`. Defaults to `nomad`.
@@ -814,7 +815,7 @@ class NomadSecretBackend(pulumi.CustomResource):
814
815
 
815
816
  @property
816
817
  @pulumi.getter(name="caCert")
817
- def ca_cert(self) -> pulumi.Output[Optional[str]]:
818
+ def ca_cert(self) -> pulumi.Output[Optional[builtins.str]]:
818
819
  """
819
820
  CA certificate to use when verifying the Nomad server certificate, must be
820
821
  x509 PEM encoded.
@@ -823,7 +824,7 @@ class NomadSecretBackend(pulumi.CustomResource):
823
824
 
824
825
  @property
825
826
  @pulumi.getter(name="clientCert")
826
- def client_cert(self) -> pulumi.Output[Optional[str]]:
827
+ def client_cert(self) -> pulumi.Output[Optional[builtins.str]]:
827
828
  """
828
829
  Client certificate to provide to the Nomad server, must be x509 PEM encoded.
829
830
  """
@@ -831,7 +832,7 @@ class NomadSecretBackend(pulumi.CustomResource):
831
832
 
832
833
  @property
833
834
  @pulumi.getter(name="clientKey")
834
- def client_key(self) -> pulumi.Output[Optional[str]]:
835
+ def client_key(self) -> pulumi.Output[Optional[builtins.str]]:
835
836
  """
836
837
  Client certificate key to provide to the Nomad server, must be x509 PEM encoded.
837
838
  """
@@ -839,7 +840,7 @@ class NomadSecretBackend(pulumi.CustomResource):
839
840
 
840
841
  @property
841
842
  @pulumi.getter(name="defaultLeaseTtlSeconds")
842
- def default_lease_ttl_seconds(self) -> pulumi.Output[int]:
843
+ def default_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
843
844
  """
844
845
  Default lease duration for secrets in seconds.
845
846
  """
@@ -847,7 +848,7 @@ class NomadSecretBackend(pulumi.CustomResource):
847
848
 
848
849
  @property
849
850
  @pulumi.getter
850
- def description(self) -> pulumi.Output[Optional[str]]:
851
+ def description(self) -> pulumi.Output[Optional[builtins.str]]:
851
852
  """
852
853
  Human-friendly description of the mount for the Active Directory backend.
853
854
  """
@@ -855,7 +856,7 @@ class NomadSecretBackend(pulumi.CustomResource):
855
856
 
856
857
  @property
857
858
  @pulumi.getter(name="disableRemount")
858
- def disable_remount(self) -> pulumi.Output[Optional[bool]]:
859
+ def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
859
860
  """
860
861
  If set, opts out of mount migration on path updates.
861
862
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -864,7 +865,7 @@ class NomadSecretBackend(pulumi.CustomResource):
864
865
 
865
866
  @property
866
867
  @pulumi.getter
867
- def local(self) -> pulumi.Output[Optional[bool]]:
868
+ def local(self) -> pulumi.Output[Optional[builtins.bool]]:
868
869
  """
869
870
  Mark the secrets engine as local-only. Local engines are not replicated or removed by
870
871
  replication.Tolerance duration to use when checking the last rotation time.
@@ -873,7 +874,7 @@ class NomadSecretBackend(pulumi.CustomResource):
873
874
 
874
875
  @property
875
876
  @pulumi.getter(name="maxLeaseTtlSeconds")
876
- def max_lease_ttl_seconds(self) -> pulumi.Output[int]:
877
+ def max_lease_ttl_seconds(self) -> pulumi.Output[builtins.int]:
877
878
  """
878
879
  Maximum possible lease duration for secrets in seconds.
879
880
  """
@@ -881,7 +882,7 @@ class NomadSecretBackend(pulumi.CustomResource):
881
882
 
882
883
  @property
883
884
  @pulumi.getter(name="maxTokenNameLength")
884
- def max_token_name_length(self) -> pulumi.Output[int]:
885
+ def max_token_name_length(self) -> pulumi.Output[builtins.int]:
885
886
  """
886
887
  Specifies the maximum length to use for the name of the Nomad token
887
888
  generated with Generate Credential. If omitted, 0 is used and ignored, defaulting to the max value allowed
@@ -891,7 +892,7 @@ class NomadSecretBackend(pulumi.CustomResource):
891
892
 
892
893
  @property
893
894
  @pulumi.getter(name="maxTtl")
894
- def max_ttl(self) -> pulumi.Output[int]:
895
+ def max_ttl(self) -> pulumi.Output[builtins.int]:
895
896
  """
896
897
  Maximum possible lease duration for secrets in seconds.
897
898
  """
@@ -899,7 +900,7 @@ class NomadSecretBackend(pulumi.CustomResource):
899
900
 
900
901
  @property
901
902
  @pulumi.getter
902
- def namespace(self) -> pulumi.Output[Optional[str]]:
903
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
903
904
  """
904
905
  The namespace to provision the resource in.
905
906
  The value should not contain leading or trailing forward slashes.
@@ -910,7 +911,7 @@ class NomadSecretBackend(pulumi.CustomResource):
910
911
 
911
912
  @property
912
913
  @pulumi.getter
913
- def token(self) -> pulumi.Output[Optional[str]]:
914
+ def token(self) -> pulumi.Output[Optional[builtins.str]]:
914
915
  """
915
916
  Specifies the Nomad Management token to use.
916
917
  """
@@ -918,7 +919,7 @@ class NomadSecretBackend(pulumi.CustomResource):
918
919
 
919
920
  @property
920
921
  @pulumi.getter
921
- def ttl(self) -> pulumi.Output[int]:
922
+ def ttl(self) -> pulumi.Output[builtins.int]:
922
923
  """
923
924
  Specifies the ttl of the lease for the generated token.
924
925
  """