pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,21 +20,21 @@ __all__ = ['AuthBackendRoletagBlacklistArgs', 'AuthBackendRoletagBlacklist']
19
20
  @pulumi.input_type
20
21
  class AuthBackendRoletagBlacklistArgs:
21
22
  def __init__(__self__, *,
22
- backend: pulumi.Input[str],
23
- disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
24
- namespace: Optional[pulumi.Input[str]] = None,
25
- safety_buffer: Optional[pulumi.Input[int]] = None):
23
+ backend: pulumi.Input[builtins.str],
24
+ disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
25
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
26
+ safety_buffer: Optional[pulumi.Input[builtins.int]] = None):
26
27
  """
27
28
  The set of arguments for constructing a AuthBackendRoletagBlacklist resource.
28
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
29
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
29
30
  mounted at.
30
- :param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
31
+ :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
31
32
  tidying of the roletag blacklist entries. Defaults to false.
32
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
33
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
33
34
  The value should not contain leading or trailing forward slashes.
34
35
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
35
36
  *Available only for Vault Enterprise*.
36
- :param pulumi.Input[int] safety_buffer: The amount of extra time that must have passed
37
+ :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
37
38
  beyond the roletag expiration, before it is removed from the backend storage.
38
39
  Defaults to 259,200 seconds, or 72 hours.
39
40
  """
@@ -47,7 +48,7 @@ class AuthBackendRoletagBlacklistArgs:
47
48
 
48
49
  @property
49
50
  @pulumi.getter
50
- def backend(self) -> pulumi.Input[str]:
51
+ def backend(self) -> pulumi.Input[builtins.str]:
51
52
  """
52
53
  The path the AWS auth backend being configured was
53
54
  mounted at.
@@ -55,12 +56,12 @@ class AuthBackendRoletagBlacklistArgs:
55
56
  return pulumi.get(self, "backend")
56
57
 
57
58
  @backend.setter
58
- def backend(self, value: pulumi.Input[str]):
59
+ def backend(self, value: pulumi.Input[builtins.str]):
59
60
  pulumi.set(self, "backend", value)
60
61
 
61
62
  @property
62
63
  @pulumi.getter(name="disablePeriodicTidy")
63
- def disable_periodic_tidy(self) -> Optional[pulumi.Input[bool]]:
64
+ def disable_periodic_tidy(self) -> Optional[pulumi.Input[builtins.bool]]:
64
65
  """
65
66
  If set to true, disables the periodic
66
67
  tidying of the roletag blacklist entries. Defaults to false.
@@ -68,12 +69,12 @@ class AuthBackendRoletagBlacklistArgs:
68
69
  return pulumi.get(self, "disable_periodic_tidy")
69
70
 
70
71
  @disable_periodic_tidy.setter
71
- def disable_periodic_tidy(self, value: Optional[pulumi.Input[bool]]):
72
+ def disable_periodic_tidy(self, value: Optional[pulumi.Input[builtins.bool]]):
72
73
  pulumi.set(self, "disable_periodic_tidy", value)
73
74
 
74
75
  @property
75
76
  @pulumi.getter
76
- def namespace(self) -> Optional[pulumi.Input[str]]:
77
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
77
78
  """
78
79
  The namespace to provision the resource in.
79
80
  The value should not contain leading or trailing forward slashes.
@@ -83,12 +84,12 @@ class AuthBackendRoletagBlacklistArgs:
83
84
  return pulumi.get(self, "namespace")
84
85
 
85
86
  @namespace.setter
86
- def namespace(self, value: Optional[pulumi.Input[str]]):
87
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
87
88
  pulumi.set(self, "namespace", value)
88
89
 
89
90
  @property
90
91
  @pulumi.getter(name="safetyBuffer")
91
- def safety_buffer(self) -> Optional[pulumi.Input[int]]:
92
+ def safety_buffer(self) -> Optional[pulumi.Input[builtins.int]]:
92
93
  """
93
94
  The amount of extra time that must have passed
94
95
  beyond the roletag expiration, before it is removed from the backend storage.
@@ -97,28 +98,28 @@ class AuthBackendRoletagBlacklistArgs:
97
98
  return pulumi.get(self, "safety_buffer")
98
99
 
99
100
  @safety_buffer.setter
100
- def safety_buffer(self, value: Optional[pulumi.Input[int]]):
101
+ def safety_buffer(self, value: Optional[pulumi.Input[builtins.int]]):
101
102
  pulumi.set(self, "safety_buffer", value)
102
103
 
103
104
 
104
105
  @pulumi.input_type
105
106
  class _AuthBackendRoletagBlacklistState:
106
107
  def __init__(__self__, *,
107
- backend: Optional[pulumi.Input[str]] = None,
108
- disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
109
- namespace: Optional[pulumi.Input[str]] = None,
110
- safety_buffer: Optional[pulumi.Input[int]] = None):
108
+ backend: Optional[pulumi.Input[builtins.str]] = None,
109
+ disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
110
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
111
+ safety_buffer: Optional[pulumi.Input[builtins.int]] = None):
111
112
  """
112
113
  Input properties used for looking up and filtering AuthBackendRoletagBlacklist resources.
113
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
114
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
114
115
  mounted at.
115
- :param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
116
+ :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
116
117
  tidying of the roletag blacklist entries. Defaults to false.
117
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
118
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
118
119
  The value should not contain leading or trailing forward slashes.
119
120
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
120
121
  *Available only for Vault Enterprise*.
121
- :param pulumi.Input[int] safety_buffer: The amount of extra time that must have passed
122
+ :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
122
123
  beyond the roletag expiration, before it is removed from the backend storage.
123
124
  Defaults to 259,200 seconds, or 72 hours.
124
125
  """
@@ -133,7 +134,7 @@ class _AuthBackendRoletagBlacklistState:
133
134
 
134
135
  @property
135
136
  @pulumi.getter
136
- def backend(self) -> Optional[pulumi.Input[str]]:
137
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
137
138
  """
138
139
  The path the AWS auth backend being configured was
139
140
  mounted at.
@@ -141,12 +142,12 @@ class _AuthBackendRoletagBlacklistState:
141
142
  return pulumi.get(self, "backend")
142
143
 
143
144
  @backend.setter
144
- def backend(self, value: Optional[pulumi.Input[str]]):
145
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
145
146
  pulumi.set(self, "backend", value)
146
147
 
147
148
  @property
148
149
  @pulumi.getter(name="disablePeriodicTidy")
149
- def disable_periodic_tidy(self) -> Optional[pulumi.Input[bool]]:
150
+ def disable_periodic_tidy(self) -> Optional[pulumi.Input[builtins.bool]]:
150
151
  """
151
152
  If set to true, disables the periodic
152
153
  tidying of the roletag blacklist entries. Defaults to false.
@@ -154,12 +155,12 @@ class _AuthBackendRoletagBlacklistState:
154
155
  return pulumi.get(self, "disable_periodic_tidy")
155
156
 
156
157
  @disable_periodic_tidy.setter
157
- def disable_periodic_tidy(self, value: Optional[pulumi.Input[bool]]):
158
+ def disable_periodic_tidy(self, value: Optional[pulumi.Input[builtins.bool]]):
158
159
  pulumi.set(self, "disable_periodic_tidy", value)
159
160
 
160
161
  @property
161
162
  @pulumi.getter
162
- def namespace(self) -> Optional[pulumi.Input[str]]:
163
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
163
164
  """
164
165
  The namespace to provision the resource in.
165
166
  The value should not contain leading or trailing forward slashes.
@@ -169,12 +170,12 @@ class _AuthBackendRoletagBlacklistState:
169
170
  return pulumi.get(self, "namespace")
170
171
 
171
172
  @namespace.setter
172
- def namespace(self, value: Optional[pulumi.Input[str]]):
173
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
173
174
  pulumi.set(self, "namespace", value)
174
175
 
175
176
  @property
176
177
  @pulumi.getter(name="safetyBuffer")
177
- def safety_buffer(self) -> Optional[pulumi.Input[int]]:
178
+ def safety_buffer(self) -> Optional[pulumi.Input[builtins.int]]:
178
179
  """
179
180
  The amount of extra time that must have passed
180
181
  beyond the roletag expiration, before it is removed from the backend storage.
@@ -183,7 +184,7 @@ class _AuthBackendRoletagBlacklistState:
183
184
  return pulumi.get(self, "safety_buffer")
184
185
 
185
186
  @safety_buffer.setter
186
- def safety_buffer(self, value: Optional[pulumi.Input[int]]):
187
+ def safety_buffer(self, value: Optional[pulumi.Input[builtins.int]]):
187
188
  pulumi.set(self, "safety_buffer", value)
188
189
 
189
190
 
@@ -192,10 +193,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
192
193
  def __init__(__self__,
193
194
  resource_name: str,
194
195
  opts: Optional[pulumi.ResourceOptions] = None,
195
- backend: Optional[pulumi.Input[str]] = None,
196
- disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
197
- namespace: Optional[pulumi.Input[str]] = None,
198
- safety_buffer: Optional[pulumi.Input[int]] = None,
196
+ backend: Optional[pulumi.Input[builtins.str]] = None,
197
+ disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
198
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
199
+ safety_buffer: Optional[pulumi.Input[builtins.int]] = None,
199
200
  __props__=None):
200
201
  """
201
202
  Configures the periodic tidying operation of the blacklisted role tag entries.
@@ -214,15 +215,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
214
215
 
215
216
  :param str resource_name: The name of the resource.
216
217
  :param pulumi.ResourceOptions opts: Options for the resource.
217
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
218
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
218
219
  mounted at.
219
- :param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
220
+ :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
220
221
  tidying of the roletag blacklist entries. Defaults to false.
221
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
222
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
222
223
  The value should not contain leading or trailing forward slashes.
223
224
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
224
225
  *Available only for Vault Enterprise*.
225
- :param pulumi.Input[int] safety_buffer: The amount of extra time that must have passed
226
+ :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
226
227
  beyond the roletag expiration, before it is removed from the backend storage.
227
228
  Defaults to 259,200 seconds, or 72 hours.
228
229
  """
@@ -262,10 +263,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
262
263
  def _internal_init(__self__,
263
264
  resource_name: str,
264
265
  opts: Optional[pulumi.ResourceOptions] = None,
265
- backend: Optional[pulumi.Input[str]] = None,
266
- disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
267
- namespace: Optional[pulumi.Input[str]] = None,
268
- safety_buffer: Optional[pulumi.Input[int]] = None,
266
+ backend: Optional[pulumi.Input[builtins.str]] = None,
267
+ disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
268
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
269
+ safety_buffer: Optional[pulumi.Input[builtins.int]] = None,
269
270
  __props__=None):
270
271
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
271
272
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -291,10 +292,10 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
291
292
  def get(resource_name: str,
292
293
  id: pulumi.Input[str],
293
294
  opts: Optional[pulumi.ResourceOptions] = None,
294
- backend: Optional[pulumi.Input[str]] = None,
295
- disable_periodic_tidy: Optional[pulumi.Input[bool]] = None,
296
- namespace: Optional[pulumi.Input[str]] = None,
297
- safety_buffer: Optional[pulumi.Input[int]] = None) -> 'AuthBackendRoletagBlacklist':
295
+ backend: Optional[pulumi.Input[builtins.str]] = None,
296
+ disable_periodic_tidy: Optional[pulumi.Input[builtins.bool]] = None,
297
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
298
+ safety_buffer: Optional[pulumi.Input[builtins.int]] = None) -> 'AuthBackendRoletagBlacklist':
298
299
  """
299
300
  Get an existing AuthBackendRoletagBlacklist resource's state with the given name, id, and optional extra
300
301
  properties used to qualify the lookup.
@@ -302,15 +303,15 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
302
303
  :param str resource_name: The unique name of the resulting resource.
303
304
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
304
305
  :param pulumi.ResourceOptions opts: Options for the resource.
305
- :param pulumi.Input[str] backend: The path the AWS auth backend being configured was
306
+ :param pulumi.Input[builtins.str] backend: The path the AWS auth backend being configured was
306
307
  mounted at.
307
- :param pulumi.Input[bool] disable_periodic_tidy: If set to true, disables the periodic
308
+ :param pulumi.Input[builtins.bool] disable_periodic_tidy: If set to true, disables the periodic
308
309
  tidying of the roletag blacklist entries. Defaults to false.
309
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
310
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
310
311
  The value should not contain leading or trailing forward slashes.
311
312
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
312
313
  *Available only for Vault Enterprise*.
313
- :param pulumi.Input[int] safety_buffer: The amount of extra time that must have passed
314
+ :param pulumi.Input[builtins.int] safety_buffer: The amount of extra time that must have passed
314
315
  beyond the roletag expiration, before it is removed from the backend storage.
315
316
  Defaults to 259,200 seconds, or 72 hours.
316
317
  """
@@ -326,7 +327,7 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
326
327
 
327
328
  @property
328
329
  @pulumi.getter
329
- def backend(self) -> pulumi.Output[str]:
330
+ def backend(self) -> pulumi.Output[builtins.str]:
330
331
  """
331
332
  The path the AWS auth backend being configured was
332
333
  mounted at.
@@ -335,7 +336,7 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
335
336
 
336
337
  @property
337
338
  @pulumi.getter(name="disablePeriodicTidy")
338
- def disable_periodic_tidy(self) -> pulumi.Output[Optional[bool]]:
339
+ def disable_periodic_tidy(self) -> pulumi.Output[Optional[builtins.bool]]:
339
340
  """
340
341
  If set to true, disables the periodic
341
342
  tidying of the roletag blacklist entries. Defaults to false.
@@ -344,7 +345,7 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
344
345
 
345
346
  @property
346
347
  @pulumi.getter
347
- def namespace(self) -> pulumi.Output[Optional[str]]:
348
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
348
349
  """
349
350
  The namespace to provision the resource in.
350
351
  The value should not contain leading or trailing forward slashes.
@@ -355,7 +356,7 @@ class AuthBackendRoletagBlacklist(pulumi.CustomResource):
355
356
 
356
357
  @property
357
358
  @pulumi.getter(name="safetyBuffer")
358
- def safety_buffer(self) -> pulumi.Output[Optional[int]]:
359
+ def safety_buffer(self) -> pulumi.Output[Optional[builtins.int]]:
359
360
  """
360
361
  The amount of extra time that must have passed
361
362
  beyond the roletag expiration, before it is removed from the backend storage.