pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,44 +20,44 @@ __all__ = ['SecretBackendRoleArgs', 'SecretBackendRole']
19
20
  @pulumi.input_type
20
21
  class SecretBackendRoleArgs:
21
22
  def __init__(__self__, *,
22
- backend: Optional[pulumi.Input[str]] = None,
23
- consul_namespace: Optional[pulumi.Input[str]] = None,
24
- consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
25
- consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
26
- local: Optional[pulumi.Input[bool]] = None,
27
- max_ttl: Optional[pulumi.Input[int]] = None,
28
- name: Optional[pulumi.Input[str]] = None,
29
- namespace: Optional[pulumi.Input[str]] = None,
30
- node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
31
- partition: Optional[pulumi.Input[str]] = None,
32
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
33
- service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
34
- ttl: Optional[pulumi.Input[int]] = None):
23
+ backend: Optional[pulumi.Input[builtins.str]] = None,
24
+ consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
25
+ consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
+ consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
+ local: Optional[pulumi.Input[builtins.bool]] = None,
28
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
29
+ name: Optional[pulumi.Input[builtins.str]] = None,
30
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
31
+ node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
32
+ partition: Optional[pulumi.Input[builtins.str]] = None,
33
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
34
+ service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
35
+ ttl: Optional[pulumi.Input[builtins.int]] = None):
35
36
  """
36
37
  The set of arguments for constructing a SecretBackendRole resource.
37
- :param pulumi.Input[str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
38
- :param pulumi.Input[str] consul_namespace: The Consul namespace that the token will be created in.
38
+ :param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
39
+ :param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
39
40
  Applicable for Vault 1.10+ and Consul 1.7+".
40
- :param pulumi.Input[Sequence[pulumi.Input[str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
41
- :param pulumi.Input[Sequence[pulumi.Input[str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
41
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
42
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
42
43
  Applicable for Vault 1.10+ with Consul 1.5+.
43
- :param pulumi.Input[bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
44
- :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
45
- :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
46
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
44
+ :param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
45
+ :param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
46
+ :param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
47
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
47
48
  The value should not contain leading or trailing forward slashes.
48
49
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
49
50
  *Available only for Vault Enterprise*.
50
- :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
51
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
51
52
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
52
- :param pulumi.Input[str] partition: The admin partition that the token will be created in.
53
+ :param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
53
54
  Applicable for Vault 1.10+ and Consul 1.11+".
54
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The list of Consul ACL policies to associate with these roles.
55
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
55
56
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
56
57
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
57
- :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
58
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
58
59
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
59
- :param pulumi.Input[int] ttl: Specifies the TTL for this role.
60
+ :param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
60
61
  """
61
62
  if backend is not None:
62
63
  pulumi.set(__self__, "backend", backend)
@@ -87,19 +88,19 @@ class SecretBackendRoleArgs:
87
88
 
88
89
  @property
89
90
  @pulumi.getter
90
- def backend(self) -> Optional[pulumi.Input[str]]:
91
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
91
92
  """
92
93
  The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
93
94
  """
94
95
  return pulumi.get(self, "backend")
95
96
 
96
97
  @backend.setter
97
- def backend(self, value: Optional[pulumi.Input[str]]):
98
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
98
99
  pulumi.set(self, "backend", value)
99
100
 
100
101
  @property
101
102
  @pulumi.getter(name="consulNamespace")
102
- def consul_namespace(self) -> Optional[pulumi.Input[str]]:
103
+ def consul_namespace(self) -> Optional[pulumi.Input[builtins.str]]:
103
104
  """
104
105
  The Consul namespace that the token will be created in.
105
106
  Applicable for Vault 1.10+ and Consul 1.7+".
@@ -107,24 +108,24 @@ class SecretBackendRoleArgs:
107
108
  return pulumi.get(self, "consul_namespace")
108
109
 
109
110
  @consul_namespace.setter
110
- def consul_namespace(self, value: Optional[pulumi.Input[str]]):
111
+ def consul_namespace(self, value: Optional[pulumi.Input[builtins.str]]):
111
112
  pulumi.set(self, "consul_namespace", value)
112
113
 
113
114
  @property
114
115
  @pulumi.getter(name="consulPolicies")
115
- def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
116
+ def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
116
117
  """
117
118
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
118
119
  """
119
120
  return pulumi.get(self, "consul_policies")
120
121
 
121
122
  @consul_policies.setter
122
- def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
123
+ def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
123
124
  pulumi.set(self, "consul_policies", value)
124
125
 
125
126
  @property
126
127
  @pulumi.getter(name="consulRoles")
127
- def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
128
+ def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
128
129
  """
129
130
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
130
131
  Applicable for Vault 1.10+ with Consul 1.5+.
@@ -132,48 +133,48 @@ class SecretBackendRoleArgs:
132
133
  return pulumi.get(self, "consul_roles")
133
134
 
134
135
  @consul_roles.setter
135
- def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
136
+ def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
136
137
  pulumi.set(self, "consul_roles", value)
137
138
 
138
139
  @property
139
140
  @pulumi.getter
140
- def local(self) -> Optional[pulumi.Input[bool]]:
141
+ def local(self) -> Optional[pulumi.Input[builtins.bool]]:
141
142
  """
142
143
  Indicates that the token should not be replicated globally and instead be local to the current datacenter.
143
144
  """
144
145
  return pulumi.get(self, "local")
145
146
 
146
147
  @local.setter
147
- def local(self, value: Optional[pulumi.Input[bool]]):
148
+ def local(self, value: Optional[pulumi.Input[builtins.bool]]):
148
149
  pulumi.set(self, "local", value)
149
150
 
150
151
  @property
151
152
  @pulumi.getter(name="maxTtl")
152
- def max_ttl(self) -> Optional[pulumi.Input[int]]:
153
+ def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
153
154
  """
154
155
  Maximum TTL for leases associated with this role, in seconds.
155
156
  """
156
157
  return pulumi.get(self, "max_ttl")
157
158
 
158
159
  @max_ttl.setter
159
- def max_ttl(self, value: Optional[pulumi.Input[int]]):
160
+ def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
160
161
  pulumi.set(self, "max_ttl", value)
161
162
 
162
163
  @property
163
164
  @pulumi.getter
164
- def name(self) -> Optional[pulumi.Input[str]]:
165
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
165
166
  """
166
167
  The name of the Consul secrets engine role to create.
167
168
  """
168
169
  return pulumi.get(self, "name")
169
170
 
170
171
  @name.setter
171
- def name(self, value: Optional[pulumi.Input[str]]):
172
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
172
173
  pulumi.set(self, "name", value)
173
174
 
174
175
  @property
175
176
  @pulumi.getter
176
- def namespace(self) -> Optional[pulumi.Input[str]]:
177
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
177
178
  """
178
179
  The namespace to provision the resource in.
179
180
  The value should not contain leading or trailing forward slashes.
@@ -183,12 +184,12 @@ class SecretBackendRoleArgs:
183
184
  return pulumi.get(self, "namespace")
184
185
 
185
186
  @namespace.setter
186
- def namespace(self, value: Optional[pulumi.Input[str]]):
187
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
187
188
  pulumi.set(self, "namespace", value)
188
189
 
189
190
  @property
190
191
  @pulumi.getter(name="nodeIdentities")
191
- def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
192
+ def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
192
193
  """
193
194
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
194
195
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -196,12 +197,12 @@ class SecretBackendRoleArgs:
196
197
  return pulumi.get(self, "node_identities")
197
198
 
198
199
  @node_identities.setter
199
- def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
200
+ def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
200
201
  pulumi.set(self, "node_identities", value)
201
202
 
202
203
  @property
203
204
  @pulumi.getter
204
- def partition(self) -> Optional[pulumi.Input[str]]:
205
+ def partition(self) -> Optional[pulumi.Input[builtins.str]]:
205
206
  """
206
207
  The admin partition that the token will be created in.
207
208
  Applicable for Vault 1.10+ and Consul 1.11+".
@@ -209,12 +210,12 @@ class SecretBackendRoleArgs:
209
210
  return pulumi.get(self, "partition")
210
211
 
211
212
  @partition.setter
212
- def partition(self, value: Optional[pulumi.Input[str]]):
213
+ def partition(self, value: Optional[pulumi.Input[builtins.str]]):
213
214
  pulumi.set(self, "partition", value)
214
215
 
215
216
  @property
216
217
  @pulumi.getter
217
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
218
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
218
219
  """
219
220
  The list of Consul ACL policies to associate with these roles.
220
221
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
@@ -223,12 +224,12 @@ class SecretBackendRoleArgs:
223
224
  return pulumi.get(self, "policies")
224
225
 
225
226
  @policies.setter
226
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
227
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
227
228
  pulumi.set(self, "policies", value)
228
229
 
229
230
  @property
230
231
  @pulumi.getter(name="serviceIdentities")
231
- def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
232
+ def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
232
233
  """
233
234
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
234
235
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
@@ -236,63 +237,63 @@ class SecretBackendRoleArgs:
236
237
  return pulumi.get(self, "service_identities")
237
238
 
238
239
  @service_identities.setter
239
- def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
240
+ def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
240
241
  pulumi.set(self, "service_identities", value)
241
242
 
242
243
  @property
243
244
  @pulumi.getter
244
- def ttl(self) -> Optional[pulumi.Input[int]]:
245
+ def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
245
246
  """
246
247
  Specifies the TTL for this role.
247
248
  """
248
249
  return pulumi.get(self, "ttl")
249
250
 
250
251
  @ttl.setter
251
- def ttl(self, value: Optional[pulumi.Input[int]]):
252
+ def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
252
253
  pulumi.set(self, "ttl", value)
253
254
 
254
255
 
255
256
  @pulumi.input_type
256
257
  class _SecretBackendRoleState:
257
258
  def __init__(__self__, *,
258
- backend: Optional[pulumi.Input[str]] = None,
259
- consul_namespace: Optional[pulumi.Input[str]] = None,
260
- consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
261
- consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
262
- local: Optional[pulumi.Input[bool]] = None,
263
- max_ttl: Optional[pulumi.Input[int]] = None,
264
- name: Optional[pulumi.Input[str]] = None,
265
- namespace: Optional[pulumi.Input[str]] = None,
266
- node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
267
- partition: Optional[pulumi.Input[str]] = None,
268
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
269
- service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
270
- ttl: Optional[pulumi.Input[int]] = None):
259
+ backend: Optional[pulumi.Input[builtins.str]] = None,
260
+ consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
261
+ consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
262
+ consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
263
+ local: Optional[pulumi.Input[builtins.bool]] = None,
264
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
265
+ name: Optional[pulumi.Input[builtins.str]] = None,
266
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
267
+ node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
268
+ partition: Optional[pulumi.Input[builtins.str]] = None,
269
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
270
+ service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
271
+ ttl: Optional[pulumi.Input[builtins.int]] = None):
271
272
  """
272
273
  Input properties used for looking up and filtering SecretBackendRole resources.
273
- :param pulumi.Input[str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
274
- :param pulumi.Input[str] consul_namespace: The Consul namespace that the token will be created in.
274
+ :param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
275
+ :param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
275
276
  Applicable for Vault 1.10+ and Consul 1.7+".
276
- :param pulumi.Input[Sequence[pulumi.Input[str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
277
- :param pulumi.Input[Sequence[pulumi.Input[str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
277
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
278
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
278
279
  Applicable for Vault 1.10+ with Consul 1.5+.
279
- :param pulumi.Input[bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
280
- :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
281
- :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
282
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
280
+ :param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
281
+ :param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
282
+ :param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
283
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
283
284
  The value should not contain leading or trailing forward slashes.
284
285
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
285
286
  *Available only for Vault Enterprise*.
286
- :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
287
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
287
288
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
288
- :param pulumi.Input[str] partition: The admin partition that the token will be created in.
289
+ :param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
289
290
  Applicable for Vault 1.10+ and Consul 1.11+".
290
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The list of Consul ACL policies to associate with these roles.
291
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
291
292
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
292
293
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
293
- :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
294
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
294
295
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
295
- :param pulumi.Input[int] ttl: Specifies the TTL for this role.
296
+ :param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
296
297
  """
297
298
  if backend is not None:
298
299
  pulumi.set(__self__, "backend", backend)
@@ -323,19 +324,19 @@ class _SecretBackendRoleState:
323
324
 
324
325
  @property
325
326
  @pulumi.getter
326
- def backend(self) -> Optional[pulumi.Input[str]]:
327
+ def backend(self) -> Optional[pulumi.Input[builtins.str]]:
327
328
  """
328
329
  The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
329
330
  """
330
331
  return pulumi.get(self, "backend")
331
332
 
332
333
  @backend.setter
333
- def backend(self, value: Optional[pulumi.Input[str]]):
334
+ def backend(self, value: Optional[pulumi.Input[builtins.str]]):
334
335
  pulumi.set(self, "backend", value)
335
336
 
336
337
  @property
337
338
  @pulumi.getter(name="consulNamespace")
338
- def consul_namespace(self) -> Optional[pulumi.Input[str]]:
339
+ def consul_namespace(self) -> Optional[pulumi.Input[builtins.str]]:
339
340
  """
340
341
  The Consul namespace that the token will be created in.
341
342
  Applicable for Vault 1.10+ and Consul 1.7+".
@@ -343,24 +344,24 @@ class _SecretBackendRoleState:
343
344
  return pulumi.get(self, "consul_namespace")
344
345
 
345
346
  @consul_namespace.setter
346
- def consul_namespace(self, value: Optional[pulumi.Input[str]]):
347
+ def consul_namespace(self, value: Optional[pulumi.Input[builtins.str]]):
347
348
  pulumi.set(self, "consul_namespace", value)
348
349
 
349
350
  @property
350
351
  @pulumi.getter(name="consulPolicies")
351
- def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
352
+ def consul_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
352
353
  """
353
354
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
354
355
  """
355
356
  return pulumi.get(self, "consul_policies")
356
357
 
357
358
  @consul_policies.setter
358
- def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
359
+ def consul_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
359
360
  pulumi.set(self, "consul_policies", value)
360
361
 
361
362
  @property
362
363
  @pulumi.getter(name="consulRoles")
363
- def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
364
+ def consul_roles(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
364
365
  """
365
366
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
366
367
  Applicable for Vault 1.10+ with Consul 1.5+.
@@ -368,48 +369,48 @@ class _SecretBackendRoleState:
368
369
  return pulumi.get(self, "consul_roles")
369
370
 
370
371
  @consul_roles.setter
371
- def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
372
+ def consul_roles(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
372
373
  pulumi.set(self, "consul_roles", value)
373
374
 
374
375
  @property
375
376
  @pulumi.getter
376
- def local(self) -> Optional[pulumi.Input[bool]]:
377
+ def local(self) -> Optional[pulumi.Input[builtins.bool]]:
377
378
  """
378
379
  Indicates that the token should not be replicated globally and instead be local to the current datacenter.
379
380
  """
380
381
  return pulumi.get(self, "local")
381
382
 
382
383
  @local.setter
383
- def local(self, value: Optional[pulumi.Input[bool]]):
384
+ def local(self, value: Optional[pulumi.Input[builtins.bool]]):
384
385
  pulumi.set(self, "local", value)
385
386
 
386
387
  @property
387
388
  @pulumi.getter(name="maxTtl")
388
- def max_ttl(self) -> Optional[pulumi.Input[int]]:
389
+ def max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
389
390
  """
390
391
  Maximum TTL for leases associated with this role, in seconds.
391
392
  """
392
393
  return pulumi.get(self, "max_ttl")
393
394
 
394
395
  @max_ttl.setter
395
- def max_ttl(self, value: Optional[pulumi.Input[int]]):
396
+ def max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
396
397
  pulumi.set(self, "max_ttl", value)
397
398
 
398
399
  @property
399
400
  @pulumi.getter
400
- def name(self) -> Optional[pulumi.Input[str]]:
401
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
401
402
  """
402
403
  The name of the Consul secrets engine role to create.
403
404
  """
404
405
  return pulumi.get(self, "name")
405
406
 
406
407
  @name.setter
407
- def name(self, value: Optional[pulumi.Input[str]]):
408
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
408
409
  pulumi.set(self, "name", value)
409
410
 
410
411
  @property
411
412
  @pulumi.getter
412
- def namespace(self) -> Optional[pulumi.Input[str]]:
413
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
413
414
  """
414
415
  The namespace to provision the resource in.
415
416
  The value should not contain leading or trailing forward slashes.
@@ -419,12 +420,12 @@ class _SecretBackendRoleState:
419
420
  return pulumi.get(self, "namespace")
420
421
 
421
422
  @namespace.setter
422
- def namespace(self, value: Optional[pulumi.Input[str]]):
423
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
423
424
  pulumi.set(self, "namespace", value)
424
425
 
425
426
  @property
426
427
  @pulumi.getter(name="nodeIdentities")
427
- def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
428
+ def node_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
428
429
  """
429
430
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
430
431
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -432,12 +433,12 @@ class _SecretBackendRoleState:
432
433
  return pulumi.get(self, "node_identities")
433
434
 
434
435
  @node_identities.setter
435
- def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
436
+ def node_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
436
437
  pulumi.set(self, "node_identities", value)
437
438
 
438
439
  @property
439
440
  @pulumi.getter
440
- def partition(self) -> Optional[pulumi.Input[str]]:
441
+ def partition(self) -> Optional[pulumi.Input[builtins.str]]:
441
442
  """
442
443
  The admin partition that the token will be created in.
443
444
  Applicable for Vault 1.10+ and Consul 1.11+".
@@ -445,12 +446,12 @@ class _SecretBackendRoleState:
445
446
  return pulumi.get(self, "partition")
446
447
 
447
448
  @partition.setter
448
- def partition(self, value: Optional[pulumi.Input[str]]):
449
+ def partition(self, value: Optional[pulumi.Input[builtins.str]]):
449
450
  pulumi.set(self, "partition", value)
450
451
 
451
452
  @property
452
453
  @pulumi.getter
453
- def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
454
+ def policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
454
455
  """
455
456
  The list of Consul ACL policies to associate with these roles.
456
457
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
@@ -459,12 +460,12 @@ class _SecretBackendRoleState:
459
460
  return pulumi.get(self, "policies")
460
461
 
461
462
  @policies.setter
462
- def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
463
+ def policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
463
464
  pulumi.set(self, "policies", value)
464
465
 
465
466
  @property
466
467
  @pulumi.getter(name="serviceIdentities")
467
- def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
468
+ def service_identities(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
468
469
  """
469
470
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
470
471
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
@@ -472,19 +473,19 @@ class _SecretBackendRoleState:
472
473
  return pulumi.get(self, "service_identities")
473
474
 
474
475
  @service_identities.setter
475
- def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
476
+ def service_identities(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
476
477
  pulumi.set(self, "service_identities", value)
477
478
 
478
479
  @property
479
480
  @pulumi.getter
480
- def ttl(self) -> Optional[pulumi.Input[int]]:
481
+ def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
481
482
  """
482
483
  Specifies the TTL for this role.
483
484
  """
484
485
  return pulumi.get(self, "ttl")
485
486
 
486
487
  @ttl.setter
487
- def ttl(self, value: Optional[pulumi.Input[int]]):
488
+ def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
488
489
  pulumi.set(self, "ttl", value)
489
490
 
490
491
 
@@ -493,19 +494,19 @@ class SecretBackendRole(pulumi.CustomResource):
493
494
  def __init__(__self__,
494
495
  resource_name: str,
495
496
  opts: Optional[pulumi.ResourceOptions] = None,
496
- backend: Optional[pulumi.Input[str]] = None,
497
- consul_namespace: Optional[pulumi.Input[str]] = None,
498
- consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
499
- consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
500
- local: Optional[pulumi.Input[bool]] = None,
501
- max_ttl: Optional[pulumi.Input[int]] = None,
502
- name: Optional[pulumi.Input[str]] = None,
503
- namespace: Optional[pulumi.Input[str]] = None,
504
- node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
505
- partition: Optional[pulumi.Input[str]] = None,
506
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
507
- service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
508
- ttl: Optional[pulumi.Input[int]] = None,
497
+ backend: Optional[pulumi.Input[builtins.str]] = None,
498
+ consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
499
+ consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
500
+ consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
501
+ local: Optional[pulumi.Input[builtins.bool]] = None,
502
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
503
+ name: Optional[pulumi.Input[builtins.str]] = None,
504
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
505
+ node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
506
+ partition: Optional[pulumi.Input[builtins.str]] = None,
507
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
508
+ service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
509
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
509
510
  __props__=None):
510
511
  """
511
512
  Manages a Consul secrets role for a Consul secrets engine in Vault. Consul secret backends can then issue Consul tokens.
@@ -543,29 +544,29 @@ class SecretBackendRole(pulumi.CustomResource):
543
544
 
544
545
  :param str resource_name: The name of the resource.
545
546
  :param pulumi.ResourceOptions opts: Options for the resource.
546
- :param pulumi.Input[str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
547
- :param pulumi.Input[str] consul_namespace: The Consul namespace that the token will be created in.
547
+ :param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
548
+ :param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
548
549
  Applicable for Vault 1.10+ and Consul 1.7+".
549
- :param pulumi.Input[Sequence[pulumi.Input[str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
550
- :param pulumi.Input[Sequence[pulumi.Input[str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
550
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
551
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
551
552
  Applicable for Vault 1.10+ with Consul 1.5+.
552
- :param pulumi.Input[bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
553
- :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
554
- :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
555
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
553
+ :param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
554
+ :param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
555
+ :param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
556
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
556
557
  The value should not contain leading or trailing forward slashes.
557
558
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
558
559
  *Available only for Vault Enterprise*.
559
- :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
560
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
560
561
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
561
- :param pulumi.Input[str] partition: The admin partition that the token will be created in.
562
+ :param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
562
563
  Applicable for Vault 1.10+ and Consul 1.11+".
563
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The list of Consul ACL policies to associate with these roles.
564
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
564
565
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
565
566
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
566
- :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
567
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
567
568
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
568
- :param pulumi.Input[int] ttl: Specifies the TTL for this role.
569
+ :param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
569
570
  """
570
571
  ...
571
572
  @overload
@@ -622,19 +623,19 @@ class SecretBackendRole(pulumi.CustomResource):
622
623
  def _internal_init(__self__,
623
624
  resource_name: str,
624
625
  opts: Optional[pulumi.ResourceOptions] = None,
625
- backend: Optional[pulumi.Input[str]] = None,
626
- consul_namespace: Optional[pulumi.Input[str]] = None,
627
- consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
628
- consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
629
- local: Optional[pulumi.Input[bool]] = None,
630
- max_ttl: Optional[pulumi.Input[int]] = None,
631
- name: Optional[pulumi.Input[str]] = None,
632
- namespace: Optional[pulumi.Input[str]] = None,
633
- node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
634
- partition: Optional[pulumi.Input[str]] = None,
635
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
636
- service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
637
- ttl: Optional[pulumi.Input[int]] = None,
626
+ backend: Optional[pulumi.Input[builtins.str]] = None,
627
+ consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
628
+ consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
629
+ consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
630
+ local: Optional[pulumi.Input[builtins.bool]] = None,
631
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
632
+ name: Optional[pulumi.Input[builtins.str]] = None,
633
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
634
+ node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
635
+ partition: Optional[pulumi.Input[builtins.str]] = None,
636
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
637
+ service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
638
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
638
639
  __props__=None):
639
640
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
640
641
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -667,19 +668,19 @@ class SecretBackendRole(pulumi.CustomResource):
667
668
  def get(resource_name: str,
668
669
  id: pulumi.Input[str],
669
670
  opts: Optional[pulumi.ResourceOptions] = None,
670
- backend: Optional[pulumi.Input[str]] = None,
671
- consul_namespace: Optional[pulumi.Input[str]] = None,
672
- consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
673
- consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
674
- local: Optional[pulumi.Input[bool]] = None,
675
- max_ttl: Optional[pulumi.Input[int]] = None,
676
- name: Optional[pulumi.Input[str]] = None,
677
- namespace: Optional[pulumi.Input[str]] = None,
678
- node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
679
- partition: Optional[pulumi.Input[str]] = None,
680
- policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
681
- service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
682
- ttl: Optional[pulumi.Input[int]] = None) -> 'SecretBackendRole':
671
+ backend: Optional[pulumi.Input[builtins.str]] = None,
672
+ consul_namespace: Optional[pulumi.Input[builtins.str]] = None,
673
+ consul_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
674
+ consul_roles: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
675
+ local: Optional[pulumi.Input[builtins.bool]] = None,
676
+ max_ttl: Optional[pulumi.Input[builtins.int]] = None,
677
+ name: Optional[pulumi.Input[builtins.str]] = None,
678
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
679
+ node_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
680
+ partition: Optional[pulumi.Input[builtins.str]] = None,
681
+ policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
682
+ service_identities: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
683
+ ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'SecretBackendRole':
683
684
  """
684
685
  Get an existing SecretBackendRole resource's state with the given name, id, and optional extra
685
686
  properties used to qualify the lookup.
@@ -687,29 +688,29 @@ class SecretBackendRole(pulumi.CustomResource):
687
688
  :param str resource_name: The unique name of the resulting resource.
688
689
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
689
690
  :param pulumi.ResourceOptions opts: Options for the resource.
690
- :param pulumi.Input[str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
691
- :param pulumi.Input[str] consul_namespace: The Consul namespace that the token will be created in.
691
+ :param pulumi.Input[builtins.str] backend: The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
692
+ :param pulumi.Input[builtins.str] consul_namespace: The Consul namespace that the token will be created in.
692
693
  Applicable for Vault 1.10+ and Consul 1.7+".
693
- :param pulumi.Input[Sequence[pulumi.Input[str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
694
- :param pulumi.Input[Sequence[pulumi.Input[str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
694
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_policies: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
695
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] consul_roles: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
695
696
  Applicable for Vault 1.10+ with Consul 1.5+.
696
- :param pulumi.Input[bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
697
- :param pulumi.Input[int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
698
- :param pulumi.Input[str] name: The name of the Consul secrets engine role to create.
699
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
697
+ :param pulumi.Input[builtins.bool] local: Indicates that the token should not be replicated globally and instead be local to the current datacenter.
698
+ :param pulumi.Input[builtins.int] max_ttl: Maximum TTL for leases associated with this role, in seconds.
699
+ :param pulumi.Input[builtins.str] name: The name of the Consul secrets engine role to create.
700
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
700
701
  The value should not contain leading or trailing forward slashes.
701
702
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
702
703
  *Available only for Vault Enterprise*.
703
- :param pulumi.Input[Sequence[pulumi.Input[str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
704
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] node_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
704
705
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
705
- :param pulumi.Input[str] partition: The admin partition that the token will be created in.
706
+ :param pulumi.Input[builtins.str] partition: The admin partition that the token will be created in.
706
707
  Applicable for Vault 1.10+ and Consul 1.11+".
707
- :param pulumi.Input[Sequence[pulumi.Input[str]]] policies: The list of Consul ACL policies to associate with these roles.
708
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] policies: The list of Consul ACL policies to associate with these roles.
708
709
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
709
710
  `policies`, remains supported for legacy users, but Vault has deprecated this field.
710
- :param pulumi.Input[Sequence[pulumi.Input[str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
711
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] service_identities: <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
711
712
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
712
- :param pulumi.Input[int] ttl: Specifies the TTL for this role.
713
+ :param pulumi.Input[builtins.int] ttl: Specifies the TTL for this role.
713
714
  """
714
715
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
715
716
 
@@ -732,7 +733,7 @@ class SecretBackendRole(pulumi.CustomResource):
732
733
 
733
734
  @property
734
735
  @pulumi.getter
735
- def backend(self) -> pulumi.Output[Optional[str]]:
736
+ def backend(self) -> pulumi.Output[Optional[builtins.str]]:
736
737
  """
737
738
  The unique name of an existing Consul secrets backend mount. Must not begin or end with a `/`. One of `path` or `backend` is required.
738
739
  """
@@ -740,7 +741,7 @@ class SecretBackendRole(pulumi.CustomResource):
740
741
 
741
742
  @property
742
743
  @pulumi.getter(name="consulNamespace")
743
- def consul_namespace(self) -> pulumi.Output[str]:
744
+ def consul_namespace(self) -> pulumi.Output[builtins.str]:
744
745
  """
745
746
  The Consul namespace that the token will be created in.
746
747
  Applicable for Vault 1.10+ and Consul 1.7+".
@@ -749,7 +750,7 @@ class SecretBackendRole(pulumi.CustomResource):
749
750
 
750
751
  @property
751
752
  @pulumi.getter(name="consulPolicies")
752
- def consul_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
753
+ def consul_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
753
754
  """
754
755
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> The list of Consul ACL policies to associate with these roles.
755
756
  """
@@ -757,7 +758,7 @@ class SecretBackendRole(pulumi.CustomResource):
757
758
 
758
759
  @property
759
760
  @pulumi.getter(name="consulRoles")
760
- def consul_roles(self) -> pulumi.Output[Optional[Sequence[str]]]:
761
+ def consul_roles(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
761
762
  """
762
763
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul roles to attach to the token.
763
764
  Applicable for Vault 1.10+ with Consul 1.5+.
@@ -766,7 +767,7 @@ class SecretBackendRole(pulumi.CustomResource):
766
767
 
767
768
  @property
768
769
  @pulumi.getter
769
- def local(self) -> pulumi.Output[Optional[bool]]:
770
+ def local(self) -> pulumi.Output[Optional[builtins.bool]]:
770
771
  """
771
772
  Indicates that the token should not be replicated globally and instead be local to the current datacenter.
772
773
  """
@@ -774,7 +775,7 @@ class SecretBackendRole(pulumi.CustomResource):
774
775
 
775
776
  @property
776
777
  @pulumi.getter(name="maxTtl")
777
- def max_ttl(self) -> pulumi.Output[Optional[int]]:
778
+ def max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
778
779
  """
779
780
  Maximum TTL for leases associated with this role, in seconds.
780
781
  """
@@ -782,7 +783,7 @@ class SecretBackendRole(pulumi.CustomResource):
782
783
 
783
784
  @property
784
785
  @pulumi.getter
785
- def name(self) -> pulumi.Output[str]:
786
+ def name(self) -> pulumi.Output[builtins.str]:
786
787
  """
787
788
  The name of the Consul secrets engine role to create.
788
789
  """
@@ -790,7 +791,7 @@ class SecretBackendRole(pulumi.CustomResource):
790
791
 
791
792
  @property
792
793
  @pulumi.getter
793
- def namespace(self) -> pulumi.Output[Optional[str]]:
794
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
794
795
  """
795
796
  The namespace to provision the resource in.
796
797
  The value should not contain leading or trailing forward slashes.
@@ -801,7 +802,7 @@ class SecretBackendRole(pulumi.CustomResource):
801
802
 
802
803
  @property
803
804
  @pulumi.getter(name="nodeIdentities")
804
- def node_identities(self) -> pulumi.Output[Optional[Sequence[str]]]:
805
+ def node_identities(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
805
806
  """
806
807
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul node
807
808
  identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.8+.
@@ -810,7 +811,7 @@ class SecretBackendRole(pulumi.CustomResource):
810
811
 
811
812
  @property
812
813
  @pulumi.getter
813
- def partition(self) -> pulumi.Output[str]:
814
+ def partition(self) -> pulumi.Output[builtins.str]:
814
815
  """
815
816
  The admin partition that the token will be created in.
816
817
  Applicable for Vault 1.10+ and Consul 1.11+".
@@ -819,7 +820,7 @@ class SecretBackendRole(pulumi.CustomResource):
819
820
 
820
821
  @property
821
822
  @pulumi.getter
822
- def policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
823
+ def policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
823
824
  """
824
825
  The list of Consul ACL policies to associate with these roles.
825
826
  **NOTE:** The new parameter `consul_policies` should be used in favor of this. This parameter,
@@ -829,7 +830,7 @@ class SecretBackendRole(pulumi.CustomResource):
829
830
 
830
831
  @property
831
832
  @pulumi.getter(name="serviceIdentities")
832
- def service_identities(self) -> pulumi.Output[Optional[Sequence[str]]]:
833
+ def service_identities(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
833
834
  """
834
835
  <sup><a href="#note-about-required-arguments">SEE NOTE</a></sup> Set of Consul
835
836
  service identities to attach to the token. Applicable for Vault 1.11+ with Consul 1.5+.
@@ -838,7 +839,7 @@ class SecretBackendRole(pulumi.CustomResource):
838
839
 
839
840
  @property
840
841
  @pulumi.getter
841
- def ttl(self) -> pulumi.Output[Optional[int]]:
842
+ def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
842
843
  """
843
844
  Specifies the TTL for this role.
844
845
  """