pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,24 +20,24 @@ __all__ = ['AuthBackendConfigIdentityArgs', 'AuthBackendConfigIdentity']
19
20
  @pulumi.input_type
20
21
  class AuthBackendConfigIdentityArgs:
21
22
  def __init__(__self__, *,
22
- backend: Optional[pulumi.Input[str]] = None,
23
- ec2_alias: Optional[pulumi.Input[str]] = None,
24
- ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
- iam_alias: Optional[pulumi.Input[str]] = None,
26
- iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
27
- namespace: Optional[pulumi.Input[str]] = None):
23
+ backend: Optional[pulumi.Input[builtins.str]] = None,
24
+ ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
25
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
+ iam_alias: Optional[pulumi.Input[builtins.str]] = None,
27
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
28
29
  """
29
30
  The set of arguments for constructing a AuthBackendConfigIdentity resource.
30
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
31
- :param pulumi.Input[str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
31
+ :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
32
+ :param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
32
33
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
33
- :param pulumi.Input[Sequence[pulumi.Input[str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
34
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
34
35
  added to both audit logs, and on the `ec2_alias`
35
- :param pulumi.Input[str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
36
+ :param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
36
37
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
37
- :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
38
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
38
39
  added to both audit logs, and on the `iam_alias`
39
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
40
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
40
41
  The value should not contain leading or trailing forward slashes.
41
42
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
42
43
  *Available only for Vault Enterprise*.
@@ -56,19 +57,19 @@ class AuthBackendConfigIdentityArgs:
56
57
 
57
58
  @property
58
59
  @pulumi.getter
59
- def backend(self) -> Optional[pulumi.Input[str]]:
60
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
60
61
  """
61
62
  Unique name of the auth backend to configure.
62
63
  """
63
64
  return pulumi.get(self, "backend")
64
65
 
65
66
  @backend.setter
66
- def backend(self, value: Optional[pulumi.Input[str]]):
67
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
67
68
  pulumi.set(self, "backend", value)
68
69
 
69
70
  @property
70
71
  @pulumi.getter(name="ec2Alias")
71
- def ec2_alias(self) -> Optional[pulumi.Input[str]]:
72
+ def ec2_alias(self) -> Optional[pulumi.Input[builtins.str]]:
72
73
  """
73
74
  How to generate the identity alias when using the ec2 auth method. Valid choices are
74
75
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
@@ -76,12 +77,12 @@ class AuthBackendConfigIdentityArgs:
76
77
  return pulumi.get(self, "ec2_alias")
77
78
 
78
79
  @ec2_alias.setter
79
- def ec2_alias(self, value: Optional[pulumi.Input[str]]):
80
+ def ec2_alias(self, value: Optional[pulumi.Input[builtins.str]]):
80
81
  pulumi.set(self, "ec2_alias", value)
81
82
 
82
83
  @property
83
84
  @pulumi.getter(name="ec2Metadatas")
84
- def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
85
+ def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
85
86
  """
86
87
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
87
88
  added to both audit logs, and on the `ec2_alias`
@@ -89,12 +90,12 @@ class AuthBackendConfigIdentityArgs:
89
90
  return pulumi.get(self, "ec2_metadatas")
90
91
 
91
92
  @ec2_metadatas.setter
92
- def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
93
+ def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
93
94
  pulumi.set(self, "ec2_metadatas", value)
94
95
 
95
96
  @property
96
97
  @pulumi.getter(name="iamAlias")
97
- def iam_alias(self) -> Optional[pulumi.Input[str]]:
98
+ def iam_alias(self) -> Optional[pulumi.Input[builtins.str]]:
98
99
  """
99
100
  How to generate the identity alias when using the iam auth method. Valid choices are
100
101
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
@@ -102,12 +103,12 @@ class AuthBackendConfigIdentityArgs:
102
103
  return pulumi.get(self, "iam_alias")
103
104
 
104
105
  @iam_alias.setter
105
- def iam_alias(self, value: Optional[pulumi.Input[str]]):
106
+ def iam_alias(self, value: Optional[pulumi.Input[builtins.str]]):
106
107
  pulumi.set(self, "iam_alias", value)
107
108
 
108
109
  @property
109
110
  @pulumi.getter(name="iamMetadatas")
110
- def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
111
+ def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
111
112
  """
112
113
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
113
114
  added to both audit logs, and on the `iam_alias`
@@ -115,12 +116,12 @@ class AuthBackendConfigIdentityArgs:
115
116
  return pulumi.get(self, "iam_metadatas")
116
117
 
117
118
  @iam_metadatas.setter
118
- def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
119
+ def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
119
120
  pulumi.set(self, "iam_metadatas", value)
120
121
 
121
122
  @property
122
123
  @pulumi.getter
123
- def namespace(self) -> Optional[pulumi.Input[str]]:
124
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
124
125
  """
125
126
  The namespace to provision the resource in.
126
127
  The value should not contain leading or trailing forward slashes.
@@ -130,31 +131,31 @@ class AuthBackendConfigIdentityArgs:
130
131
  return pulumi.get(self, "namespace")
131
132
 
132
133
  @namespace.setter
133
- def namespace(self, value: Optional[pulumi.Input[str]]):
134
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
134
135
  pulumi.set(self, "namespace", value)
135
136
 
136
137
 
137
138
  @pulumi.input_type
138
139
  class _AuthBackendConfigIdentityState:
139
140
  def __init__(__self__, *,
140
- backend: Optional[pulumi.Input[str]] = None,
141
- ec2_alias: Optional[pulumi.Input[str]] = None,
142
- ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
143
- iam_alias: Optional[pulumi.Input[str]] = None,
144
- iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
145
- namespace: Optional[pulumi.Input[str]] = None):
141
+ backend: Optional[pulumi.Input[builtins.str]] = None,
142
+ ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
143
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
144
+ iam_alias: Optional[pulumi.Input[builtins.str]] = None,
145
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
146
+ namespace: Optional[pulumi.Input[builtins.str]] = None):
146
147
  """
147
148
  Input properties used for looking up and filtering AuthBackendConfigIdentity resources.
148
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
149
- :param pulumi.Input[str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
149
+ :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
150
+ :param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
150
151
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
151
- :param pulumi.Input[Sequence[pulumi.Input[str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
152
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
152
153
  added to both audit logs, and on the `ec2_alias`
153
- :param pulumi.Input[str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
154
+ :param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
154
155
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
155
- :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
156
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
156
157
  added to both audit logs, and on the `iam_alias`
157
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
158
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
158
159
  The value should not contain leading or trailing forward slashes.
159
160
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
160
161
  *Available only for Vault Enterprise*.
@@ -174,19 +175,19 @@ class _AuthBackendConfigIdentityState:
174
175
 
175
176
  @property
176
177
  @pulumi.getter
177
- def backend(self) -> Optional[pulumi.Input[str]]:
178
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
178
179
  """
179
180
  Unique name of the auth backend to configure.
180
181
  """
181
182
  return pulumi.get(self, "backend")
182
183
 
183
184
  @backend.setter
184
- def backend(self, value: Optional[pulumi.Input[str]]):
185
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
185
186
  pulumi.set(self, "backend", value)
186
187
 
187
188
  @property
188
189
  @pulumi.getter(name="ec2Alias")
189
- def ec2_alias(self) -> Optional[pulumi.Input[str]]:
190
+ def ec2_alias(self) -> Optional[pulumi.Input[builtins.str]]:
190
191
  """
191
192
  How to generate the identity alias when using the ec2 auth method. Valid choices are
192
193
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
@@ -194,12 +195,12 @@ class _AuthBackendConfigIdentityState:
194
195
  return pulumi.get(self, "ec2_alias")
195
196
 
196
197
  @ec2_alias.setter
197
- def ec2_alias(self, value: Optional[pulumi.Input[str]]):
198
+ def ec2_alias(self, value: Optional[pulumi.Input[builtins.str]]):
198
199
  pulumi.set(self, "ec2_alias", value)
199
200
 
200
201
  @property
201
202
  @pulumi.getter(name="ec2Metadatas")
202
- def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
203
+ def ec2_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
203
204
  """
204
205
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
205
206
  added to both audit logs, and on the `ec2_alias`
@@ -207,12 +208,12 @@ class _AuthBackendConfigIdentityState:
207
208
  return pulumi.get(self, "ec2_metadatas")
208
209
 
209
210
  @ec2_metadatas.setter
210
- def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
211
+ def ec2_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
211
212
  pulumi.set(self, "ec2_metadatas", value)
212
213
 
213
214
  @property
214
215
  @pulumi.getter(name="iamAlias")
215
- def iam_alias(self) -> Optional[pulumi.Input[str]]:
216
+ def iam_alias(self) -> Optional[pulumi.Input[builtins.str]]:
216
217
  """
217
218
  How to generate the identity alias when using the iam auth method. Valid choices are
218
219
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
@@ -220,12 +221,12 @@ class _AuthBackendConfigIdentityState:
220
221
  return pulumi.get(self, "iam_alias")
221
222
 
222
223
  @iam_alias.setter
223
- def iam_alias(self, value: Optional[pulumi.Input[str]]):
224
+ def iam_alias(self, value: Optional[pulumi.Input[builtins.str]]):
224
225
  pulumi.set(self, "iam_alias", value)
225
226
 
226
227
  @property
227
228
  @pulumi.getter(name="iamMetadatas")
228
- def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
229
+ def iam_metadatas(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
229
230
  """
230
231
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
231
232
  added to both audit logs, and on the `iam_alias`
@@ -233,12 +234,12 @@ class _AuthBackendConfigIdentityState:
233
234
  return pulumi.get(self, "iam_metadatas")
234
235
 
235
236
  @iam_metadatas.setter
236
- def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
237
+ def iam_metadatas(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
237
238
  pulumi.set(self, "iam_metadatas", value)
238
239
 
239
240
  @property
240
241
  @pulumi.getter
241
- def namespace(self) -> Optional[pulumi.Input[str]]:
242
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
242
243
  """
243
244
  The namespace to provision the resource in.
244
245
  The value should not contain leading or trailing forward slashes.
@@ -248,7 +249,7 @@ class _AuthBackendConfigIdentityState:
248
249
  return pulumi.get(self, "namespace")
249
250
 
250
251
  @namespace.setter
251
- def namespace(self, value: Optional[pulumi.Input[str]]):
252
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
252
253
  pulumi.set(self, "namespace", value)
253
254
 
254
255
 
@@ -257,12 +258,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
257
258
  def __init__(__self__,
258
259
  resource_name: str,
259
260
  opts: Optional[pulumi.ResourceOptions] = None,
260
- backend: Optional[pulumi.Input[str]] = None,
261
- ec2_alias: Optional[pulumi.Input[str]] = None,
262
- ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
263
- iam_alias: Optional[pulumi.Input[str]] = None,
264
- iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
265
- namespace: Optional[pulumi.Input[str]] = None,
261
+ backend: Optional[pulumi.Input[builtins.str]] = None,
262
+ ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
263
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
264
+ iam_alias: Optional[pulumi.Input[builtins.str]] = None,
265
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
266
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
266
267
  __props__=None):
267
268
  """
268
269
  Manages an AWS auth backend identity configuration in a Vault server. This configuration defines how Vault interacts
@@ -295,16 +296,16 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
295
296
 
296
297
  :param str resource_name: The name of the resource.
297
298
  :param pulumi.ResourceOptions opts: Options for the resource.
298
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
299
- :param pulumi.Input[str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
299
+ :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
300
+ :param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
300
301
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
301
- :param pulumi.Input[Sequence[pulumi.Input[str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
302
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
302
303
  added to both audit logs, and on the `ec2_alias`
303
- :param pulumi.Input[str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
304
+ :param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
304
305
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
305
- :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
306
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
306
307
  added to both audit logs, and on the `iam_alias`
307
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
308
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
308
309
  The value should not contain leading or trailing forward slashes.
309
310
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
310
311
  *Available only for Vault Enterprise*.
@@ -359,12 +360,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
359
360
  def _internal_init(__self__,
360
361
  resource_name: str,
361
362
  opts: Optional[pulumi.ResourceOptions] = None,
362
- backend: Optional[pulumi.Input[str]] = None,
363
- ec2_alias: Optional[pulumi.Input[str]] = None,
364
- ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
365
- iam_alias: Optional[pulumi.Input[str]] = None,
366
- iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
367
- namespace: Optional[pulumi.Input[str]] = None,
363
+ backend: Optional[pulumi.Input[builtins.str]] = None,
364
+ ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
365
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
366
+ iam_alias: Optional[pulumi.Input[builtins.str]] = None,
367
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
368
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
368
369
  __props__=None):
369
370
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
370
371
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -390,12 +391,12 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
390
391
  def get(resource_name: str,
391
392
  id: pulumi.Input[str],
392
393
  opts: Optional[pulumi.ResourceOptions] = None,
393
- backend: Optional[pulumi.Input[str]] = None,
394
- ec2_alias: Optional[pulumi.Input[str]] = None,
395
- ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
396
- iam_alias: Optional[pulumi.Input[str]] = None,
397
- iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
398
- namespace: Optional[pulumi.Input[str]] = None) -> 'AuthBackendConfigIdentity':
394
+ backend: Optional[pulumi.Input[builtins.str]] = None,
395
+ ec2_alias: Optional[pulumi.Input[builtins.str]] = None,
396
+ ec2_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
397
+ iam_alias: Optional[pulumi.Input[builtins.str]] = None,
398
+ iam_metadatas: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
399
+ namespace: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendConfigIdentity':
399
400
  """
400
401
  Get an existing AuthBackendConfigIdentity resource's state with the given name, id, and optional extra
401
402
  properties used to qualify the lookup.
@@ -403,16 +404,16 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
403
404
  :param str resource_name: The unique name of the resulting resource.
404
405
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
405
406
  :param pulumi.ResourceOptions opts: Options for the resource.
406
- :param pulumi.Input[str] backend: Unique name of the auth backend to configure.
407
- :param pulumi.Input[str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
407
+ :param pulumi.Input[builtins.str] backend: Unique name of the auth backend to configure.
408
+ :param pulumi.Input[builtins.str] ec2_alias: How to generate the identity alias when using the ec2 auth method. Valid choices are
408
409
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
409
- :param pulumi.Input[Sequence[pulumi.Input[str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
410
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ec2_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
410
411
  added to both audit logs, and on the `ec2_alias`
411
- :param pulumi.Input[str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
412
+ :param pulumi.Input[builtins.str] iam_alias: How to generate the identity alias when using the iam auth method. Valid choices are
412
413
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
413
- :param pulumi.Input[Sequence[pulumi.Input[str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
414
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] iam_metadatas: The metadata to include on the token returned by the `login` endpoint. This metadata will be
414
415
  added to both audit logs, and on the `iam_alias`
415
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
416
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
416
417
  The value should not contain leading or trailing forward slashes.
417
418
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
418
419
  *Available only for Vault Enterprise*.
@@ -431,7 +432,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
431
432
 
432
433
  @property
433
434
  @pulumi.getter
434
- def backend(self) -> pulumi.Output[Optional[str]]:
435
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
435
436
  """
436
437
  Unique name of the auth backend to configure.
437
438
  """
@@ -439,7 +440,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
439
440
 
440
441
  @property
441
442
  @pulumi.getter(name="ec2Alias")
442
- def ec2_alias(self) -> pulumi.Output[Optional[str]]:
443
+ def ec2_alias(self) -> pulumi.Output[Optional[builtins.str]]:
443
444
  """
444
445
  How to generate the identity alias when using the ec2 auth method. Valid choices are
445
446
  `role_id`, `instance_id`, and `image_id`. Defaults to `role_id`
@@ -448,7 +449,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
448
449
 
449
450
  @property
450
451
  @pulumi.getter(name="ec2Metadatas")
451
- def ec2_metadatas(self) -> pulumi.Output[Optional[Sequence[str]]]:
452
+ def ec2_metadatas(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
452
453
  """
453
454
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
454
455
  added to both audit logs, and on the `ec2_alias`
@@ -457,7 +458,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
457
458
 
458
459
  @property
459
460
  @pulumi.getter(name="iamAlias")
460
- def iam_alias(self) -> pulumi.Output[Optional[str]]:
461
+ def iam_alias(self) -> pulumi.Output[Optional[builtins.str]]:
461
462
  """
462
463
  How to generate the identity alias when using the iam auth method. Valid choices are
463
464
  `role_id`, `unique_id`, and `full_arn`. Defaults to `role_id`
@@ -466,7 +467,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
466
467
 
467
468
  @property
468
469
  @pulumi.getter(name="iamMetadatas")
469
- def iam_metadatas(self) -> pulumi.Output[Optional[Sequence[str]]]:
470
+ def iam_metadatas(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
470
471
  """
471
472
  The metadata to include on the token returned by the `login` endpoint. This metadata will be
472
473
  added to both audit logs, and on the `iam_alias`
@@ -475,7 +476,7 @@ class AuthBackendConfigIdentity(pulumi.CustomResource):
475
476
 
476
477
  @property
477
478
  @pulumi.getter
478
- def namespace(self) -> pulumi.Output[Optional[str]]:
479
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
479
480
  """
480
481
  The namespace to provision the resource in.
481
482
  The value should not contain leading or trailing forward slashes.