pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,29 +20,29 @@ __all__ = ['AuthBackendRoleTagArgs', 'AuthBackendRoleTag']
19
20
  @pulumi.input_type
20
21
  class AuthBackendRoleTagArgs:
21
22
  def __init__(__self__, *,
22
- role: pulumi.Input[str],
23
- allow_instance_migration: Optional[pulumi.Input[bool]] = None,
24
- backend: Optional[pulumi.Input[str]] = None,
25
- disallow_reauthentication: Optional[pulumi.Input[bool]] = None,
26
- instance_id: Optional[pulumi.Input[str]] = None,
27
- max_ttl: Optional[pulumi.Input[str]] = None,
28
- namespace: Optional[pulumi.Input[str]] = None,
29
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
23
+ role: pulumi.Input[builtins.str],
24
+ allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
25
+ backend: Optional[pulumi.Input[builtins.str]] = None,
26
+ disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
27
+ instance_id: Optional[pulumi.Input[builtins.str]] = None,
28
+ max_ttl: Optional[pulumi.Input[builtins.str]] = None,
29
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
30
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None):
30
31
  """
31
32
  The set of arguments for constructing a AuthBackendRoleTag resource.
32
- :param pulumi.Input[str] role: The name of the AWS auth backend role to read
33
+ :param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
33
34
  role tags from, with no leading or trailing `/`s.
34
- :param pulumi.Input[bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
35
- :param pulumi.Input[str] backend: The path to the AWS auth backend to
35
+ :param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
36
+ :param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
36
37
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
37
- :param pulumi.Input[bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
38
- :param pulumi.Input[str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
39
- :param pulumi.Input[str] max_ttl: The maximum TTL of the tokens issued using this role.
40
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
38
+ :param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
39
+ :param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
40
+ :param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
41
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
41
42
  The value should not contain leading or trailing forward slashes.
42
43
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
43
44
  *Available only for Vault Enterprise*.
44
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
45
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
45
46
  """
46
47
  pulumi.set(__self__, "role", role)
47
48
  if allow_instance_migration is not None:
@@ -61,7 +62,7 @@ class AuthBackendRoleTagArgs:
61
62
 
62
63
  @property
63
64
  @pulumi.getter
64
- def role(self) -> pulumi.Input[str]:
65
+ def role(self) -> pulumi.Input[builtins.str]:
65
66
  """
66
67
  The name of the AWS auth backend role to read
67
68
  role tags from, with no leading or trailing `/`s.
@@ -69,24 +70,24 @@ class AuthBackendRoleTagArgs:
69
70
  return pulumi.get(self, "role")
70
71
 
71
72
  @role.setter
72
- def role(self, value: pulumi.Input[str]):
73
+ def role(self, value: pulumi.Input[builtins.str]):
73
74
  pulumi.set(self, "role", value)
74
75
 
75
76
  @property
76
77
  @pulumi.getter(name="allowInstanceMigration")
77
- def allow_instance_migration(self) -> Optional[pulumi.Input[bool]]:
78
+ def allow_instance_migration(self) -> Optional[pulumi.Input[builtins.bool]]:
78
79
  """
79
80
  If set, allows migration of the underlying instances where the client resides. Use with caution.
80
81
  """
81
82
  return pulumi.get(self, "allow_instance_migration")
82
83
 
83
84
  @allow_instance_migration.setter
84
- def allow_instance_migration(self, value: Optional[pulumi.Input[bool]]):
85
+ def allow_instance_migration(self, value: Optional[pulumi.Input[builtins.bool]]):
85
86
  pulumi.set(self, "allow_instance_migration", value)
86
87
 
87
88
  @property
88
89
  @pulumi.getter
89
- def backend(self) -> Optional[pulumi.Input[str]]:
90
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
90
91
  """
91
92
  The path to the AWS auth backend to
92
93
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
@@ -94,48 +95,48 @@ class AuthBackendRoleTagArgs:
94
95
  return pulumi.get(self, "backend")
95
96
 
96
97
  @backend.setter
97
- def backend(self, value: Optional[pulumi.Input[str]]):
98
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
98
99
  pulumi.set(self, "backend", value)
99
100
 
100
101
  @property
101
102
  @pulumi.getter(name="disallowReauthentication")
102
- def disallow_reauthentication(self) -> Optional[pulumi.Input[bool]]:
103
+ def disallow_reauthentication(self) -> Optional[pulumi.Input[builtins.bool]]:
103
104
  """
104
105
  If set, only allows a single token to be granted per instance ID.
105
106
  """
106
107
  return pulumi.get(self, "disallow_reauthentication")
107
108
 
108
109
  @disallow_reauthentication.setter
109
- def disallow_reauthentication(self, value: Optional[pulumi.Input[bool]]):
110
+ def disallow_reauthentication(self, value: Optional[pulumi.Input[builtins.bool]]):
110
111
  pulumi.set(self, "disallow_reauthentication", value)
111
112
 
112
113
  @property
113
114
  @pulumi.getter(name="instanceId")
114
- def instance_id(self) -> Optional[pulumi.Input[str]]:
115
+ def instance_id(self) -> Optional[pulumi.Input[builtins.str]]:
115
116
  """
116
117
  Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
117
118
  """
118
119
  return pulumi.get(self, "instance_id")
119
120
 
120
121
  @instance_id.setter
121
- def instance_id(self, value: Optional[pulumi.Input[str]]):
122
+ def instance_id(self, value: Optional[pulumi.Input[builtins.str]]):
122
123
  pulumi.set(self, "instance_id", value)
123
124
 
124
125
  @property
125
126
  @pulumi.getter(name="maxTtl")
126
- def max_ttl(self) -> Optional[pulumi.Input[str]]:
127
+ def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
127
128
  """
128
129
  The maximum TTL of the tokens issued using this role.
129
130
  """
130
131
  return pulumi.get(self, "max_ttl")
131
132
 
132
133
  @max_ttl.setter
133
- def max_ttl(self, value: Optional[pulumi.Input[str]]):
134
+ def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
134
135
  pulumi.set(self, "max_ttl", value)
135
136
 
136
137
  @property
137
138
  @pulumi.getter
138
- def namespace(self) -> Optional[pulumi.Input[str]]:
139
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
139
140
  """
140
141
  The namespace to provision the resource in.
141
142
  The value should not contain leading or trailing forward slashes.
@@ -145,52 +146,52 @@ class AuthBackendRoleTagArgs:
145
146
  return pulumi.get(self, "namespace")
146
147
 
147
148
  @namespace.setter
148
- def namespace(self, value: Optional[pulumi.Input[str]]):
149
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
149
150
  pulumi.set(self, "namespace", value)
150
151
 
151
152
  @property
152
153
  @pulumi.getter
153
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
154
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
154
155
  """
155
156
  The policies to be associated with the tag. Must be a subset of the policies associated with the role.
156
157
  """
157
158
  return pulumi.get(self, "policies")
158
159
 
159
160
  @policies.setter
160
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
161
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
161
162
  pulumi.set(self, "policies", value)
162
163
 
163
164
 
164
165
  @pulumi.input_type
165
166
  class _AuthBackendRoleTagState:
166
167
  def __init__(__self__, *,
167
- allow_instance_migration: Optional[pulumi.Input[bool]] = None,
168
- backend: Optional[pulumi.Input[str]] = None,
169
- disallow_reauthentication: Optional[pulumi.Input[bool]] = None,
170
- instance_id: Optional[pulumi.Input[str]] = None,
171
- max_ttl: Optional[pulumi.Input[str]] = None,
172
- namespace: Optional[pulumi.Input[str]] = None,
173
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
174
- role: Optional[pulumi.Input[str]] = None,
175
- tag_key: Optional[pulumi.Input[str]] = None,
176
- tag_value: Optional[pulumi.Input[str]] = None):
168
+ allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
169
+ backend: Optional[pulumi.Input[builtins.str]] = None,
170
+ disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
171
+ instance_id: Optional[pulumi.Input[builtins.str]] = None,
172
+ max_ttl: Optional[pulumi.Input[builtins.str]] = None,
173
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
174
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
175
+ role: Optional[pulumi.Input[builtins.str]] = None,
176
+ tag_key: Optional[pulumi.Input[builtins.str]] = None,
177
+ tag_value: Optional[pulumi.Input[builtins.str]] = None):
177
178
  """
178
179
  Input properties used for looking up and filtering AuthBackendRoleTag resources.
179
- :param pulumi.Input[bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
180
- :param pulumi.Input[str] backend: The path to the AWS auth backend to
180
+ :param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
181
+ :param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
181
182
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
182
- :param pulumi.Input[bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
183
- :param pulumi.Input[str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
184
- :param pulumi.Input[str] max_ttl: The maximum TTL of the tokens issued using this role.
185
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
183
+ :param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
184
+ :param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
185
+ :param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
186
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
186
187
  The value should not contain leading or trailing forward slashes.
187
188
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
188
189
  *Available only for Vault Enterprise*.
189
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
190
- :param pulumi.Input[str] role: The name of the AWS auth backend role to read
190
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
191
+ :param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
191
192
  role tags from, with no leading or trailing `/`s.
192
- :param pulumi.Input[str] tag_key: The key of the role tag.
193
- :param pulumi.Input[str] tag_value: The value to set the role key.
193
+ :param pulumi.Input[builtins.str] tag_key: The key of the role tag.
194
+ :param pulumi.Input[builtins.str] tag_value: The value to set the role key.
194
195
  """
195
196
  if allow_instance_migration is not None:
196
197
  pulumi.set(__self__, "allow_instance_migration", allow_instance_migration)
@@ -215,19 +216,19 @@ class _AuthBackendRoleTagState:
215
216
 
216
217
  @property
217
218
  @pulumi.getter(name="allowInstanceMigration")
218
- def allow_instance_migration(self) -> Optional[pulumi.Input[bool]]:
219
+ def allow_instance_migration(self) -> Optional[pulumi.Input[builtins.bool]]:
219
220
  """
220
221
  If set, allows migration of the underlying instances where the client resides. Use with caution.
221
222
  """
222
223
  return pulumi.get(self, "allow_instance_migration")
223
224
 
224
225
  @allow_instance_migration.setter
225
- def allow_instance_migration(self, value: Optional[pulumi.Input[bool]]):
226
+ def allow_instance_migration(self, value: Optional[pulumi.Input[builtins.bool]]):
226
227
  pulumi.set(self, "allow_instance_migration", value)
227
228
 
228
229
  @property
229
230
  @pulumi.getter
230
- def backend(self) -> Optional[pulumi.Input[str]]:
231
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
231
232
  """
232
233
  The path to the AWS auth backend to
233
234
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
@@ -235,48 +236,48 @@ class _AuthBackendRoleTagState:
235
236
  return pulumi.get(self, "backend")
236
237
 
237
238
  @backend.setter
238
- def backend(self, value: Optional[pulumi.Input[str]]):
239
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
239
240
  pulumi.set(self, "backend", value)
240
241
 
241
242
  @property
242
243
  @pulumi.getter(name="disallowReauthentication")
243
- def disallow_reauthentication(self) -> Optional[pulumi.Input[bool]]:
244
+ def disallow_reauthentication(self) -> Optional[pulumi.Input[builtins.bool]]:
244
245
  """
245
246
  If set, only allows a single token to be granted per instance ID.
246
247
  """
247
248
  return pulumi.get(self, "disallow_reauthentication")
248
249
 
249
250
  @disallow_reauthentication.setter
250
- def disallow_reauthentication(self, value: Optional[pulumi.Input[bool]]):
251
+ def disallow_reauthentication(self, value: Optional[pulumi.Input[builtins.bool]]):
251
252
  pulumi.set(self, "disallow_reauthentication", value)
252
253
 
253
254
  @property
254
255
  @pulumi.getter(name="instanceId")
255
- def instance_id(self) -> Optional[pulumi.Input[str]]:
256
+ def instance_id(self) -> Optional[pulumi.Input[builtins.str]]:
256
257
  """
257
258
  Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
258
259
  """
259
260
  return pulumi.get(self, "instance_id")
260
261
 
261
262
  @instance_id.setter
262
- def instance_id(self, value: Optional[pulumi.Input[str]]):
263
+ def instance_id(self, value: Optional[pulumi.Input[builtins.str]]):
263
264
  pulumi.set(self, "instance_id", value)
264
265
 
265
266
  @property
266
267
  @pulumi.getter(name="maxTtl")
267
- def max_ttl(self) -> Optional[pulumi.Input[str]]:
268
+ def max_ttl(self) -> Optional[pulumi.Input[builtins.str]]:
268
269
  """
269
270
  The maximum TTL of the tokens issued using this role.
270
271
  """
271
272
  return pulumi.get(self, "max_ttl")
272
273
 
273
274
  @max_ttl.setter
274
- def max_ttl(self, value: Optional[pulumi.Input[str]]):
275
+ def max_ttl(self, value: Optional[pulumi.Input[builtins.str]]):
275
276
  pulumi.set(self, "max_ttl", value)
276
277
 
277
278
  @property
278
279
  @pulumi.getter
279
- def namespace(self) -> Optional[pulumi.Input[str]]:
280
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
280
281
  """
281
282
  The namespace to provision the resource in.
282
283
  The value should not contain leading or trailing forward slashes.
@@ -286,24 +287,24 @@ class _AuthBackendRoleTagState:
286
287
  return pulumi.get(self, "namespace")
287
288
 
288
289
  @namespace.setter
289
- def namespace(self, value: Optional[pulumi.Input[str]]):
290
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
290
291
  pulumi.set(self, "namespace", value)
291
292
 
292
293
  @property
293
294
  @pulumi.getter
294
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
295
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
295
296
  """
296
297
  The policies to be associated with the tag. Must be a subset of the policies associated with the role.
297
298
  """
298
299
  return pulumi.get(self, "policies")
299
300
 
300
301
  @policies.setter
301
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
302
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
302
303
  pulumi.set(self, "policies", value)
303
304
 
304
305
  @property
305
306
  @pulumi.getter
306
- def role(self) -> Optional[pulumi.Input[str]]:
307
+ def role(self) -> Optional[pulumi.Input[builtins.str]]:
307
308
  """
308
309
  The name of the AWS auth backend role to read
309
310
  role tags from, with no leading or trailing `/`s.
@@ -311,31 +312,31 @@ class _AuthBackendRoleTagState:
311
312
  return pulumi.get(self, "role")
312
313
 
313
314
  @role.setter
314
- def role(self, value: Optional[pulumi.Input[str]]):
315
+ def role(self, value: Optional[pulumi.Input[builtins.str]]):
315
316
  pulumi.set(self, "role", value)
316
317
 
317
318
  @property
318
319
  @pulumi.getter(name="tagKey")
319
- def tag_key(self) -> Optional[pulumi.Input[str]]:
320
+ def tag_key(self) -> Optional[pulumi.Input[builtins.str]]:
320
321
  """
321
322
  The key of the role tag.
322
323
  """
323
324
  return pulumi.get(self, "tag_key")
324
325
 
325
326
  @tag_key.setter
326
- def tag_key(self, value: Optional[pulumi.Input[str]]):
327
+ def tag_key(self, value: Optional[pulumi.Input[builtins.str]]):
327
328
  pulumi.set(self, "tag_key", value)
328
329
 
329
330
  @property
330
331
  @pulumi.getter(name="tagValue")
331
- def tag_value(self) -> Optional[pulumi.Input[str]]:
332
+ def tag_value(self) -> Optional[pulumi.Input[builtins.str]]:
332
333
  """
333
334
  The value to set the role key.
334
335
  """
335
336
  return pulumi.get(self, "tag_value")
336
337
 
337
338
  @tag_value.setter
338
- def tag_value(self, value: Optional[pulumi.Input[str]]):
339
+ def tag_value(self, value: Optional[pulumi.Input[builtins.str]]):
339
340
  pulumi.set(self, "tag_value", value)
340
341
 
341
342
 
@@ -344,32 +345,32 @@ class AuthBackendRoleTag(pulumi.CustomResource):
344
345
  def __init__(__self__,
345
346
  resource_name: str,
346
347
  opts: Optional[pulumi.ResourceOptions] = None,
347
- allow_instance_migration: Optional[pulumi.Input[bool]] = None,
348
- backend: Optional[pulumi.Input[str]] = None,
349
- disallow_reauthentication: Optional[pulumi.Input[bool]] = None,
350
- instance_id: Optional[pulumi.Input[str]] = None,
351
- max_ttl: Optional[pulumi.Input[str]] = None,
352
- namespace: Optional[pulumi.Input[str]] = None,
353
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
354
- role: Optional[pulumi.Input[str]] = None,
348
+ allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
349
+ backend: Optional[pulumi.Input[builtins.str]] = None,
350
+ disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
351
+ instance_id: Optional[pulumi.Input[builtins.str]] = None,
352
+ max_ttl: Optional[pulumi.Input[builtins.str]] = None,
353
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
354
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
355
+ role: Optional[pulumi.Input[builtins.str]] = None,
355
356
  __props__=None):
356
357
  """
357
358
  Reads role tag information from an AWS auth backend in Vault.
358
359
 
359
360
  :param str resource_name: The name of the resource.
360
361
  :param pulumi.ResourceOptions opts: Options for the resource.
361
- :param pulumi.Input[bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
362
- :param pulumi.Input[str] backend: The path to the AWS auth backend to
362
+ :param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
363
+ :param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
363
364
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
364
- :param pulumi.Input[bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
365
- :param pulumi.Input[str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
366
- :param pulumi.Input[str] max_ttl: The maximum TTL of the tokens issued using this role.
367
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
365
+ :param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
366
+ :param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
367
+ :param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
368
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
368
369
  The value should not contain leading or trailing forward slashes.
369
370
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
370
371
  *Available only for Vault Enterprise*.
371
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
372
- :param pulumi.Input[str] role: The name of the AWS auth backend role to read
372
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
373
+ :param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
373
374
  role tags from, with no leading or trailing `/`s.
374
375
  """
375
376
  ...
@@ -396,14 +397,14 @@ class AuthBackendRoleTag(pulumi.CustomResource):
396
397
  def _internal_init(__self__,
397
398
  resource_name: str,
398
399
  opts: Optional[pulumi.ResourceOptions] = None,
399
- allow_instance_migration: Optional[pulumi.Input[bool]] = None,
400
- backend: Optional[pulumi.Input[str]] = None,
401
- disallow_reauthentication: Optional[pulumi.Input[bool]] = None,
402
- instance_id: Optional[pulumi.Input[str]] = None,
403
- max_ttl: Optional[pulumi.Input[str]] = None,
404
- namespace: Optional[pulumi.Input[str]] = None,
405
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
406
- role: Optional[pulumi.Input[str]] = None,
400
+ allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
401
+ backend: Optional[pulumi.Input[builtins.str]] = None,
402
+ disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
403
+ instance_id: Optional[pulumi.Input[builtins.str]] = None,
404
+ max_ttl: Optional[pulumi.Input[builtins.str]] = None,
405
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
406
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
407
+ role: Optional[pulumi.Input[builtins.str]] = None,
407
408
  __props__=None):
408
409
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
409
410
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -435,16 +436,16 @@ class AuthBackendRoleTag(pulumi.CustomResource):
435
436
  def get(resource_name: str,
436
437
  id: pulumi.Input[str],
437
438
  opts: Optional[pulumi.ResourceOptions] = None,
438
- allow_instance_migration: Optional[pulumi.Input[bool]] = None,
439
- backend: Optional[pulumi.Input[str]] = None,
440
- disallow_reauthentication: Optional[pulumi.Input[bool]] = None,
441
- instance_id: Optional[pulumi.Input[str]] = None,
442
- max_ttl: Optional[pulumi.Input[str]] = None,
443
- namespace: Optional[pulumi.Input[str]] = None,
444
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
445
- role: Optional[pulumi.Input[str]] = None,
446
- tag_key: Optional[pulumi.Input[str]] = None,
447
- tag_value: Optional[pulumi.Input[str]] = None) -> 'AuthBackendRoleTag':
439
+ allow_instance_migration: Optional[pulumi.Input[builtins.bool]] = None,
440
+ backend: Optional[pulumi.Input[builtins.str]] = None,
441
+ disallow_reauthentication: Optional[pulumi.Input[builtins.bool]] = None,
442
+ instance_id: Optional[pulumi.Input[builtins.str]] = None,
443
+ max_ttl: Optional[pulumi.Input[builtins.str]] = None,
444
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
445
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
446
+ role: Optional[pulumi.Input[builtins.str]] = None,
447
+ tag_key: Optional[pulumi.Input[builtins.str]] = None,
448
+ tag_value: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendRoleTag':
448
449
  """
449
450
  Get an existing AuthBackendRoleTag resource's state with the given name, id, and optional extra
450
451
  properties used to qualify the lookup.
@@ -452,21 +453,21 @@ class AuthBackendRoleTag(pulumi.CustomResource):
452
453
  :param str resource_name: The unique name of the resulting resource.
453
454
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
454
455
  :param pulumi.ResourceOptions opts: Options for the resource.
455
- :param pulumi.Input[bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
456
- :param pulumi.Input[str] backend: The path to the AWS auth backend to
456
+ :param pulumi.Input[builtins.bool] allow_instance_migration: If set, allows migration of the underlying instances where the client resides. Use with caution.
457
+ :param pulumi.Input[builtins.str] backend: The path to the AWS auth backend to
457
458
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
458
- :param pulumi.Input[bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
459
- :param pulumi.Input[str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
460
- :param pulumi.Input[str] max_ttl: The maximum TTL of the tokens issued using this role.
461
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
459
+ :param pulumi.Input[builtins.bool] disallow_reauthentication: If set, only allows a single token to be granted per instance ID.
460
+ :param pulumi.Input[builtins.str] instance_id: Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
461
+ :param pulumi.Input[builtins.str] max_ttl: The maximum TTL of the tokens issued using this role.
462
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
462
463
  The value should not contain leading or trailing forward slashes.
463
464
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
464
465
  *Available only for Vault Enterprise*.
465
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
466
- :param pulumi.Input[str] role: The name of the AWS auth backend role to read
466
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The policies to be associated with the tag. Must be a subset of the policies associated with the role.
467
+ :param pulumi.Input[builtins.str] role: The name of the AWS auth backend role to read
467
468
  role tags from, with no leading or trailing `/`s.
468
- :param pulumi.Input[str] tag_key: The key of the role tag.
469
- :param pulumi.Input[str] tag_value: The value to set the role key.
469
+ :param pulumi.Input[builtins.str] tag_key: The key of the role tag.
470
+ :param pulumi.Input[builtins.str] tag_value: The value to set the role key.
470
471
  """
471
472
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
472
473
 
@@ -486,7 +487,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
486
487
 
487
488
  @property
488
489
  @pulumi.getter(name="allowInstanceMigration")
489
- def allow_instance_migration(self) -> pulumi.Output[Optional[bool]]:
490
+ def allow_instance_migration(self) -> pulumi.Output[Optional[builtins.bool]]:
490
491
  """
491
492
  If set, allows migration of the underlying instances where the client resides. Use with caution.
492
493
  """
@@ -494,7 +495,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
494
495
 
495
496
  @property
496
497
  @pulumi.getter
497
- def backend(self) -> pulumi.Output[Optional[str]]:
498
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
498
499
  """
499
500
  The path to the AWS auth backend to
500
501
  read role tags from, with no leading or trailing `/`s. Defaults to "aws".
@@ -503,7 +504,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
503
504
 
504
505
  @property
505
506
  @pulumi.getter(name="disallowReauthentication")
506
- def disallow_reauthentication(self) -> pulumi.Output[Optional[bool]]:
507
+ def disallow_reauthentication(self) -> pulumi.Output[Optional[builtins.bool]]:
507
508
  """
508
509
  If set, only allows a single token to be granted per instance ID.
509
510
  """
@@ -511,7 +512,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
511
512
 
512
513
  @property
513
514
  @pulumi.getter(name="instanceId")
514
- def instance_id(self) -> pulumi.Output[Optional[str]]:
515
+ def instance_id(self) -> pulumi.Output[Optional[builtins.str]]:
515
516
  """
516
517
  Instance ID for which this tag is intended for. If set, the created tag can only be used by the instance with the given ID.
517
518
  """
@@ -519,7 +520,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
519
520
 
520
521
  @property
521
522
  @pulumi.getter(name="maxTtl")
522
- def max_ttl(self) -> pulumi.Output[Optional[str]]:
523
+ def max_ttl(self) -> pulumi.Output[Optional[builtins.str]]:
523
524
  """
524
525
  The maximum TTL of the tokens issued using this role.
525
526
  """
@@ -527,7 +528,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
527
528
 
528
529
  @property
529
530
  @pulumi.getter
530
- def namespace(self) -> pulumi.Output[Optional[str]]:
531
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
531
532
  """
532
533
  The namespace to provision the resource in.
533
534
  The value should not contain leading or trailing forward slashes.
@@ -538,7 +539,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
538
539
 
539
540
  @property
540
541
  @pulumi.getter
541
- def policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
542
+ def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
542
543
  """
543
544
  The policies to be associated with the tag. Must be a subset of the policies associated with the role.
544
545
  """
@@ -546,7 +547,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
546
547
 
547
548
  @property
548
549
  @pulumi.getter
549
- def role(self) -> pulumi.Output[str]:
550
+ def role(self) -> pulumi.Output[builtins.str]:
550
551
  """
551
552
  The name of the AWS auth backend role to read
552
553
  role tags from, with no leading or trailing `/`s.
@@ -555,7 +556,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
555
556
 
556
557
  @property
557
558
  @pulumi.getter(name="tagKey")
558
- def tag_key(self) -> pulumi.Output[str]:
559
+ def tag_key(self) -> pulumi.Output[builtins.str]:
559
560
  """
560
561
  The key of the role tag.
561
562
  """
@@ -563,7 +564,7 @@ class AuthBackendRoleTag(pulumi.CustomResource):
563
564
 
564
565
  @property
565
566
  @pulumi.getter(name="tagValue")
566
- def tag_value(self) -> pulumi.Output[str]:
567
+ def tag_value(self) -> pulumi.Output[builtins.str]:
567
568
  """
568
569
  The value to set the role key.
569
570
  """