pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,31 +20,31 @@ __all__ = ['BackendConfigAcmeArgs', 'BackendConfigAcme']
19
20
  @pulumi.input_type
20
21
  class BackendConfigAcmeArgs:
21
22
  def __init__(__self__, *,
22
- backend: pulumi.Input[str],
23
- enabled: pulumi.Input[bool],
24
- allow_role_ext_key_usage: Optional[pulumi.Input[bool]] = None,
25
- allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
26
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
27
- default_directory_policy: Optional[pulumi.Input[str]] = None,
28
- dns_resolver: Optional[pulumi.Input[str]] = None,
29
- eab_policy: Optional[pulumi.Input[str]] = None,
30
- max_ttl: Optional[pulumi.Input[int]] = None,
31
- namespace: Optional[pulumi.Input[str]] = None):
23
+ backend: pulumi.Input[builtins.str],
24
+ enabled: pulumi.Input[builtins.bool],
25
+ allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
26
+ allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
+ default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
29
+ dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
30
+ eab_policy: Optional[pulumi.Input[builtins.str]] = None,
31
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
32
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
32
33
  """
33
34
  The set of arguments for constructing a BackendConfigAcme resource.
34
- :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
35
- :param pulumi.Input[bool] enabled: Specifies whether ACME is enabled.
36
- :param pulumi.Input[bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
37
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
38
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
39
- :param pulumi.Input[str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
35
+ :param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
36
+ :param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
37
+ :param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
38
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
39
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
40
+ :param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
40
41
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
41
- :param pulumi.Input[str] dns_resolver: DNS resolver to use for domain resolution on this mount.
42
+ :param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
42
43
  Must be in the format `<host>:<port>`, with both parts mandatory.
43
- :param pulumi.Input[str] eab_policy: Specifies the policy to use for external account binding behaviour.
44
+ :param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
44
45
  Allowed values are `not-required`, `new-account-required` or `always-required`.
45
- :param pulumi.Input[int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
46
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
46
+ :param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
47
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
47
48
  The value should not contain leading or trailing forward slashes.
48
49
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
49
50
  *Available only for Vault Enterprise*.
@@ -69,67 +70,67 @@ class BackendConfigAcmeArgs:
69
70
 
70
71
  @property
71
72
  @pulumi.getter
72
- def backend(self) -> pulumi.Input[str]:
73
+ def backend(self) -> pulumi.Input[builtins.str]:
73
74
  """
74
75
  The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
75
76
  """
76
77
  return pulumi.get(self, "backend")
77
78
 
78
79
  @backend.setter
79
- def backend(self, value: pulumi.Input[str]):
80
+ def backend(self, value: pulumi.Input[builtins.str]):
80
81
  pulumi.set(self, "backend", value)
81
82
 
82
83
  @property
83
84
  @pulumi.getter
84
- def enabled(self) -> pulumi.Input[bool]:
85
+ def enabled(self) -> pulumi.Input[builtins.bool]:
85
86
  """
86
87
  Specifies whether ACME is enabled.
87
88
  """
88
89
  return pulumi.get(self, "enabled")
89
90
 
90
91
  @enabled.setter
91
- def enabled(self, value: pulumi.Input[bool]):
92
+ def enabled(self, value: pulumi.Input[builtins.bool]):
92
93
  pulumi.set(self, "enabled", value)
93
94
 
94
95
  @property
95
96
  @pulumi.getter(name="allowRoleExtKeyUsage")
96
- def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[bool]]:
97
+ def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[builtins.bool]]:
97
98
  """
98
99
  Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
99
100
  """
100
101
  return pulumi.get(self, "allow_role_ext_key_usage")
101
102
 
102
103
  @allow_role_ext_key_usage.setter
103
- def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[bool]]):
104
+ def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[builtins.bool]]):
104
105
  pulumi.set(self, "allow_role_ext_key_usage", value)
105
106
 
106
107
  @property
107
108
  @pulumi.getter(name="allowedIssuers")
108
- def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
109
+ def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
109
110
  """
110
111
  Specifies which issuers are allowed for use with ACME.
111
112
  """
112
113
  return pulumi.get(self, "allowed_issuers")
113
114
 
114
115
  @allowed_issuers.setter
115
- def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
116
+ def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
116
117
  pulumi.set(self, "allowed_issuers", value)
117
118
 
118
119
  @property
119
120
  @pulumi.getter(name="allowedRoles")
120
- def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
121
+ def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
121
122
  """
122
123
  Specifies which roles are allowed for use with ACME.
123
124
  """
124
125
  return pulumi.get(self, "allowed_roles")
125
126
 
126
127
  @allowed_roles.setter
127
- def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
128
+ def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
128
129
  pulumi.set(self, "allowed_roles", value)
129
130
 
130
131
  @property
131
132
  @pulumi.getter(name="defaultDirectoryPolicy")
132
- def default_directory_policy(self) -> Optional[pulumi.Input[str]]:
133
+ def default_directory_policy(self) -> Optional[pulumi.Input[builtins.str]]:
133
134
  """
134
135
  Specifies the policy to be used for non-role-qualified ACME requests.
135
136
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
@@ -137,12 +138,12 @@ class BackendConfigAcmeArgs:
137
138
  return pulumi.get(self, "default_directory_policy")
138
139
 
139
140
  @default_directory_policy.setter
140
- def default_directory_policy(self, value: Optional[pulumi.Input[str]]):
141
+ def default_directory_policy(self, value: Optional[pulumi.Input[builtins.str]]):
141
142
  pulumi.set(self, "default_directory_policy", value)
142
143
 
143
144
  @property
144
145
  @pulumi.getter(name="dnsResolver")
145
- def dns_resolver(self) -> Optional[pulumi.Input[str]]:
146
+ def dns_resolver(self) -> Optional[pulumi.Input[builtins.str]]:
146
147
  """
147
148
  DNS resolver to use for domain resolution on this mount.
148
149
  Must be in the format `<host>:<port>`, with both parts mandatory.
@@ -150,12 +151,12 @@ class BackendConfigAcmeArgs:
150
151
  return pulumi.get(self, "dns_resolver")
151
152
 
152
153
  @dns_resolver.setter
153
- def dns_resolver(self, value: Optional[pulumi.Input[str]]):
154
+ def dns_resolver(self, value: Optional[pulumi.Input[builtins.str]]):
154
155
  pulumi.set(self, "dns_resolver", value)
155
156
 
156
157
  @property
157
158
  @pulumi.getter(name="eabPolicy")
158
- def eab_policy(self) -> Optional[pulumi.Input[str]]:
159
+ def eab_policy(self) -> Optional[pulumi.Input[builtins.str]]:
159
160
  """
160
161
  Specifies the policy to use for external account binding behaviour.
161
162
  Allowed values are `not-required`, `new-account-required` or `always-required`.
@@ -163,24 +164,24 @@ class BackendConfigAcmeArgs:
163
164
  return pulumi.get(self, "eab_policy")
164
165
 
165
166
  @eab_policy.setter
166
- def eab_policy(self, value: Optional[pulumi.Input[str]]):
167
+ def eab_policy(self, value: Optional[pulumi.Input[builtins.str]]):
167
168
  pulumi.set(self, "eab_policy", value)
168
169
 
169
170
  @property
170
171
  @pulumi.getter(name="maxTtl")
171
- def max_ttl(self) -> Optional[pulumi.Input[int]]:
172
+ def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
172
173
  """
173
174
  The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
174
175
  """
175
176
  return pulumi.get(self, "max_ttl")
176
177
 
177
178
  @max_ttl.setter
178
- def max_ttl(self, value: Optional[pulumi.Input[int]]):
179
+ def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
179
180
  pulumi.set(self, "max_ttl", value)
180
181
 
181
182
  @property
182
183
  @pulumi.getter
183
- def namespace(self) -> Optional[pulumi.Input[str]]:
184
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
184
185
  """
185
186
  The namespace to provision the resource in.
186
187
  The value should not contain leading or trailing forward slashes.
@@ -190,38 +191,38 @@ class BackendConfigAcmeArgs:
190
191
  return pulumi.get(self, "namespace")
191
192
 
192
193
  @namespace.setter
193
- def namespace(self, value: Optional[pulumi.Input[str]]):
194
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
194
195
  pulumi.set(self, "namespace", value)
195
196
 
196
197
 
197
198
  @pulumi.input_type
198
199
  class _BackendConfigAcmeState:
199
200
  def __init__(__self__, *,
200
- allow_role_ext_key_usage: Optional[pulumi.Input[bool]] = None,
201
- allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
202
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
203
- backend: Optional[pulumi.Input[str]] = None,
204
- default_directory_policy: Optional[pulumi.Input[str]] = None,
205
- dns_resolver: Optional[pulumi.Input[str]] = None,
206
- eab_policy: Optional[pulumi.Input[str]] = None,
207
- enabled: Optional[pulumi.Input[bool]] = None,
208
- max_ttl: Optional[pulumi.Input[int]] = None,
209
- namespace: Optional[pulumi.Input[str]] = None):
201
+ allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
202
+ allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
203
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
204
+ backend: Optional[pulumi.Input[builtins.str]] = None,
205
+ default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
206
+ dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
207
+ eab_policy: Optional[pulumi.Input[builtins.str]] = None,
208
+ enabled: Optional[pulumi.Input[builtins.bool]] = None,
209
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
210
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
210
211
  """
211
212
  Input properties used for looking up and filtering BackendConfigAcme resources.
212
- :param pulumi.Input[bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
213
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
214
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
215
- :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
216
- :param pulumi.Input[str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
213
+ :param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
214
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
215
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
216
+ :param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
217
+ :param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
217
218
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
218
- :param pulumi.Input[str] dns_resolver: DNS resolver to use for domain resolution on this mount.
219
+ :param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
219
220
  Must be in the format `<host>:<port>`, with both parts mandatory.
220
- :param pulumi.Input[str] eab_policy: Specifies the policy to use for external account binding behaviour.
221
+ :param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
221
222
  Allowed values are `not-required`, `new-account-required` or `always-required`.
222
- :param pulumi.Input[bool] enabled: Specifies whether ACME is enabled.
223
- :param pulumi.Input[int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
224
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
223
+ :param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
224
+ :param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
225
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
225
226
  The value should not contain leading or trailing forward slashes.
226
227
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
227
228
  *Available only for Vault Enterprise*.
@@ -249,55 +250,55 @@ class _BackendConfigAcmeState:
249
250
 
250
251
  @property
251
252
  @pulumi.getter(name="allowRoleExtKeyUsage")
252
- def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[bool]]:
253
+ def allow_role_ext_key_usage(self) -> Optional[pulumi.Input[builtins.bool]]:
253
254
  """
254
255
  Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
255
256
  """
256
257
  return pulumi.get(self, "allow_role_ext_key_usage")
257
258
 
258
259
  @allow_role_ext_key_usage.setter
259
- def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[bool]]):
260
+ def allow_role_ext_key_usage(self, value: Optional[pulumi.Input[builtins.bool]]):
260
261
  pulumi.set(self, "allow_role_ext_key_usage", value)
261
262
 
262
263
  @property
263
264
  @pulumi.getter(name="allowedIssuers")
264
- def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
265
+ def allowed_issuers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
265
266
  """
266
267
  Specifies which issuers are allowed for use with ACME.
267
268
  """
268
269
  return pulumi.get(self, "allowed_issuers")
269
270
 
270
271
  @allowed_issuers.setter
271
- def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
272
+ def allowed_issuers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
272
273
  pulumi.set(self, "allowed_issuers", value)
273
274
 
274
275
  @property
275
276
  @pulumi.getter(name="allowedRoles")
276
- def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
277
+ def allowed_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
277
278
  """
278
279
  Specifies which roles are allowed for use with ACME.
279
280
  """
280
281
  return pulumi.get(self, "allowed_roles")
281
282
 
282
283
  @allowed_roles.setter
283
- def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
284
+ def allowed_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
284
285
  pulumi.set(self, "allowed_roles", value)
285
286
 
286
287
  @property
287
288
  @pulumi.getter
288
- def backend(self) -> Optional[pulumi.Input[str]]:
289
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
289
290
  """
290
291
  The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
291
292
  """
292
293
  return pulumi.get(self, "backend")
293
294
 
294
295
  @backend.setter
295
- def backend(self, value: Optional[pulumi.Input[str]]):
296
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
296
297
  pulumi.set(self, "backend", value)
297
298
 
298
299
  @property
299
300
  @pulumi.getter(name="defaultDirectoryPolicy")
300
- def default_directory_policy(self) -> Optional[pulumi.Input[str]]:
301
+ def default_directory_policy(self) -> Optional[pulumi.Input[builtins.str]]:
301
302
  """
302
303
  Specifies the policy to be used for non-role-qualified ACME requests.
303
304
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
@@ -305,12 +306,12 @@ class _BackendConfigAcmeState:
305
306
  return pulumi.get(self, "default_directory_policy")
306
307
 
307
308
  @default_directory_policy.setter
308
- def default_directory_policy(self, value: Optional[pulumi.Input[str]]):
309
+ def default_directory_policy(self, value: Optional[pulumi.Input[builtins.str]]):
309
310
  pulumi.set(self, "default_directory_policy", value)
310
311
 
311
312
  @property
312
313
  @pulumi.getter(name="dnsResolver")
313
- def dns_resolver(self) -> Optional[pulumi.Input[str]]:
314
+ def dns_resolver(self) -> Optional[pulumi.Input[builtins.str]]:
314
315
  """
315
316
  DNS resolver to use for domain resolution on this mount.
316
317
  Must be in the format `<host>:<port>`, with both parts mandatory.
@@ -318,12 +319,12 @@ class _BackendConfigAcmeState:
318
319
  return pulumi.get(self, "dns_resolver")
319
320
 
320
321
  @dns_resolver.setter
321
- def dns_resolver(self, value: Optional[pulumi.Input[str]]):
322
+ def dns_resolver(self, value: Optional[pulumi.Input[builtins.str]]):
322
323
  pulumi.set(self, "dns_resolver", value)
323
324
 
324
325
  @property
325
326
  @pulumi.getter(name="eabPolicy")
326
- def eab_policy(self) -> Optional[pulumi.Input[str]]:
327
+ def eab_policy(self) -> Optional[pulumi.Input[builtins.str]]:
327
328
  """
328
329
  Specifies the policy to use for external account binding behaviour.
329
330
  Allowed values are `not-required`, `new-account-required` or `always-required`.
@@ -331,36 +332,36 @@ class _BackendConfigAcmeState:
331
332
  return pulumi.get(self, "eab_policy")
332
333
 
333
334
  @eab_policy.setter
334
- def eab_policy(self, value: Optional[pulumi.Input[str]]):
335
+ def eab_policy(self, value: Optional[pulumi.Input[builtins.str]]):
335
336
  pulumi.set(self, "eab_policy", value)
336
337
 
337
338
  @property
338
339
  @pulumi.getter
339
- def enabled(self) -> Optional[pulumi.Input[bool]]:
340
+ def enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
340
341
  """
341
342
  Specifies whether ACME is enabled.
342
343
  """
343
344
  return pulumi.get(self, "enabled")
344
345
 
345
346
  @enabled.setter
346
- def enabled(self, value: Optional[pulumi.Input[bool]]):
347
+ def enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
347
348
  pulumi.set(self, "enabled", value)
348
349
 
349
350
  @property
350
351
  @pulumi.getter(name="maxTtl")
351
- def max_ttl(self) -> Optional[pulumi.Input[int]]:
352
+ def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
352
353
  """
353
354
  The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
354
355
  """
355
356
  return pulumi.get(self, "max_ttl")
356
357
 
357
358
  @max_ttl.setter
358
- def max_ttl(self, value: Optional[pulumi.Input[int]]):
359
+ def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
359
360
  pulumi.set(self, "max_ttl", value)
360
361
 
361
362
  @property
362
363
  @pulumi.getter
363
- def namespace(self) -> Optional[pulumi.Input[str]]:
364
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
364
365
  """
365
366
  The namespace to provision the resource in.
366
367
  The value should not contain leading or trailing forward slashes.
@@ -370,7 +371,7 @@ class _BackendConfigAcmeState:
370
371
  return pulumi.get(self, "namespace")
371
372
 
372
373
  @namespace.setter
373
- def namespace(self, value: Optional[pulumi.Input[str]]):
374
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
374
375
  pulumi.set(self, "namespace", value)
375
376
 
376
377
 
@@ -379,16 +380,16 @@ class BackendConfigAcme(pulumi.CustomResource):
379
380
  def __init__(__self__,
380
381
  resource_name: str,
381
382
  opts: Optional[pulumi.ResourceOptions] = None,
382
- allow_role_ext_key_usage: Optional[pulumi.Input[bool]] = None,
383
- allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
384
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
385
- backend: Optional[pulumi.Input[str]] = None,
386
- default_directory_policy: Optional[pulumi.Input[str]] = None,
387
- dns_resolver: Optional[pulumi.Input[str]] = None,
388
- eab_policy: Optional[pulumi.Input[str]] = None,
389
- enabled: Optional[pulumi.Input[bool]] = None,
390
- max_ttl: Optional[pulumi.Input[int]] = None,
391
- namespace: Optional[pulumi.Input[str]] = None,
383
+ allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
384
+ allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
385
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
386
+ backend: Optional[pulumi.Input[builtins.str]] = None,
387
+ default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
388
+ dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
389
+ eab_policy: Optional[pulumi.Input[builtins.str]] = None,
390
+ enabled: Optional[pulumi.Input[builtins.bool]] = None,
391
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
392
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
392
393
  __props__=None):
393
394
  """
394
395
  Allows setting the ACME server configuration used by specified mount.
@@ -431,19 +432,19 @@ class BackendConfigAcme(pulumi.CustomResource):
431
432
 
432
433
  :param str resource_name: The name of the resource.
433
434
  :param pulumi.ResourceOptions opts: Options for the resource.
434
- :param pulumi.Input[bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
435
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
436
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
437
- :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
438
- :param pulumi.Input[str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
435
+ :param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
436
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
437
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
438
+ :param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
439
+ :param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
439
440
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
440
- :param pulumi.Input[str] dns_resolver: DNS resolver to use for domain resolution on this mount.
441
+ :param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
441
442
  Must be in the format `<host>:<port>`, with both parts mandatory.
442
- :param pulumi.Input[str] eab_policy: Specifies the policy to use for external account binding behaviour.
443
+ :param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
443
444
  Allowed values are `not-required`, `new-account-required` or `always-required`.
444
- :param pulumi.Input[bool] enabled: Specifies whether ACME is enabled.
445
- :param pulumi.Input[int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
446
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
445
+ :param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
446
+ :param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
447
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
447
448
  The value should not contain leading or trailing forward slashes.
448
449
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
449
450
  *Available only for Vault Enterprise*.
@@ -508,16 +509,16 @@ class BackendConfigAcme(pulumi.CustomResource):
508
509
  def _internal_init(__self__,
509
510
  resource_name: str,
510
511
  opts: Optional[pulumi.ResourceOptions] = None,
511
- allow_role_ext_key_usage: Optional[pulumi.Input[bool]] = None,
512
- allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
513
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
514
- backend: Optional[pulumi.Input[str]] = None,
515
- default_directory_policy: Optional[pulumi.Input[str]] = None,
516
- dns_resolver: Optional[pulumi.Input[str]] = None,
517
- eab_policy: Optional[pulumi.Input[str]] = None,
518
- enabled: Optional[pulumi.Input[bool]] = None,
519
- max_ttl: Optional[pulumi.Input[int]] = None,
520
- namespace: Optional[pulumi.Input[str]] = None,
512
+ allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
513
+ allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
514
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
515
+ backend: Optional[pulumi.Input[builtins.str]] = None,
516
+ default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
517
+ dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
518
+ eab_policy: Optional[pulumi.Input[builtins.str]] = None,
519
+ enabled: Optional[pulumi.Input[builtins.bool]] = None,
520
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
521
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
521
522
  __props__=None):
522
523
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
523
524
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -551,16 +552,16 @@ class BackendConfigAcme(pulumi.CustomResource):
551
552
  def get(resource_name: str,
552
553
  id: pulumi.Input[str],
553
554
  opts: Optional[pulumi.ResourceOptions] = None,
554
- allow_role_ext_key_usage: Optional[pulumi.Input[bool]] = None,
555
- allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
556
- allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
557
- backend: Optional[pulumi.Input[str]] = None,
558
- default_directory_policy: Optional[pulumi.Input[str]] = None,
559
- dns_resolver: Optional[pulumi.Input[str]] = None,
560
- eab_policy: Optional[pulumi.Input[str]] = None,
561
- enabled: Optional[pulumi.Input[bool]] = None,
562
- max_ttl: Optional[pulumi.Input[int]] = None,
563
- namespace: Optional[pulumi.Input[str]] = None) -> 'BackendConfigAcme':
555
+ allow_role_ext_key_usage: Optional[pulumi.Input[builtins.bool]] = None,
556
+ allowed_issuers: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
557
+ allowed_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
558
+ backend: Optional[pulumi.Input[builtins.str]] = None,
559
+ default_directory_policy: Optional[pulumi.Input[builtins.str]] = None,
560
+ dns_resolver: Optional[pulumi.Input[builtins.str]] = None,
561
+ eab_policy: Optional[pulumi.Input[builtins.str]] = None,
562
+ enabled: Optional[pulumi.Input[builtins.bool]] = None,
563
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
564
+ namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'BackendConfigAcme':
564
565
  """
565
566
  Get an existing BackendConfigAcme resource's state with the given name, id, and optional extra
566
567
  properties used to qualify the lookup.
@@ -568,19 +569,19 @@ class BackendConfigAcme(pulumi.CustomResource):
568
569
  :param str resource_name: The unique name of the resulting resource.
569
570
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
570
571
  :param pulumi.ResourceOptions opts: Options for the resource.
571
- :param pulumi.Input[bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
572
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
573
- :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
574
- :param pulumi.Input[str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
575
- :param pulumi.Input[str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
572
+ :param pulumi.Input[builtins.bool] allow_role_ext_key_usage: Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
573
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_issuers: Specifies which issuers are allowed for use with ACME.
574
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_roles: Specifies which roles are allowed for use with ACME.
575
+ :param pulumi.Input[builtins.str] backend: The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
576
+ :param pulumi.Input[builtins.str] default_directory_policy: Specifies the policy to be used for non-role-qualified ACME requests.
576
577
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
577
- :param pulumi.Input[str] dns_resolver: DNS resolver to use for domain resolution on this mount.
578
+ :param pulumi.Input[builtins.str] dns_resolver: DNS resolver to use for domain resolution on this mount.
578
579
  Must be in the format `<host>:<port>`, with both parts mandatory.
579
- :param pulumi.Input[str] eab_policy: Specifies the policy to use for external account binding behaviour.
580
+ :param pulumi.Input[builtins.str] eab_policy: Specifies the policy to use for external account binding behaviour.
580
581
  Allowed values are `not-required`, `new-account-required` or `always-required`.
581
- :param pulumi.Input[bool] enabled: Specifies whether ACME is enabled.
582
- :param pulumi.Input[int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
583
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
582
+ :param pulumi.Input[builtins.bool] enabled: Specifies whether ACME is enabled.
583
+ :param pulumi.Input[builtins.int] max_ttl: The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
584
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
584
585
  The value should not contain leading or trailing forward slashes.
585
586
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault#namespace).
586
587
  *Available only for Vault Enterprise*.
@@ -603,7 +604,7 @@ class BackendConfigAcme(pulumi.CustomResource):
603
604
 
604
605
  @property
605
606
  @pulumi.getter(name="allowRoleExtKeyUsage")
606
- def allow_role_ext_key_usage(self) -> pulumi.Output[Optional[bool]]:
607
+ def allow_role_ext_key_usage(self) -> pulumi.Output[Optional[builtins.bool]]:
607
608
  """
608
609
  Specifies whether the ExtKeyUsage field from a role is used. **Vault 1.14.1+**
609
610
  """
@@ -611,7 +612,7 @@ class BackendConfigAcme(pulumi.CustomResource):
611
612
 
612
613
  @property
613
614
  @pulumi.getter(name="allowedIssuers")
614
- def allowed_issuers(self) -> pulumi.Output[Sequence[str]]:
615
+ def allowed_issuers(self) -> pulumi.Output[Sequence[builtins.str]]:
615
616
  """
616
617
  Specifies which issuers are allowed for use with ACME.
617
618
  """
@@ -619,7 +620,7 @@ class BackendConfigAcme(pulumi.CustomResource):
619
620
 
620
621
  @property
621
622
  @pulumi.getter(name="allowedRoles")
622
- def allowed_roles(self) -> pulumi.Output[Sequence[str]]:
623
+ def allowed_roles(self) -> pulumi.Output[Sequence[builtins.str]]:
623
624
  """
624
625
  Specifies which roles are allowed for use with ACME.
625
626
  """
@@ -627,7 +628,7 @@ class BackendConfigAcme(pulumi.CustomResource):
627
628
 
628
629
  @property
629
630
  @pulumi.getter
630
- def backend(self) -> pulumi.Output[str]:
631
+ def backend(self) -> pulumi.Output[builtins.str]:
631
632
  """
632
633
  The path the PKI secret backend is mounted at, with no leading or trailing `/`s.
633
634
  """
@@ -635,7 +636,7 @@ class BackendConfigAcme(pulumi.CustomResource):
635
636
 
636
637
  @property
637
638
  @pulumi.getter(name="defaultDirectoryPolicy")
638
- def default_directory_policy(self) -> pulumi.Output[str]:
639
+ def default_directory_policy(self) -> pulumi.Output[builtins.str]:
639
640
  """
640
641
  Specifies the policy to be used for non-role-qualified ACME requests.
641
642
  Allowed values are `forbid`, `sign-verbatim`, `role:<role_name>`, `external-policy` or `external-policy:<policy>`.
@@ -644,7 +645,7 @@ class BackendConfigAcme(pulumi.CustomResource):
644
645
 
645
646
  @property
646
647
  @pulumi.getter(name="dnsResolver")
647
- def dns_resolver(self) -> pulumi.Output[Optional[str]]:
648
+ def dns_resolver(self) -> pulumi.Output[Optional[builtins.str]]:
648
649
  """
649
650
  DNS resolver to use for domain resolution on this mount.
650
651
  Must be in the format `<host>:<port>`, with both parts mandatory.
@@ -653,7 +654,7 @@ class BackendConfigAcme(pulumi.CustomResource):
653
654
 
654
655
  @property
655
656
  @pulumi.getter(name="eabPolicy")
656
- def eab_policy(self) -> pulumi.Output[str]:
657
+ def eab_policy(self) -> pulumi.Output[builtins.str]:
657
658
  """
658
659
  Specifies the policy to use for external account binding behaviour.
659
660
  Allowed values are `not-required`, `new-account-required` or `always-required`.
@@ -662,7 +663,7 @@ class BackendConfigAcme(pulumi.CustomResource):
662
663
 
663
664
  @property
664
665
  @pulumi.getter
665
- def enabled(self) -> pulumi.Output[bool]:
666
+ def enabled(self) -> pulumi.Output[builtins.bool]:
666
667
  """
667
668
  Specifies whether ACME is enabled.
668
669
  """
@@ -670,7 +671,7 @@ class BackendConfigAcme(pulumi.CustomResource):
670
671
 
671
672
  @property
672
673
  @pulumi.getter(name="maxTtl")
673
- def max_ttl(self) -> pulumi.Output[int]:
674
+ def max_ttl(self) -> pulumi.Output[builtins.int]:
674
675
  """
675
676
  The maximum TTL in seconds for certificates issued by ACME. **Vault 1.17.0+**
676
677
  """
@@ -678,7 +679,7 @@ class BackendConfigAcme(pulumi.CustomResource):
678
679
 
679
680
  @property
680
681
  @pulumi.getter
681
- def namespace(self) -> pulumi.Output[Optional[str]]:
682
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
682
683
  """
683
684
  The namespace to provision the resource in.
684
685
  The value should not contain leading or trailing forward slashes.