pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,20 +20,20 @@ __all__ = ['AuthBackendIdentityWhitelistArgs', 'AuthBackendIdentityWhitelist']
19
20
  @pulumi.input_type
20
21
  class AuthBackendIdentityWhitelistArgs:
21
22
  def __init__(__self__, *,
22
- backend: Optional[pulumi.Input[str]] = None,
23
- disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
24
- namespace: Optional[pulumi.Input[str]] = None,
25
- safety_buffer: Optional[pulumi.Input[int]] = None):
23
+ backend: Optional[pulumi.Input[builtins.str]] = None,
24
+ disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
25
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
26
+ safety_buffer: Optional[pulumi.Input[builtins.int]] = None):
26
27
  """
27
28
  The set of arguments for constructing a AuthBackendIdentityWhitelist resource.
28
- :param pulumi.Input[str] backend: The path of the AWS backend being configured.
29
- :param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
29
+ :param pulumi.Input[builtins.str] backend: The path of the AWS backend being configured.
30
+ :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
30
31
  tidying of the identity-whitelist entries.
31
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
32
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
32
33
  The value should not contain leading or trailing forward slashes.
33
34
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
34
35
  *Available only for Vault Enterprise*.
35
- :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
36
+ :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time, in minutes, that must
36
37
  have passed beyond the roletag expiration, before it is removed from the
37
38
  backend storage.
38
39
  """
@@ -47,19 +48,19 @@ class AuthBackendIdentityWhitelistArgs:
47
48
 
48
49
  @property
49
50
  @pulumi.getter
50
- def backend(self) -> Optional[pulumi.Input[str]]:
51
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
51
52
  """
52
53
  The path of the AWS backend being configured.
53
54
  """
54
55
  return pulumi.get(self, "backend")
55
56
 
56
57
  @backend.setter
57
- def backend(self, value: Optional[pulumi.Input[str]]):
58
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
58
59
  pulumi.set(self, "backend", value)
59
60
 
60
61
  @property
61
62
  @pulumi.getter(name="disablePeriodicTidy")
62
- def disable_periodic_tidy(self) -> Optional[pulumi.Input[bool]]:
63
+ def disable_periodic_tidy(self) -> Optional[pulumi.Input[builtins.bool]]:
63
64
  """
64
65
  If set to true, disables the periodic
65
66
  tidying of the identity-whitelist entries.
@@ -67,12 +68,12 @@ class AuthBackendIdentityWhitelistArgs:
67
68
  return pulumi.get(self, "disable_periodic_tidy")
68
69
 
69
70
  @disable_periodic_tidy.setter
70
- def disable_periodic_tidy(self, value: Optional[pulumi.Input[bool]]):
71
+ def disable_periodic_tidy(self, value: Optional[pulumi.Input[builtins.bool]]):
71
72
  pulumi.set(self, "disable_periodic_tidy", value)
72
73
 
73
74
  @property
74
75
  @pulumi.getter
75
- def namespace(self) -> Optional[pulumi.Input[str]]:
76
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
76
77
  """
77
78
  The namespace to provision the resource in.
78
79
  The value should not contain leading or trailing forward slashes.
@@ -82,12 +83,12 @@ class AuthBackendIdentityWhitelistArgs:
82
83
  return pulumi.get(self, "namespace")
83
84
 
84
85
  @namespace.setter
85
- def namespace(self, value: Optional[pulumi.Input[str]]):
86
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
86
87
  pulumi.set(self, "namespace", value)
87
88
 
88
89
  @property
89
90
  @pulumi.getter(name="safetyBuffer")
90
- def safety_buffer(self) -> Optional[pulumi.Input[int]]:
91
+ def safety_buffer(self) -> Optional[pulumi.Input[builtins.int]]:
91
92
  """
92
93
  The amount of extra time, in minutes, that must
93
94
  have passed beyond the roletag expiration, before it is removed from the
@@ -96,27 +97,27 @@ class AuthBackendIdentityWhitelistArgs:
96
97
  return pulumi.get(self, "safety_buffer")
97
98
 
98
99
  @safety_buffer.setter
99
- def safety_buffer(self, value: Optional[pulumi.Input[int]]):
100
+ def safety_buffer(self, value: Optional[pulumi.Input[builtins.int]]):
100
101
  pulumi.set(self, "safety_buffer", value)
101
102
 
102
103
 
103
104
  @pulumi.input_type
104
105
  class _AuthBackendIdentityWhitelistState:
105
106
  def __init__(__self__, *,
106
- backend: Optional[pulumi.Input[str]] = None,
107
- disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
108
- namespace: Optional[pulumi.Input[str]] = None,
109
- safety_buffer: Optional[pulumi.Input[int]] = None):
107
+ backend: Optional[pulumi.Input[builtins.str]] = None,
108
+ disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
109
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
110
+ safety_buffer: Optional[pulumi.Input[builtins.int]] = None):
110
111
  """
111
112
  Input properties used for looking up and filtering AuthBackendIdentityWhitelist resources.
112
- :param pulumi.Input[str] backend: The path of the AWS backend being configured.
113
- :param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
113
+ :param pulumi.Input[builtins.str] backend: The path of the AWS backend being configured.
114
+ :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
114
115
  tidying of the identity-whitelist entries.
115
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
116
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
116
117
  The value should not contain leading or trailing forward slashes.
117
118
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
118
119
  *Available only for Vault Enterprise*.
119
- :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
120
+ :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time, in minutes, that must
120
121
  have passed beyond the roletag expiration, before it is removed from the
121
122
  backend storage.
122
123
  """
@@ -131,19 +132,19 @@ class _AuthBackendIdentityWhitelistState:
131
132
 
132
133
  @property
133
134
  @pulumi.getter
134
- def backend(self) -> Optional[pulumi.Input[str]]:
135
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
135
136
  """
136
137
  The path of the AWS backend being configured.
137
138
  """
138
139
  return pulumi.get(self, "backend")
139
140
 
140
141
  @backend.setter
141
- def backend(self, value: Optional[pulumi.Input[str]]):
142
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
142
143
  pulumi.set(self, "backend", value)
143
144
 
144
145
  @property
145
146
  @pulumi.getter(name="disablePeriodicTidy")
146
- def disable_periodic_tidy(self) -> Optional[pulumi.Input[bool]]:
147
+ def disable_periodic_tidy(self) -> Optional[pulumi.Input[builtins.bool]]:
147
148
  """
148
149
  If set to true, disables the periodic
149
150
  tidying of the identity-whitelist entries.
@@ -151,12 +152,12 @@ class _AuthBackendIdentityWhitelistState:
151
152
  return pulumi.get(self, "disable_periodic_tidy")
152
153
 
153
154
  @disable_periodic_tidy.setter
154
- def disable_periodic_tidy(self, value: Optional[pulumi.Input[bool]]):
155
+ def disable_periodic_tidy(self, value: Optional[pulumi.Input[builtins.bool]]):
155
156
  pulumi.set(self, "disable_periodic_tidy", value)
156
157
 
157
158
  @property
158
159
  @pulumi.getter
159
- def namespace(self) -> Optional[pulumi.Input[str]]:
160
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
160
161
  """
161
162
  The namespace to provision the resource in.
162
163
  The value should not contain leading or trailing forward slashes.
@@ -166,12 +167,12 @@ class _AuthBackendIdentityWhitelistState:
166
167
  return pulumi.get(self, "namespace")
167
168
 
168
169
  @namespace.setter
169
- def namespace(self, value: Optional[pulumi.Input[str]]):
170
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
170
171
  pulumi.set(self, "namespace", value)
171
172
 
172
173
  @property
173
174
  @pulumi.getter(name="safetyBuffer")
174
- def safety_buffer(self) -> Optional[pulumi.Input[int]]:
175
+ def safety_buffer(self) -> Optional[pulumi.Input[builtins.int]]:
175
176
  """
176
177
  The amount of extra time, in minutes, that must
177
178
  have passed beyond the roletag expiration, before it is removed from the
@@ -180,7 +181,7 @@ class _AuthBackendIdentityWhitelistState:
180
181
  return pulumi.get(self, "safety_buffer")
181
182
 
182
183
  @safety_buffer.setter
183
- def safety_buffer(self, value: Optional[pulumi.Input[int]]):
184
+ def safety_buffer(self, value: Optional[pulumi.Input[builtins.int]]):
184
185
  pulumi.set(self, "safety_buffer", value)
185
186
 
186
187
 
@@ -189,10 +190,10 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
189
190
  def __init__(__self__,
190
191
  resource_name: str,
191
192
  opts: Optional[pulumi.ResourceOptions] = None,
192
- backend: Optional[pulumi.Input[str]] = None,
193
- disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
194
- namespace: Optional[pulumi.Input[str]] = None,
195
- safety_buffer: Optional[pulumi.Input[int]] = None,
193
+ backend: Optional[pulumi.Input[builtins.str]] = None,
194
+ disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
195
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
196
+ safety_buffer: Optional[pulumi.Input[builtins.int]] = None,
196
197
  __props__=None):
197
198
  """
198
199
  Configures the periodic tidying operation of the whitelisted identity entries.
@@ -222,14 +223,14 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
222
223
 
223
224
  :param str resource_name: The name of the resource.
224
225
  :param pulumi.ResourceOptions opts: Options for the resource.
225
- :param pulumi.Input[str] backend: The path of the AWS backend being configured.
226
- :param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
226
+ :param pulumi.Input[builtins.str] backend: The path of the AWS backend being configured.
227
+ :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
227
228
  tidying of the identity-whitelist entries.
228
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
229
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
229
230
  The value should not contain leading or trailing forward slashes.
230
231
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
231
232
  *Available only for Vault Enterprise*.
232
- :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
233
+ :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time, in minutes, that must
233
234
  have passed beyond the roletag expiration, before it is removed from the
234
235
  backend storage.
235
236
  """
@@ -280,10 +281,10 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
280
281
  def _internal_init(__self__,
281
282
  resource_name: str,
282
283
  opts: Optional[pulumi.ResourceOptions] = None,
283
- backend: Optional[pulumi.Input[str]] = None,
284
- disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
285
- namespace: Optional[pulumi.Input[str]] = None,
286
- safety_buffer: Optional[pulumi.Input[int]] = None,
284
+ backend: Optional[pulumi.Input[builtins.str]] = None,
285
+ disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
286
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
287
+ safety_buffer: Optional[pulumi.Input[builtins.int]] = None,
287
288
  __props__=None):
288
289
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
289
290
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -307,10 +308,10 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
307
308
  def get(resource_name: str,
308
309
  id: pulumi.Input[str],
309
310
  opts: Optional[pulumi.ResourceOptions] = None,
310
- backend: Optional[pulumi.Input[str]] = None,
311
- disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
312
- namespace: Optional[pulumi.Input[str]] = None,
313
- safety_buffer: Optional[pulumi.Input[int]] = None) -> 'AuthBackendIdentityWhitelist':
311
+ backend: Optional[pulumi.Input[builtins.str]] = None,
312
+ disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
313
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
314
+ safety_buffer: Optional[pulumi.Input[builtins.int]] = None) -> 'AuthBackendIdentityWhitelist':
314
315
  """
315
316
  Get an existing AuthBackendIdentityWhitelist resource's state with the given name, id, and optional extra
316
317
  properties used to qualify the lookup.
@@ -318,14 +319,14 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
318
319
  :param str resource_name: The unique name of the resulting resource.
319
320
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
320
321
  :param pulumi.ResourceOptions opts: Options for the resource.
321
- :param pulumi.Input[str] backend: The path of the AWS backend being configured.
322
- :param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
322
+ :param pulumi.Input[builtins.str] backend: The path of the AWS backend being configured.
323
+ :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
323
324
  tidying of the identity-whitelist entries.
324
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
325
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
325
326
  The value should not contain leading or trailing forward slashes.
326
327
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
327
328
  *Available only for Vault Enterprise*.
328
- :param pulumi.Input[int] safety_buffer: The amount of extra time, in minutes, that must
329
+ :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time, in minutes, that must
329
330
  have passed beyond the roletag expiration, before it is removed from the
330
331
  backend storage.
331
332
  """
@@ -341,7 +342,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
341
342
 
342
343
  @property
343
344
  @pulumi.getter
344
- def backend(self) -> pulumi.Output[Optional[str]]:
345
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
345
346
  """
346
347
  The path of the AWS backend being configured.
347
348
  """
@@ -349,7 +350,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
349
350
 
350
351
  @property
351
352
  @pulumi.getter(name="disablePeriodicTidy")
352
- def disable_periodic_tidy(self) -> pulumi.Output[Optional[bool]]:
353
+ def disable_periodic_tidy(self) -> pulumi.Output[Optional[builtins.bool]]:
353
354
  """
354
355
  If set to true, disables the periodic
355
356
  tidying of the identity-whitelist entries.
@@ -358,7 +359,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
358
359
 
359
360
  @property
360
361
  @pulumi.getter
361
- def namespace(self) -> pulumi.Output[Optional[str]]:
362
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
362
363
  """
363
364
  The namespace to provision the resource in.
364
365
  The value should not contain leading or trailing forward slashes.
@@ -369,7 +370,7 @@ class AuthBackendIdentityWhitelist(pulumi.CustomResource):
369
370
 
370
371
  @property
371
372
  @pulumi.getter(name="safetyBuffer")
372
- def safety_buffer(self) -> pulumi.Output[Optional[int]]:
373
+ def safety_buffer(self) -> pulumi.Output[Optional[builtins.int]]:
373
374
  """
374
375
  The amount of extra time, in minutes, that must
375
376
  have passed beyond the roletag expiration, before it is removed from the