pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,39 +20,39 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
19
20
  @pulumi.input_type
20
21
  class AuthBackendArgs:
21
22
  def __init__(__self__, *,
22
- acs_urls: pulumi.Input[Sequence[pulumi.Input[str]]],
23
- entity_id: pulumi.Input[str],
24
- default_role: Optional[pulumi.Input[str]] = None,
25
- disable_remount: Optional[pulumi.Input[bool]] = None,
26
- idp_cert: Optional[pulumi.Input[str]] = None,
27
- idp_entity_id: Optional[pulumi.Input[str]] = None,
28
- idp_metadata_url: Optional[pulumi.Input[str]] = None,
29
- idp_sso_url: Optional[pulumi.Input[str]] = None,
30
- namespace: Optional[pulumi.Input[str]] = None,
31
- path: Optional[pulumi.Input[str]] = None,
32
- verbose_logging: Optional[pulumi.Input[bool]] = None):
23
+ acs_urls: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
24
+ entity_id: pulumi.Input[builtins.str],
25
+ default_role: Optional[pulumi.Input[builtins.str]] = None,
26
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
27
+ idp_cert: Optional[pulumi.Input[builtins.str]] = None,
28
+ idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
29
+ idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
30
+ idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
31
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
32
+ path: Optional[pulumi.Input[builtins.str]] = None,
33
+ verbose_logging: Optional[pulumi.Input[builtins.bool]] = None):
33
34
  """
34
35
  The set of arguments for constructing a AuthBackend resource.
35
- :param pulumi.Input[Sequence[pulumi.Input[str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
36
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
36
37
  that should receive a response from the identity provider.
37
- :param pulumi.Input[str] entity_id: The entity ID of the SAML authentication service provider.
38
- :param pulumi.Input[str] default_role: The role to use if no role is provided during login.
39
- :param pulumi.Input[bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
38
+ :param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
39
+ :param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
40
+ :param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
40
41
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
41
- :param pulumi.Input[str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
42
+ :param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
42
43
  with `idp_metadata_url`.
43
- :param pulumi.Input[str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
44
+ :param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
44
45
  `idp_metadata_url`.
45
- :param pulumi.Input[str] idp_metadata_url: The metadata URL of the identity provider.
46
- :param pulumi.Input[str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
46
+ :param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
47
+ :param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
47
48
  `idp_metadata_url`.
48
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
49
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
49
50
  The value should not contain leading or trailing forward slashes.
50
51
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
51
52
  *Available only for Vault Enterprise*.
52
- :param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
53
+ :param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
53
54
  if not specified.
54
- :param pulumi.Input[bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
55
+ :param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
55
56
  information during the SAML exchange according to the current logging level. Not
56
57
  recommended for production.
57
58
  """
@@ -78,7 +79,7 @@ class AuthBackendArgs:
78
79
 
79
80
  @property
80
81
  @pulumi.getter(name="acsUrls")
81
- def acs_urls(self) -> pulumi.Input[Sequence[pulumi.Input[str]]]:
82
+ def acs_urls(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
82
83
  """
83
84
  The well-formatted URLs of your Assertion Consumer Service (ACS)
84
85
  that should receive a response from the identity provider.
@@ -86,36 +87,36 @@ class AuthBackendArgs:
86
87
  return pulumi.get(self, "acs_urls")
87
88
 
88
89
  @acs_urls.setter
89
- def acs_urls(self, value: pulumi.Input[Sequence[pulumi.Input[str]]]):
90
+ def acs_urls(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
90
91
  pulumi.set(self, "acs_urls", value)
91
92
 
92
93
  @property
93
94
  @pulumi.getter(name="entityId")
94
- def entity_id(self) -> pulumi.Input[str]:
95
+ def entity_id(self) -> pulumi.Input[builtins.str]:
95
96
  """
96
97
  The entity ID of the SAML authentication service provider.
97
98
  """
98
99
  return pulumi.get(self, "entity_id")
99
100
 
100
101
  @entity_id.setter
101
- def entity_id(self, value: pulumi.Input[str]):
102
+ def entity_id(self, value: pulumi.Input[builtins.str]):
102
103
  pulumi.set(self, "entity_id", value)
103
104
 
104
105
  @property
105
106
  @pulumi.getter(name="defaultRole")
106
- def default_role(self) -> Optional[pulumi.Input[str]]:
107
+ def default_role(self) -> Optional[pulumi.Input[builtins.str]]:
107
108
  """
108
109
  The role to use if no role is provided during login.
109
110
  """
110
111
  return pulumi.get(self, "default_role")
111
112
 
112
113
  @default_role.setter
113
- def default_role(self, value: Optional[pulumi.Input[str]]):
114
+ def default_role(self, value: Optional[pulumi.Input[builtins.str]]):
114
115
  pulumi.set(self, "default_role", value)
115
116
 
116
117
  @property
117
118
  @pulumi.getter(name="disableRemount")
118
- def disable_remount(self) -> Optional[pulumi.Input[bool]]:
119
+ def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
119
120
  """
120
121
  If set to `true`, opts out of mount migration on path updates.
121
122
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -123,12 +124,12 @@ class AuthBackendArgs:
123
124
  return pulumi.get(self, "disable_remount")
124
125
 
125
126
  @disable_remount.setter
126
- def disable_remount(self, value: Optional[pulumi.Input[bool]]):
127
+ def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
127
128
  pulumi.set(self, "disable_remount", value)
128
129
 
129
130
  @property
130
131
  @pulumi.getter(name="idpCert")
131
- def idp_cert(self) -> Optional[pulumi.Input[str]]:
132
+ def idp_cert(self) -> Optional[pulumi.Input[builtins.str]]:
132
133
  """
133
134
  The PEM encoded certificate of the identity provider. Mutually exclusive
134
135
  with `idp_metadata_url`.
@@ -136,12 +137,12 @@ class AuthBackendArgs:
136
137
  return pulumi.get(self, "idp_cert")
137
138
 
138
139
  @idp_cert.setter
139
- def idp_cert(self, value: Optional[pulumi.Input[str]]):
140
+ def idp_cert(self, value: Optional[pulumi.Input[builtins.str]]):
140
141
  pulumi.set(self, "idp_cert", value)
141
142
 
142
143
  @property
143
144
  @pulumi.getter(name="idpEntityId")
144
- def idp_entity_id(self) -> Optional[pulumi.Input[str]]:
145
+ def idp_entity_id(self) -> Optional[pulumi.Input[builtins.str]]:
145
146
  """
146
147
  The entity ID of the identity provider. Mutually exclusive with
147
148
  `idp_metadata_url`.
@@ -149,24 +150,24 @@ class AuthBackendArgs:
149
150
  return pulumi.get(self, "idp_entity_id")
150
151
 
151
152
  @idp_entity_id.setter
152
- def idp_entity_id(self, value: Optional[pulumi.Input[str]]):
153
+ def idp_entity_id(self, value: Optional[pulumi.Input[builtins.str]]):
153
154
  pulumi.set(self, "idp_entity_id", value)
154
155
 
155
156
  @property
156
157
  @pulumi.getter(name="idpMetadataUrl")
157
- def idp_metadata_url(self) -> Optional[pulumi.Input[str]]:
158
+ def idp_metadata_url(self) -> Optional[pulumi.Input[builtins.str]]:
158
159
  """
159
160
  The metadata URL of the identity provider.
160
161
  """
161
162
  return pulumi.get(self, "idp_metadata_url")
162
163
 
163
164
  @idp_metadata_url.setter
164
- def idp_metadata_url(self, value: Optional[pulumi.Input[str]]):
165
+ def idp_metadata_url(self, value: Optional[pulumi.Input[builtins.str]]):
165
166
  pulumi.set(self, "idp_metadata_url", value)
166
167
 
167
168
  @property
168
169
  @pulumi.getter(name="idpSsoUrl")
169
- def idp_sso_url(self) -> Optional[pulumi.Input[str]]:
170
+ def idp_sso_url(self) -> Optional[pulumi.Input[builtins.str]]:
170
171
  """
171
172
  The SSO URL of the identity provider. Mutually exclusive with
172
173
  `idp_metadata_url`.
@@ -174,12 +175,12 @@ class AuthBackendArgs:
174
175
  return pulumi.get(self, "idp_sso_url")
175
176
 
176
177
  @idp_sso_url.setter
177
- def idp_sso_url(self, value: Optional[pulumi.Input[str]]):
178
+ def idp_sso_url(self, value: Optional[pulumi.Input[builtins.str]]):
178
179
  pulumi.set(self, "idp_sso_url", value)
179
180
 
180
181
  @property
181
182
  @pulumi.getter
182
- def namespace(self) -> Optional[pulumi.Input[str]]:
183
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
183
184
  """
184
185
  The namespace to provision the resource in.
185
186
  The value should not contain leading or trailing forward slashes.
@@ -189,12 +190,12 @@ class AuthBackendArgs:
189
190
  return pulumi.get(self, "namespace")
190
191
 
191
192
  @namespace.setter
192
- def namespace(self, value: Optional[pulumi.Input[str]]):
193
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
193
194
  pulumi.set(self, "namespace", value)
194
195
 
195
196
  @property
196
197
  @pulumi.getter
197
- def path(self) -> Optional[pulumi.Input[str]]:
198
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
198
199
  """
199
200
  Path where the auth backend will be mounted. Defaults to `auth/saml`
200
201
  if not specified.
@@ -202,12 +203,12 @@ class AuthBackendArgs:
202
203
  return pulumi.get(self, "path")
203
204
 
204
205
  @path.setter
205
- def path(self, value: Optional[pulumi.Input[str]]):
206
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
206
207
  pulumi.set(self, "path", value)
207
208
 
208
209
  @property
209
210
  @pulumi.getter(name="verboseLogging")
210
- def verbose_logging(self) -> Optional[pulumi.Input[bool]]:
211
+ def verbose_logging(self) -> Optional[pulumi.Input[builtins.bool]]:
211
212
  """
212
213
  If set to `true`, logs additional, potentially sensitive
213
214
  information during the SAML exchange according to the current logging level. Not
@@ -216,46 +217,46 @@ class AuthBackendArgs:
216
217
  return pulumi.get(self, "verbose_logging")
217
218
 
218
219
  @verbose_logging.setter
219
- def verbose_logging(self, value: Optional[pulumi.Input[bool]]):
220
+ def verbose_logging(self, value: Optional[pulumi.Input[builtins.bool]]):
220
221
  pulumi.set(self, "verbose_logging", value)
221
222
 
222
223
 
223
224
  @pulumi.input_type
224
225
  class _AuthBackendState:
225
226
  def __init__(__self__, *,
226
- acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
227
- default_role: Optional[pulumi.Input[str]] = None,
228
- disable_remount: Optional[pulumi.Input[bool]] = None,
229
- entity_id: Optional[pulumi.Input[str]] = None,
230
- idp_cert: Optional[pulumi.Input[str]] = None,
231
- idp_entity_id: Optional[pulumi.Input[str]] = None,
232
- idp_metadata_url: Optional[pulumi.Input[str]] = None,
233
- idp_sso_url: Optional[pulumi.Input[str]] = None,
234
- namespace: Optional[pulumi.Input[str]] = None,
235
- path: Optional[pulumi.Input[str]] = None,
236
- verbose_logging: Optional[pulumi.Input[bool]] = None):
227
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
228
+ default_role: Optional[pulumi.Input[builtins.str]] = None,
229
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
230
+ entity_id: Optional[pulumi.Input[builtins.str]] = None,
231
+ idp_cert: Optional[pulumi.Input[builtins.str]] = None,
232
+ idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
233
+ idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
234
+ idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
235
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
236
+ path: Optional[pulumi.Input[builtins.str]] = None,
237
+ verbose_logging: Optional[pulumi.Input[builtins.bool]] = None):
237
238
  """
238
239
  Input properties used for looking up and filtering AuthBackend resources.
239
- :param pulumi.Input[Sequence[pulumi.Input[str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
240
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
240
241
  that should receive a response from the identity provider.
241
- :param pulumi.Input[str] default_role: The role to use if no role is provided during login.
242
- :param pulumi.Input[bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
242
+ :param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
243
+ :param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
243
244
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
244
- :param pulumi.Input[str] entity_id: The entity ID of the SAML authentication service provider.
245
- :param pulumi.Input[str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
245
+ :param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
246
+ :param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
246
247
  with `idp_metadata_url`.
247
- :param pulumi.Input[str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
248
+ :param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
248
249
  `idp_metadata_url`.
249
- :param pulumi.Input[str] idp_metadata_url: The metadata URL of the identity provider.
250
- :param pulumi.Input[str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
250
+ :param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
251
+ :param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
251
252
  `idp_metadata_url`.
252
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
253
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
253
254
  The value should not contain leading or trailing forward slashes.
254
255
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
255
256
  *Available only for Vault Enterprise*.
256
- :param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
257
+ :param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
257
258
  if not specified.
258
- :param pulumi.Input[bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
259
+ :param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
259
260
  information during the SAML exchange according to the current logging level. Not
260
261
  recommended for production.
261
262
  """
@@ -284,7 +285,7 @@ class _AuthBackendState:
284
285
 
285
286
  @property
286
287
  @pulumi.getter(name="acsUrls")
287
- def acs_urls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
288
+ def acs_urls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
288
289
  """
289
290
  The well-formatted URLs of your Assertion Consumer Service (ACS)
290
291
  that should receive a response from the identity provider.
@@ -292,24 +293,24 @@ class _AuthBackendState:
292
293
  return pulumi.get(self, "acs_urls")
293
294
 
294
295
  @acs_urls.setter
295
- def acs_urls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
296
+ def acs_urls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
296
297
  pulumi.set(self, "acs_urls", value)
297
298
 
298
299
  @property
299
300
  @pulumi.getter(name="defaultRole")
300
- def default_role(self) -> Optional[pulumi.Input[str]]:
301
+ def default_role(self) -> Optional[pulumi.Input[builtins.str]]:
301
302
  """
302
303
  The role to use if no role is provided during login.
303
304
  """
304
305
  return pulumi.get(self, "default_role")
305
306
 
306
307
  @default_role.setter
307
- def default_role(self, value: Optional[pulumi.Input[str]]):
308
+ def default_role(self, value: Optional[pulumi.Input[builtins.str]]):
308
309
  pulumi.set(self, "default_role", value)
309
310
 
310
311
  @property
311
312
  @pulumi.getter(name="disableRemount")
312
- def disable_remount(self) -> Optional[pulumi.Input[bool]]:
313
+ def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
313
314
  """
314
315
  If set to `true`, opts out of mount migration on path updates.
315
316
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -317,24 +318,24 @@ class _AuthBackendState:
317
318
  return pulumi.get(self, "disable_remount")
318
319
 
319
320
  @disable_remount.setter
320
- def disable_remount(self, value: Optional[pulumi.Input[bool]]):
321
+ def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
321
322
  pulumi.set(self, "disable_remount", value)
322
323
 
323
324
  @property
324
325
  @pulumi.getter(name="entityId")
325
- def entity_id(self) -> Optional[pulumi.Input[str]]:
326
+ def entity_id(self) -> Optional[pulumi.Input[builtins.str]]:
326
327
  """
327
328
  The entity ID of the SAML authentication service provider.
328
329
  """
329
330
  return pulumi.get(self, "entity_id")
330
331
 
331
332
  @entity_id.setter
332
- def entity_id(self, value: Optional[pulumi.Input[str]]):
333
+ def entity_id(self, value: Optional[pulumi.Input[builtins.str]]):
333
334
  pulumi.set(self, "entity_id", value)
334
335
 
335
336
  @property
336
337
  @pulumi.getter(name="idpCert")
337
- def idp_cert(self) -> Optional[pulumi.Input[str]]:
338
+ def idp_cert(self) -> Optional[pulumi.Input[builtins.str]]:
338
339
  """
339
340
  The PEM encoded certificate of the identity provider. Mutually exclusive
340
341
  with `idp_metadata_url`.
@@ -342,12 +343,12 @@ class _AuthBackendState:
342
343
  return pulumi.get(self, "idp_cert")
343
344
 
344
345
  @idp_cert.setter
345
- def idp_cert(self, value: Optional[pulumi.Input[str]]):
346
+ def idp_cert(self, value: Optional[pulumi.Input[builtins.str]]):
346
347
  pulumi.set(self, "idp_cert", value)
347
348
 
348
349
  @property
349
350
  @pulumi.getter(name="idpEntityId")
350
- def idp_entity_id(self) -> Optional[pulumi.Input[str]]:
351
+ def idp_entity_id(self) -> Optional[pulumi.Input[builtins.str]]:
351
352
  """
352
353
  The entity ID of the identity provider. Mutually exclusive with
353
354
  `idp_metadata_url`.
@@ -355,24 +356,24 @@ class _AuthBackendState:
355
356
  return pulumi.get(self, "idp_entity_id")
356
357
 
357
358
  @idp_entity_id.setter
358
- def idp_entity_id(self, value: Optional[pulumi.Input[str]]):
359
+ def idp_entity_id(self, value: Optional[pulumi.Input[builtins.str]]):
359
360
  pulumi.set(self, "idp_entity_id", value)
360
361
 
361
362
  @property
362
363
  @pulumi.getter(name="idpMetadataUrl")
363
- def idp_metadata_url(self) -> Optional[pulumi.Input[str]]:
364
+ def idp_metadata_url(self) -> Optional[pulumi.Input[builtins.str]]:
364
365
  """
365
366
  The metadata URL of the identity provider.
366
367
  """
367
368
  return pulumi.get(self, "idp_metadata_url")
368
369
 
369
370
  @idp_metadata_url.setter
370
- def idp_metadata_url(self, value: Optional[pulumi.Input[str]]):
371
+ def idp_metadata_url(self, value: Optional[pulumi.Input[builtins.str]]):
371
372
  pulumi.set(self, "idp_metadata_url", value)
372
373
 
373
374
  @property
374
375
  @pulumi.getter(name="idpSsoUrl")
375
- def idp_sso_url(self) -> Optional[pulumi.Input[str]]:
376
+ def idp_sso_url(self) -> Optional[pulumi.Input[builtins.str]]:
376
377
  """
377
378
  The SSO URL of the identity provider. Mutually exclusive with
378
379
  `idp_metadata_url`.
@@ -380,12 +381,12 @@ class _AuthBackendState:
380
381
  return pulumi.get(self, "idp_sso_url")
381
382
 
382
383
  @idp_sso_url.setter
383
- def idp_sso_url(self, value: Optional[pulumi.Input[str]]):
384
+ def idp_sso_url(self, value: Optional[pulumi.Input[builtins.str]]):
384
385
  pulumi.set(self, "idp_sso_url", value)
385
386
 
386
387
  @property
387
388
  @pulumi.getter
388
- def namespace(self) -> Optional[pulumi.Input[str]]:
389
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
389
390
  """
390
391
  The namespace to provision the resource in.
391
392
  The value should not contain leading or trailing forward slashes.
@@ -395,12 +396,12 @@ class _AuthBackendState:
395
396
  return pulumi.get(self, "namespace")
396
397
 
397
398
  @namespace.setter
398
- def namespace(self, value: Optional[pulumi.Input[str]]):
399
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
399
400
  pulumi.set(self, "namespace", value)
400
401
 
401
402
  @property
402
403
  @pulumi.getter
403
- def path(self) -> Optional[pulumi.Input[str]]:
404
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
404
405
  """
405
406
  Path where the auth backend will be mounted. Defaults to `auth/saml`
406
407
  if not specified.
@@ -408,12 +409,12 @@ class _AuthBackendState:
408
409
  return pulumi.get(self, "path")
409
410
 
410
411
  @path.setter
411
- def path(self, value: Optional[pulumi.Input[str]]):
412
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
412
413
  pulumi.set(self, "path", value)
413
414
 
414
415
  @property
415
416
  @pulumi.getter(name="verboseLogging")
416
- def verbose_logging(self) -> Optional[pulumi.Input[bool]]:
417
+ def verbose_logging(self) -> Optional[pulumi.Input[builtins.bool]]:
417
418
  """
418
419
  If set to `true`, logs additional, potentially sensitive
419
420
  information during the SAML exchange according to the current logging level. Not
@@ -422,7 +423,7 @@ class _AuthBackendState:
422
423
  return pulumi.get(self, "verbose_logging")
423
424
 
424
425
  @verbose_logging.setter
425
- def verbose_logging(self, value: Optional[pulumi.Input[bool]]):
426
+ def verbose_logging(self, value: Optional[pulumi.Input[builtins.bool]]):
426
427
  pulumi.set(self, "verbose_logging", value)
427
428
 
428
429
 
@@ -431,17 +432,17 @@ class AuthBackend(pulumi.CustomResource):
431
432
  def __init__(__self__,
432
433
  resource_name: str,
433
434
  opts: Optional[pulumi.ResourceOptions] = None,
434
- acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
435
- default_role: Optional[pulumi.Input[str]] = None,
436
- disable_remount: Optional[pulumi.Input[bool]] = None,
437
- entity_id: Optional[pulumi.Input[str]] = None,
438
- idp_cert: Optional[pulumi.Input[str]] = None,
439
- idp_entity_id: Optional[pulumi.Input[str]] = None,
440
- idp_metadata_url: Optional[pulumi.Input[str]] = None,
441
- idp_sso_url: Optional[pulumi.Input[str]] = None,
442
- namespace: Optional[pulumi.Input[str]] = None,
443
- path: Optional[pulumi.Input[str]] = None,
444
- verbose_logging: Optional[pulumi.Input[bool]] = None,
435
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
436
+ default_role: Optional[pulumi.Input[builtins.str]] = None,
437
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
438
+ entity_id: Optional[pulumi.Input[builtins.str]] = None,
439
+ idp_cert: Optional[pulumi.Input[builtins.str]] = None,
440
+ idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
441
+ idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
442
+ idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
443
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
444
+ path: Optional[pulumi.Input[builtins.str]] = None,
445
+ verbose_logging: Optional[pulumi.Input[builtins.bool]] = None,
445
446
  __props__=None):
446
447
  """
447
448
  Manages a SAML Auth mount in a Vault server. See the [Vault
@@ -472,26 +473,26 @@ class AuthBackend(pulumi.CustomResource):
472
473
 
473
474
  :param str resource_name: The name of the resource.
474
475
  :param pulumi.ResourceOptions opts: Options for the resource.
475
- :param pulumi.Input[Sequence[pulumi.Input[str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
476
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
476
477
  that should receive a response from the identity provider.
477
- :param pulumi.Input[str] default_role: The role to use if no role is provided during login.
478
- :param pulumi.Input[bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
478
+ :param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
479
+ :param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
479
480
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
480
- :param pulumi.Input[str] entity_id: The entity ID of the SAML authentication service provider.
481
- :param pulumi.Input[str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
481
+ :param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
482
+ :param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
482
483
  with `idp_metadata_url`.
483
- :param pulumi.Input[str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
484
+ :param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
484
485
  `idp_metadata_url`.
485
- :param pulumi.Input[str] idp_metadata_url: The metadata URL of the identity provider.
486
- :param pulumi.Input[str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
486
+ :param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
487
+ :param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
487
488
  `idp_metadata_url`.
488
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
489
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
489
490
  The value should not contain leading or trailing forward slashes.
490
491
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
491
492
  *Available only for Vault Enterprise*.
492
- :param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
493
+ :param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
493
494
  if not specified.
494
- :param pulumi.Input[bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
495
+ :param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
495
496
  information during the SAML exchange according to the current logging level. Not
496
497
  recommended for production.
497
498
  """
@@ -543,17 +544,17 @@ class AuthBackend(pulumi.CustomResource):
543
544
  def _internal_init(__self__,
544
545
  resource_name: str,
545
546
  opts: Optional[pulumi.ResourceOptions] = None,
546
- acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
547
- default_role: Optional[pulumi.Input[str]] = None,
548
- disable_remount: Optional[pulumi.Input[bool]] = None,
549
- entity_id: Optional[pulumi.Input[str]] = None,
550
- idp_cert: Optional[pulumi.Input[str]] = None,
551
- idp_entity_id: Optional[pulumi.Input[str]] = None,
552
- idp_metadata_url: Optional[pulumi.Input[str]] = None,
553
- idp_sso_url: Optional[pulumi.Input[str]] = None,
554
- namespace: Optional[pulumi.Input[str]] = None,
555
- path: Optional[pulumi.Input[str]] = None,
556
- verbose_logging: Optional[pulumi.Input[bool]] = None,
547
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
548
+ default_role: Optional[pulumi.Input[builtins.str]] = None,
549
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
550
+ entity_id: Optional[pulumi.Input[builtins.str]] = None,
551
+ idp_cert: Optional[pulumi.Input[builtins.str]] = None,
552
+ idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
553
+ idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
554
+ idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
555
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
556
+ path: Optional[pulumi.Input[builtins.str]] = None,
557
+ verbose_logging: Optional[pulumi.Input[builtins.bool]] = None,
557
558
  __props__=None):
558
559
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
559
560
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -588,17 +589,17 @@ class AuthBackend(pulumi.CustomResource):
588
589
  def get(resource_name: str,
589
590
  id: pulumi.Input[str],
590
591
  opts: Optional[pulumi.ResourceOptions] = None,
591
- acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
592
- default_role: Optional[pulumi.Input[str]] = None,
593
- disable_remount: Optional[pulumi.Input[bool]] = None,
594
- entity_id: Optional[pulumi.Input[str]] = None,
595
- idp_cert: Optional[pulumi.Input[str]] = None,
596
- idp_entity_id: Optional[pulumi.Input[str]] = None,
597
- idp_metadata_url: Optional[pulumi.Input[str]] = None,
598
- idp_sso_url: Optional[pulumi.Input[str]] = None,
599
- namespace: Optional[pulumi.Input[str]] = None,
600
- path: Optional[pulumi.Input[str]] = None,
601
- verbose_logging: Optional[pulumi.Input[bool]] = None) -> 'AuthBackend':
592
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
593
+ default_role: Optional[pulumi.Input[builtins.str]] = None,
594
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
595
+ entity_id: Optional[pulumi.Input[builtins.str]] = None,
596
+ idp_cert: Optional[pulumi.Input[builtins.str]] = None,
597
+ idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
598
+ idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
599
+ idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
600
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
601
+ path: Optional[pulumi.Input[builtins.str]] = None,
602
+ verbose_logging: Optional[pulumi.Input[builtins.bool]] = None) -> 'AuthBackend':
602
603
  """
603
604
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
604
605
  properties used to qualify the lookup.
@@ -606,26 +607,26 @@ class AuthBackend(pulumi.CustomResource):
606
607
  :param str resource_name: The unique name of the resulting resource.
607
608
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
608
609
  :param pulumi.ResourceOptions opts: Options for the resource.
609
- :param pulumi.Input[Sequence[pulumi.Input[str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
610
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
610
611
  that should receive a response from the identity provider.
611
- :param pulumi.Input[str] default_role: The role to use if no role is provided during login.
612
- :param pulumi.Input[bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
612
+ :param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
613
+ :param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
613
614
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
614
- :param pulumi.Input[str] entity_id: The entity ID of the SAML authentication service provider.
615
- :param pulumi.Input[str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
615
+ :param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
616
+ :param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
616
617
  with `idp_metadata_url`.
617
- :param pulumi.Input[str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
618
+ :param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
618
619
  `idp_metadata_url`.
619
- :param pulumi.Input[str] idp_metadata_url: The metadata URL of the identity provider.
620
- :param pulumi.Input[str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
620
+ :param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
621
+ :param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
621
622
  `idp_metadata_url`.
622
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
623
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
623
624
  The value should not contain leading or trailing forward slashes.
624
625
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
625
626
  *Available only for Vault Enterprise*.
626
- :param pulumi.Input[str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
627
+ :param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
627
628
  if not specified.
628
- :param pulumi.Input[bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
629
+ :param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
629
630
  information during the SAML exchange according to the current logging level. Not
630
631
  recommended for production.
631
632
  """
@@ -648,7 +649,7 @@ class AuthBackend(pulumi.CustomResource):
648
649
 
649
650
  @property
650
651
  @pulumi.getter(name="acsUrls")
651
- def acs_urls(self) -> pulumi.Output[Sequence[str]]:
652
+ def acs_urls(self) -> pulumi.Output[Sequence[builtins.str]]:
652
653
  """
653
654
  The well-formatted URLs of your Assertion Consumer Service (ACS)
654
655
  that should receive a response from the identity provider.
@@ -657,7 +658,7 @@ class AuthBackend(pulumi.CustomResource):
657
658
 
658
659
  @property
659
660
  @pulumi.getter(name="defaultRole")
660
- def default_role(self) -> pulumi.Output[Optional[str]]:
661
+ def default_role(self) -> pulumi.Output[Optional[builtins.str]]:
661
662
  """
662
663
  The role to use if no role is provided during login.
663
664
  """
@@ -665,7 +666,7 @@ class AuthBackend(pulumi.CustomResource):
665
666
 
666
667
  @property
667
668
  @pulumi.getter(name="disableRemount")
668
- def disable_remount(self) -> pulumi.Output[Optional[bool]]:
669
+ def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
669
670
  """
670
671
  If set to `true`, opts out of mount migration on path updates.
671
672
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -674,7 +675,7 @@ class AuthBackend(pulumi.CustomResource):
674
675
 
675
676
  @property
676
677
  @pulumi.getter(name="entityId")
677
- def entity_id(self) -> pulumi.Output[str]:
678
+ def entity_id(self) -> pulumi.Output[builtins.str]:
678
679
  """
679
680
  The entity ID of the SAML authentication service provider.
680
681
  """
@@ -682,7 +683,7 @@ class AuthBackend(pulumi.CustomResource):
682
683
 
683
684
  @property
684
685
  @pulumi.getter(name="idpCert")
685
- def idp_cert(self) -> pulumi.Output[Optional[str]]:
686
+ def idp_cert(self) -> pulumi.Output[Optional[builtins.str]]:
686
687
  """
687
688
  The PEM encoded certificate of the identity provider. Mutually exclusive
688
689
  with `idp_metadata_url`.
@@ -691,7 +692,7 @@ class AuthBackend(pulumi.CustomResource):
691
692
 
692
693
  @property
693
694
  @pulumi.getter(name="idpEntityId")
694
- def idp_entity_id(self) -> pulumi.Output[Optional[str]]:
695
+ def idp_entity_id(self) -> pulumi.Output[Optional[builtins.str]]:
695
696
  """
696
697
  The entity ID of the identity provider. Mutually exclusive with
697
698
  `idp_metadata_url`.
@@ -700,7 +701,7 @@ class AuthBackend(pulumi.CustomResource):
700
701
 
701
702
  @property
702
703
  @pulumi.getter(name="idpMetadataUrl")
703
- def idp_metadata_url(self) -> pulumi.Output[Optional[str]]:
704
+ def idp_metadata_url(self) -> pulumi.Output[Optional[builtins.str]]:
704
705
  """
705
706
  The metadata URL of the identity provider.
706
707
  """
@@ -708,7 +709,7 @@ class AuthBackend(pulumi.CustomResource):
708
709
 
709
710
  @property
710
711
  @pulumi.getter(name="idpSsoUrl")
711
- def idp_sso_url(self) -> pulumi.Output[Optional[str]]:
712
+ def idp_sso_url(self) -> pulumi.Output[Optional[builtins.str]]:
712
713
  """
713
714
  The SSO URL of the identity provider. Mutually exclusive with
714
715
  `idp_metadata_url`.
@@ -717,7 +718,7 @@ class AuthBackend(pulumi.CustomResource):
717
718
 
718
719
  @property
719
720
  @pulumi.getter
720
- def namespace(self) -> pulumi.Output[Optional[str]]:
721
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
721
722
  """
722
723
  The namespace to provision the resource in.
723
724
  The value should not contain leading or trailing forward slashes.
@@ -728,7 +729,7 @@ class AuthBackend(pulumi.CustomResource):
728
729
 
729
730
  @property
730
731
  @pulumi.getter
731
- def path(self) -> pulumi.Output[Optional[str]]:
732
+ def path(self) -> pulumi.Output[Optional[builtins.str]]:
732
733
  """
733
734
  Path where the auth backend will be mounted. Defaults to `auth/saml`
734
735
  if not specified.
@@ -737,7 +738,7 @@ class AuthBackend(pulumi.CustomResource):
737
738
 
738
739
  @property
739
740
  @pulumi.getter(name="verboseLogging")
740
- def verbose_logging(self) -> pulumi.Output[bool]:
741
+ def verbose_logging(self) -> pulumi.Output[builtins.bool]:
741
742
  """
742
743
  If set to `true`, logs additional, potentially sensitive
743
744
  information during the SAML exchange according to the current logging level. Not