pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -21,62 +22,62 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
21
22
  @pulumi.input_type
22
23
  class AuthBackendArgs:
23
24
  def __init__(__self__, *,
24
- organization: pulumi.Input[str],
25
- base_url: Optional[pulumi.Input[str]] = None,
26
- description: Optional[pulumi.Input[str]] = None,
27
- disable_remount: Optional[pulumi.Input[bool]] = None,
28
- namespace: Optional[pulumi.Input[str]] = None,
29
- organization_id: Optional[pulumi.Input[int]] = None,
30
- path: Optional[pulumi.Input[str]] = None,
31
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
32
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
33
- token_max_ttl: Optional[pulumi.Input[int]] = None,
34
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
35
- token_num_uses: Optional[pulumi.Input[int]] = None,
36
- token_period: Optional[pulumi.Input[int]] = None,
37
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
38
- token_ttl: Optional[pulumi.Input[int]] = None,
39
- token_type: Optional[pulumi.Input[str]] = None,
25
+ organization: pulumi.Input[builtins.str],
26
+ base_url: Optional[pulumi.Input[builtins.str]] = None,
27
+ description: Optional[pulumi.Input[builtins.str]] = None,
28
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
29
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
30
+ organization_id: Optional[pulumi.Input[builtins.int]] = None,
31
+ path: Optional[pulumi.Input[builtins.str]] = None,
32
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
33
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
34
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
35
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
36
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
37
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
38
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
39
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
40
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
40
41
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
41
42
  """
42
43
  The set of arguments for constructing a AuthBackend resource.
43
- :param pulumi.Input[str] organization: The organization configured users must be part of.
44
- :param pulumi.Input[str] base_url: The API endpoint to use. Useful if you
44
+ :param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
45
+ :param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
45
46
  are running GitHub Enterprise or an API-compatible authentication server.
46
- :param pulumi.Input[str] description: Specifies the description of the mount.
47
+ :param pulumi.Input[builtins.str] description: Specifies the description of the mount.
47
48
  This overrides the current stored value, if any.
48
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
49
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
49
50
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
50
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
51
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
51
52
  The value should not contain leading or trailing forward slashes.
52
53
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
53
54
  *Available only for Vault Enterprise*.
54
- :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
55
+ :param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
55
56
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
56
- :param pulumi.Input[str] path: Path where the auth backend is mounted. Defaults to `auth/github`
57
+ :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
57
58
  if not specified.
58
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
59
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
59
60
  addresses which can authenticate successfully, and ties the resulting token to these blocks
60
61
  as well.
61
- :param pulumi.Input[int] token_explicit_max_ttl: (Optional) If set, will encode an
62
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
62
63
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
63
64
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
64
65
  `token_max_ttl` would otherwise allow a renewal.
65
- :param pulumi.Input[int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
66
+ :param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
66
67
  Its current value will be referenced at renewal time.
67
- :param pulumi.Input[bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
68
+ :param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
68
69
  generated tokens; otherwise it will be added to the policies set in token_policies.
69
- :param pulumi.Input[int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
70
+ :param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
70
71
  of times a generated token may be used (within its lifetime); 0 means unlimited.
71
- :param pulumi.Input[int] token_period: (Optional) If set, indicates that the
72
+ :param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
72
73
  token generated using this role should never expire. The token should be renewed within the
73
74
  duration specified by this value. At each renewal, the token's TTL will be set to the
74
75
  value of this field. Specified in seconds.
75
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
76
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
76
77
  on the auth method, this list may be supplemented by user/group/other values.
77
- :param pulumi.Input[int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
78
+ :param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
78
79
  Its current value will be referenced at renewal time.
79
- :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
80
+ :param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
80
81
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
81
82
  :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
82
83
 
@@ -118,19 +119,19 @@ class AuthBackendArgs:
118
119
 
119
120
  @property
120
121
  @pulumi.getter
121
- def organization(self) -> pulumi.Input[str]:
122
+ def organization(self) -> pulumi.Input[builtins.str]:
122
123
  """
123
124
  The organization configured users must be part of.
124
125
  """
125
126
  return pulumi.get(self, "organization")
126
127
 
127
128
  @organization.setter
128
- def organization(self, value: pulumi.Input[str]):
129
+ def organization(self, value: pulumi.Input[builtins.str]):
129
130
  pulumi.set(self, "organization", value)
130
131
 
131
132
  @property
132
133
  @pulumi.getter(name="baseUrl")
133
- def base_url(self) -> Optional[pulumi.Input[str]]:
134
+ def base_url(self) -> Optional[pulumi.Input[builtins.str]]:
134
135
  """
135
136
  The API endpoint to use. Useful if you
136
137
  are running GitHub Enterprise or an API-compatible authentication server.
@@ -138,12 +139,12 @@ class AuthBackendArgs:
138
139
  return pulumi.get(self, "base_url")
139
140
 
140
141
  @base_url.setter
141
- def base_url(self, value: Optional[pulumi.Input[str]]):
142
+ def base_url(self, value: Optional[pulumi.Input[builtins.str]]):
142
143
  pulumi.set(self, "base_url", value)
143
144
 
144
145
  @property
145
146
  @pulumi.getter
146
- def description(self) -> Optional[pulumi.Input[str]]:
147
+ def description(self) -> Optional[pulumi.Input[builtins.str]]:
147
148
  """
148
149
  Specifies the description of the mount.
149
150
  This overrides the current stored value, if any.
@@ -151,12 +152,12 @@ class AuthBackendArgs:
151
152
  return pulumi.get(self, "description")
152
153
 
153
154
  @description.setter
154
- def description(self, value: Optional[pulumi.Input[str]]):
155
+ def description(self, value: Optional[pulumi.Input[builtins.str]]):
155
156
  pulumi.set(self, "description", value)
156
157
 
157
158
  @property
158
159
  @pulumi.getter(name="disableRemount")
159
- def disable_remount(self) -> Optional[pulumi.Input[bool]]:
160
+ def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
160
161
  """
161
162
  If set, opts out of mount migration on path updates.
162
163
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -164,12 +165,12 @@ class AuthBackendArgs:
164
165
  return pulumi.get(self, "disable_remount")
165
166
 
166
167
  @disable_remount.setter
167
- def disable_remount(self, value: Optional[pulumi.Input[bool]]):
168
+ def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
168
169
  pulumi.set(self, "disable_remount", value)
169
170
 
170
171
  @property
171
172
  @pulumi.getter
172
- def namespace(self) -> Optional[pulumi.Input[str]]:
173
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
173
174
  """
174
175
  The namespace to provision the resource in.
175
176
  The value should not contain leading or trailing forward slashes.
@@ -179,12 +180,12 @@ class AuthBackendArgs:
179
180
  return pulumi.get(self, "namespace")
180
181
 
181
182
  @namespace.setter
182
- def namespace(self, value: Optional[pulumi.Input[str]]):
183
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
183
184
  pulumi.set(self, "namespace", value)
184
185
 
185
186
  @property
186
187
  @pulumi.getter(name="organizationId")
187
- def organization_id(self) -> Optional[pulumi.Input[int]]:
188
+ def organization_id(self) -> Optional[pulumi.Input[builtins.int]]:
188
189
  """
189
190
  The ID of the organization users must be part of.
190
191
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
@@ -192,12 +193,12 @@ class AuthBackendArgs:
192
193
  return pulumi.get(self, "organization_id")
193
194
 
194
195
  @organization_id.setter
195
- def organization_id(self, value: Optional[pulumi.Input[int]]):
196
+ def organization_id(self, value: Optional[pulumi.Input[builtins.int]]):
196
197
  pulumi.set(self, "organization_id", value)
197
198
 
198
199
  @property
199
200
  @pulumi.getter
200
- def path(self) -> Optional[pulumi.Input[str]]:
201
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
201
202
  """
202
203
  Path where the auth backend is mounted. Defaults to `auth/github`
203
204
  if not specified.
@@ -205,12 +206,12 @@ class AuthBackendArgs:
205
206
  return pulumi.get(self, "path")
206
207
 
207
208
  @path.setter
208
- def path(self, value: Optional[pulumi.Input[str]]):
209
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
209
210
  pulumi.set(self, "path", value)
210
211
 
211
212
  @property
212
213
  @pulumi.getter(name="tokenBoundCidrs")
213
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
214
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
214
215
  """
215
216
  (Optional) List of CIDR blocks; if set, specifies blocks of IP
216
217
  addresses which can authenticate successfully, and ties the resulting token to these blocks
@@ -219,12 +220,12 @@ class AuthBackendArgs:
219
220
  return pulumi.get(self, "token_bound_cidrs")
220
221
 
221
222
  @token_bound_cidrs.setter
222
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
223
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
223
224
  pulumi.set(self, "token_bound_cidrs", value)
224
225
 
225
226
  @property
226
227
  @pulumi.getter(name="tokenExplicitMaxTtl")
227
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
228
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
228
229
  """
229
230
  (Optional) If set, will encode an
230
231
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
@@ -234,12 +235,12 @@ class AuthBackendArgs:
234
235
  return pulumi.get(self, "token_explicit_max_ttl")
235
236
 
236
237
  @token_explicit_max_ttl.setter
237
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
238
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
238
239
  pulumi.set(self, "token_explicit_max_ttl", value)
239
240
 
240
241
  @property
241
242
  @pulumi.getter(name="tokenMaxTtl")
242
- def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
243
+ def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
243
244
  """
244
245
  (Optional) The maximum lifetime for generated tokens in number of seconds.
245
246
  Its current value will be referenced at renewal time.
@@ -247,12 +248,12 @@ class AuthBackendArgs:
247
248
  return pulumi.get(self, "token_max_ttl")
248
249
 
249
250
  @token_max_ttl.setter
250
- def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
251
+ def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
251
252
  pulumi.set(self, "token_max_ttl", value)
252
253
 
253
254
  @property
254
255
  @pulumi.getter(name="tokenNoDefaultPolicy")
255
- def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
256
+ def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
256
257
  """
257
258
  (Optional) If set, the default policy will not be set on
258
259
  generated tokens; otherwise it will be added to the policies set in token_policies.
@@ -260,12 +261,12 @@ class AuthBackendArgs:
260
261
  return pulumi.get(self, "token_no_default_policy")
261
262
 
262
263
  @token_no_default_policy.setter
263
- def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
264
+ def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
264
265
  pulumi.set(self, "token_no_default_policy", value)
265
266
 
266
267
  @property
267
268
  @pulumi.getter(name="tokenNumUses")
268
- def token_num_uses(self) -> Optional[pulumi.Input[int]]:
269
+ def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
269
270
  """
270
271
  (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
271
272
  of times a generated token may be used (within its lifetime); 0 means unlimited.
@@ -273,12 +274,12 @@ class AuthBackendArgs:
273
274
  return pulumi.get(self, "token_num_uses")
274
275
 
275
276
  @token_num_uses.setter
276
- def token_num_uses(self, value: Optional[pulumi.Input[int]]):
277
+ def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
277
278
  pulumi.set(self, "token_num_uses", value)
278
279
 
279
280
  @property
280
281
  @pulumi.getter(name="tokenPeriod")
281
- def token_period(self) -> Optional[pulumi.Input[int]]:
282
+ def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
282
283
  """
283
284
  (Optional) If set, indicates that the
284
285
  token generated using this role should never expire. The token should be renewed within the
@@ -288,12 +289,12 @@ class AuthBackendArgs:
288
289
  return pulumi.get(self, "token_period")
289
290
 
290
291
  @token_period.setter
291
- def token_period(self, value: Optional[pulumi.Input[int]]):
292
+ def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
292
293
  pulumi.set(self, "token_period", value)
293
294
 
294
295
  @property
295
296
  @pulumi.getter(name="tokenPolicies")
296
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
297
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
297
298
  """
298
299
  (Optional) List of policies to encode onto generated tokens. Depending
299
300
  on the auth method, this list may be supplemented by user/group/other values.
@@ -301,12 +302,12 @@ class AuthBackendArgs:
301
302
  return pulumi.get(self, "token_policies")
302
303
 
303
304
  @token_policies.setter
304
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
305
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
305
306
  pulumi.set(self, "token_policies", value)
306
307
 
307
308
  @property
308
309
  @pulumi.getter(name="tokenTtl")
309
- def token_ttl(self) -> Optional[pulumi.Input[int]]:
310
+ def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
310
311
  """
311
312
  (Optional) The incremental lifetime for generated tokens in number of seconds.
312
313
  Its current value will be referenced at renewal time.
@@ -314,12 +315,12 @@ class AuthBackendArgs:
314
315
  return pulumi.get(self, "token_ttl")
315
316
 
316
317
  @token_ttl.setter
317
- def token_ttl(self, value: Optional[pulumi.Input[int]]):
318
+ def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
318
319
  pulumi.set(self, "token_ttl", value)
319
320
 
320
321
  @property
321
322
  @pulumi.getter(name="tokenType")
322
- def token_type(self) -> Optional[pulumi.Input[str]]:
323
+ def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
323
324
  """
324
325
  Specifies the type of tokens that should be returned by
325
326
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -327,7 +328,7 @@ class AuthBackendArgs:
327
328
  return pulumi.get(self, "token_type")
328
329
 
329
330
  @token_type.setter
330
- def token_type(self, value: Optional[pulumi.Input[str]]):
331
+ def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
331
332
  pulumi.set(self, "token_type", value)
332
333
 
333
334
  @property
@@ -348,64 +349,64 @@ class AuthBackendArgs:
348
349
  @pulumi.input_type
349
350
  class _AuthBackendState:
350
351
  def __init__(__self__, *,
351
- accessor: Optional[pulumi.Input[str]] = None,
352
- base_url: Optional[pulumi.Input[str]] = None,
353
- description: Optional[pulumi.Input[str]] = None,
354
- disable_remount: Optional[pulumi.Input[bool]] = None,
355
- namespace: Optional[pulumi.Input[str]] = None,
356
- organization: Optional[pulumi.Input[str]] = None,
357
- organization_id: Optional[pulumi.Input[int]] = None,
358
- path: Optional[pulumi.Input[str]] = None,
359
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
360
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
361
- token_max_ttl: Optional[pulumi.Input[int]] = None,
362
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
363
- token_num_uses: Optional[pulumi.Input[int]] = None,
364
- token_period: Optional[pulumi.Input[int]] = None,
365
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
366
- token_ttl: Optional[pulumi.Input[int]] = None,
367
- token_type: Optional[pulumi.Input[str]] = None,
352
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
353
+ base_url: Optional[pulumi.Input[builtins.str]] = None,
354
+ description: Optional[pulumi.Input[builtins.str]] = None,
355
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
356
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
357
+ organization: Optional[pulumi.Input[builtins.str]] = None,
358
+ organization_id: Optional[pulumi.Input[builtins.int]] = None,
359
+ path: Optional[pulumi.Input[builtins.str]] = None,
360
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
361
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
362
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
363
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
364
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
365
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
366
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
367
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
368
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
368
369
  tune: Optional[pulumi.Input['AuthBackendTuneArgs']] = None):
369
370
  """
370
371
  Input properties used for looking up and filtering AuthBackend resources.
371
- :param pulumi.Input[str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
372
- :param pulumi.Input[str] base_url: The API endpoint to use. Useful if you
372
+ :param pulumi.Input[builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
373
+ :param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
373
374
  are running GitHub Enterprise or an API-compatible authentication server.
374
- :param pulumi.Input[str] description: Specifies the description of the mount.
375
+ :param pulumi.Input[builtins.str] description: Specifies the description of the mount.
375
376
  This overrides the current stored value, if any.
376
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
377
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
377
378
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
378
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
379
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
379
380
  The value should not contain leading or trailing forward slashes.
380
381
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
381
382
  *Available only for Vault Enterprise*.
382
- :param pulumi.Input[str] organization: The organization configured users must be part of.
383
- :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
383
+ :param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
384
+ :param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
384
385
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
385
- :param pulumi.Input[str] path: Path where the auth backend is mounted. Defaults to `auth/github`
386
+ :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
386
387
  if not specified.
387
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
388
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
388
389
  addresses which can authenticate successfully, and ties the resulting token to these blocks
389
390
  as well.
390
- :param pulumi.Input[int] token_explicit_max_ttl: (Optional) If set, will encode an
391
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
391
392
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
392
393
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
393
394
  `token_max_ttl` would otherwise allow a renewal.
394
- :param pulumi.Input[int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
395
+ :param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
395
396
  Its current value will be referenced at renewal time.
396
- :param pulumi.Input[bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
397
+ :param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
397
398
  generated tokens; otherwise it will be added to the policies set in token_policies.
398
- :param pulumi.Input[int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
399
+ :param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
399
400
  of times a generated token may be used (within its lifetime); 0 means unlimited.
400
- :param pulumi.Input[int] token_period: (Optional) If set, indicates that the
401
+ :param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
401
402
  token generated using this role should never expire. The token should be renewed within the
402
403
  duration specified by this value. At each renewal, the token's TTL will be set to the
403
404
  value of this field. Specified in seconds.
404
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
405
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
405
406
  on the auth method, this list may be supplemented by user/group/other values.
406
- :param pulumi.Input[int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
407
+ :param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
407
408
  Its current value will be referenced at renewal time.
408
- :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
409
+ :param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
409
410
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
410
411
  :param pulumi.Input['AuthBackendTuneArgs'] tune: Extra configuration block. Structure is documented below.
411
412
 
@@ -450,19 +451,19 @@ class _AuthBackendState:
450
451
 
451
452
  @property
452
453
  @pulumi.getter
453
- def accessor(self) -> Optional[pulumi.Input[str]]:
454
+ def accessor(self) -> Optional[pulumi.Input[builtins.str]]:
454
455
  """
455
456
  The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
456
457
  """
457
458
  return pulumi.get(self, "accessor")
458
459
 
459
460
  @accessor.setter
460
- def accessor(self, value: Optional[pulumi.Input[str]]):
461
+ def accessor(self, value: Optional[pulumi.Input[builtins.str]]):
461
462
  pulumi.set(self, "accessor", value)
462
463
 
463
464
  @property
464
465
  @pulumi.getter(name="baseUrl")
465
- def base_url(self) -> Optional[pulumi.Input[str]]:
466
+ def base_url(self) -> Optional[pulumi.Input[builtins.str]]:
466
467
  """
467
468
  The API endpoint to use. Useful if you
468
469
  are running GitHub Enterprise or an API-compatible authentication server.
@@ -470,12 +471,12 @@ class _AuthBackendState:
470
471
  return pulumi.get(self, "base_url")
471
472
 
472
473
  @base_url.setter
473
- def base_url(self, value: Optional[pulumi.Input[str]]):
474
+ def base_url(self, value: Optional[pulumi.Input[builtins.str]]):
474
475
  pulumi.set(self, "base_url", value)
475
476
 
476
477
  @property
477
478
  @pulumi.getter
478
- def description(self) -> Optional[pulumi.Input[str]]:
479
+ def description(self) -> Optional[pulumi.Input[builtins.str]]:
479
480
  """
480
481
  Specifies the description of the mount.
481
482
  This overrides the current stored value, if any.
@@ -483,12 +484,12 @@ class _AuthBackendState:
483
484
  return pulumi.get(self, "description")
484
485
 
485
486
  @description.setter
486
- def description(self, value: Optional[pulumi.Input[str]]):
487
+ def description(self, value: Optional[pulumi.Input[builtins.str]]):
487
488
  pulumi.set(self, "description", value)
488
489
 
489
490
  @property
490
491
  @pulumi.getter(name="disableRemount")
491
- def disable_remount(self) -> Optional[pulumi.Input[bool]]:
492
+ def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
492
493
  """
493
494
  If set, opts out of mount migration on path updates.
494
495
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -496,12 +497,12 @@ class _AuthBackendState:
496
497
  return pulumi.get(self, "disable_remount")
497
498
 
498
499
  @disable_remount.setter
499
- def disable_remount(self, value: Optional[pulumi.Input[bool]]):
500
+ def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
500
501
  pulumi.set(self, "disable_remount", value)
501
502
 
502
503
  @property
503
504
  @pulumi.getter
504
- def namespace(self) -> Optional[pulumi.Input[str]]:
505
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
505
506
  """
506
507
  The namespace to provision the resource in.
507
508
  The value should not contain leading or trailing forward slashes.
@@ -511,24 +512,24 @@ class _AuthBackendState:
511
512
  return pulumi.get(self, "namespace")
512
513
 
513
514
  @namespace.setter
514
- def namespace(self, value: Optional[pulumi.Input[str]]):
515
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
515
516
  pulumi.set(self, "namespace", value)
516
517
 
517
518
  @property
518
519
  @pulumi.getter
519
- def organization(self) -> Optional[pulumi.Input[str]]:
520
+ def organization(self) -> Optional[pulumi.Input[builtins.str]]:
520
521
  """
521
522
  The organization configured users must be part of.
522
523
  """
523
524
  return pulumi.get(self, "organization")
524
525
 
525
526
  @organization.setter
526
- def organization(self, value: Optional[pulumi.Input[str]]):
527
+ def organization(self, value: Optional[pulumi.Input[builtins.str]]):
527
528
  pulumi.set(self, "organization", value)
528
529
 
529
530
  @property
530
531
  @pulumi.getter(name="organizationId")
531
- def organization_id(self) -> Optional[pulumi.Input[int]]:
532
+ def organization_id(self) -> Optional[pulumi.Input[builtins.int]]:
532
533
  """
533
534
  The ID of the organization users must be part of.
534
535
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
@@ -536,12 +537,12 @@ class _AuthBackendState:
536
537
  return pulumi.get(self, "organization_id")
537
538
 
538
539
  @organization_id.setter
539
- def organization_id(self, value: Optional[pulumi.Input[int]]):
540
+ def organization_id(self, value: Optional[pulumi.Input[builtins.int]]):
540
541
  pulumi.set(self, "organization_id", value)
541
542
 
542
543
  @property
543
544
  @pulumi.getter
544
- def path(self) -> Optional[pulumi.Input[str]]:
545
+ def path(self) -> Optional[pulumi.Input[builtins.str]]:
545
546
  """
546
547
  Path where the auth backend is mounted. Defaults to `auth/github`
547
548
  if not specified.
@@ -549,12 +550,12 @@ class _AuthBackendState:
549
550
  return pulumi.get(self, "path")
550
551
 
551
552
  @path.setter
552
- def path(self, value: Optional[pulumi.Input[str]]):
553
+ def path(self, value: Optional[pulumi.Input[builtins.str]]):
553
554
  pulumi.set(self, "path", value)
554
555
 
555
556
  @property
556
557
  @pulumi.getter(name="tokenBoundCidrs")
557
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
558
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
558
559
  """
559
560
  (Optional) List of CIDR blocks; if set, specifies blocks of IP
560
561
  addresses which can authenticate successfully, and ties the resulting token to these blocks
@@ -563,12 +564,12 @@ class _AuthBackendState:
563
564
  return pulumi.get(self, "token_bound_cidrs")
564
565
 
565
566
  @token_bound_cidrs.setter
566
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
567
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
567
568
  pulumi.set(self, "token_bound_cidrs", value)
568
569
 
569
570
  @property
570
571
  @pulumi.getter(name="tokenExplicitMaxTtl")
571
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[int]]:
572
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
572
573
  """
573
574
  (Optional) If set, will encode an
574
575
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
@@ -578,12 +579,12 @@ class _AuthBackendState:
578
579
  return pulumi.get(self, "token_explicit_max_ttl")
579
580
 
580
581
  @token_explicit_max_ttl.setter
581
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[int]]):
582
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
582
583
  pulumi.set(self, "token_explicit_max_ttl", value)
583
584
 
584
585
  @property
585
586
  @pulumi.getter(name="tokenMaxTtl")
586
- def token_max_ttl(self) -> Optional[pulumi.Input[int]]:
587
+ def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
587
588
  """
588
589
  (Optional) The maximum lifetime for generated tokens in number of seconds.
589
590
  Its current value will be referenced at renewal time.
@@ -591,12 +592,12 @@ class _AuthBackendState:
591
592
  return pulumi.get(self, "token_max_ttl")
592
593
 
593
594
  @token_max_ttl.setter
594
- def token_max_ttl(self, value: Optional[pulumi.Input[int]]):
595
+ def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
595
596
  pulumi.set(self, "token_max_ttl", value)
596
597
 
597
598
  @property
598
599
  @pulumi.getter(name="tokenNoDefaultPolicy")
599
- def token_no_default_policy(self) -> Optional[pulumi.Input[bool]]:
600
+ def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
600
601
  """
601
602
  (Optional) If set, the default policy will not be set on
602
603
  generated tokens; otherwise it will be added to the policies set in token_policies.
@@ -604,12 +605,12 @@ class _AuthBackendState:
604
605
  return pulumi.get(self, "token_no_default_policy")
605
606
 
606
607
  @token_no_default_policy.setter
607
- def token_no_default_policy(self, value: Optional[pulumi.Input[bool]]):
608
+ def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
608
609
  pulumi.set(self, "token_no_default_policy", value)
609
610
 
610
611
  @property
611
612
  @pulumi.getter(name="tokenNumUses")
612
- def token_num_uses(self) -> Optional[pulumi.Input[int]]:
613
+ def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
613
614
  """
614
615
  (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
615
616
  of times a generated token may be used (within its lifetime); 0 means unlimited.
@@ -617,12 +618,12 @@ class _AuthBackendState:
617
618
  return pulumi.get(self, "token_num_uses")
618
619
 
619
620
  @token_num_uses.setter
620
- def token_num_uses(self, value: Optional[pulumi.Input[int]]):
621
+ def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
621
622
  pulumi.set(self, "token_num_uses", value)
622
623
 
623
624
  @property
624
625
  @pulumi.getter(name="tokenPeriod")
625
- def token_period(self) -> Optional[pulumi.Input[int]]:
626
+ def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
626
627
  """
627
628
  (Optional) If set, indicates that the
628
629
  token generated using this role should never expire. The token should be renewed within the
@@ -632,12 +633,12 @@ class _AuthBackendState:
632
633
  return pulumi.get(self, "token_period")
633
634
 
634
635
  @token_period.setter
635
- def token_period(self, value: Optional[pulumi.Input[int]]):
636
+ def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
636
637
  pulumi.set(self, "token_period", value)
637
638
 
638
639
  @property
639
640
  @pulumi.getter(name="tokenPolicies")
640
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
641
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
641
642
  """
642
643
  (Optional) List of policies to encode onto generated tokens. Depending
643
644
  on the auth method, this list may be supplemented by user/group/other values.
@@ -645,12 +646,12 @@ class _AuthBackendState:
645
646
  return pulumi.get(self, "token_policies")
646
647
 
647
648
  @token_policies.setter
648
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
649
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
649
650
  pulumi.set(self, "token_policies", value)
650
651
 
651
652
  @property
652
653
  @pulumi.getter(name="tokenTtl")
653
- def token_ttl(self) -> Optional[pulumi.Input[int]]:
654
+ def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
654
655
  """
655
656
  (Optional) The incremental lifetime for generated tokens in number of seconds.
656
657
  Its current value will be referenced at renewal time.
@@ -658,12 +659,12 @@ class _AuthBackendState:
658
659
  return pulumi.get(self, "token_ttl")
659
660
 
660
661
  @token_ttl.setter
661
- def token_ttl(self, value: Optional[pulumi.Input[int]]):
662
+ def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
662
663
  pulumi.set(self, "token_ttl", value)
663
664
 
664
665
  @property
665
666
  @pulumi.getter(name="tokenType")
666
- def token_type(self) -> Optional[pulumi.Input[str]]:
667
+ def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
667
668
  """
668
669
  Specifies the type of tokens that should be returned by
669
670
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
@@ -671,7 +672,7 @@ class _AuthBackendState:
671
672
  return pulumi.get(self, "token_type")
672
673
 
673
674
  @token_type.setter
674
- def token_type(self, value: Optional[pulumi.Input[str]]):
675
+ def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
675
676
  pulumi.set(self, "token_type", value)
676
677
 
677
678
  @property
@@ -694,22 +695,22 @@ class AuthBackend(pulumi.CustomResource):
694
695
  def __init__(__self__,
695
696
  resource_name: str,
696
697
  opts: Optional[pulumi.ResourceOptions] = None,
697
- base_url: Optional[pulumi.Input[str]] = None,
698
- description: Optional[pulumi.Input[str]] = None,
699
- disable_remount: Optional[pulumi.Input[bool]] = None,
700
- namespace: Optional[pulumi.Input[str]] = None,
701
- organization: Optional[pulumi.Input[str]] = None,
702
- organization_id: Optional[pulumi.Input[int]] = None,
703
- path: Optional[pulumi.Input[str]] = None,
704
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
705
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
706
- token_max_ttl: Optional[pulumi.Input[int]] = None,
707
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
708
- token_num_uses: Optional[pulumi.Input[int]] = None,
709
- token_period: Optional[pulumi.Input[int]] = None,
710
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
711
- token_ttl: Optional[pulumi.Input[int]] = None,
712
- token_type: Optional[pulumi.Input[str]] = None,
698
+ base_url: Optional[pulumi.Input[builtins.str]] = None,
699
+ description: Optional[pulumi.Input[builtins.str]] = None,
700
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
701
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
702
+ organization: Optional[pulumi.Input[builtins.str]] = None,
703
+ organization_id: Optional[pulumi.Input[builtins.int]] = None,
704
+ path: Optional[pulumi.Input[builtins.str]] = None,
705
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
706
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
707
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
708
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
709
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
710
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
711
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
712
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
713
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
713
714
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
714
715
  __props__=None):
715
716
  """
@@ -736,43 +737,43 @@ class AuthBackend(pulumi.CustomResource):
736
737
 
737
738
  :param str resource_name: The name of the resource.
738
739
  :param pulumi.ResourceOptions opts: Options for the resource.
739
- :param pulumi.Input[str] base_url: The API endpoint to use. Useful if you
740
+ :param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
740
741
  are running GitHub Enterprise or an API-compatible authentication server.
741
- :param pulumi.Input[str] description: Specifies the description of the mount.
742
+ :param pulumi.Input[builtins.str] description: Specifies the description of the mount.
742
743
  This overrides the current stored value, if any.
743
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
744
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
744
745
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
745
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
746
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
746
747
  The value should not contain leading or trailing forward slashes.
747
748
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
748
749
  *Available only for Vault Enterprise*.
749
- :param pulumi.Input[str] organization: The organization configured users must be part of.
750
- :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
750
+ :param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
751
+ :param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
751
752
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
752
- :param pulumi.Input[str] path: Path where the auth backend is mounted. Defaults to `auth/github`
753
+ :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
753
754
  if not specified.
754
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
755
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
755
756
  addresses which can authenticate successfully, and ties the resulting token to these blocks
756
757
  as well.
757
- :param pulumi.Input[int] token_explicit_max_ttl: (Optional) If set, will encode an
758
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
758
759
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
759
760
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
760
761
  `token_max_ttl` would otherwise allow a renewal.
761
- :param pulumi.Input[int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
762
+ :param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
762
763
  Its current value will be referenced at renewal time.
763
- :param pulumi.Input[bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
764
+ :param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
764
765
  generated tokens; otherwise it will be added to the policies set in token_policies.
765
- :param pulumi.Input[int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
766
+ :param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
766
767
  of times a generated token may be used (within its lifetime); 0 means unlimited.
767
- :param pulumi.Input[int] token_period: (Optional) If set, indicates that the
768
+ :param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
768
769
  token generated using this role should never expire. The token should be renewed within the
769
770
  duration specified by this value. At each renewal, the token's TTL will be set to the
770
771
  value of this field. Specified in seconds.
771
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
772
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
772
773
  on the auth method, this list may be supplemented by user/group/other values.
773
- :param pulumi.Input[int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
774
+ :param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
774
775
  Its current value will be referenced at renewal time.
775
- :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
776
+ :param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
776
777
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
777
778
  :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
778
779
 
@@ -821,22 +822,22 @@ class AuthBackend(pulumi.CustomResource):
821
822
  def _internal_init(__self__,
822
823
  resource_name: str,
823
824
  opts: Optional[pulumi.ResourceOptions] = None,
824
- base_url: Optional[pulumi.Input[str]] = None,
825
- description: Optional[pulumi.Input[str]] = None,
826
- disable_remount: Optional[pulumi.Input[bool]] = None,
827
- namespace: Optional[pulumi.Input[str]] = None,
828
- organization: Optional[pulumi.Input[str]] = None,
829
- organization_id: Optional[pulumi.Input[int]] = None,
830
- path: Optional[pulumi.Input[str]] = None,
831
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
832
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
833
- token_max_ttl: Optional[pulumi.Input[int]] = None,
834
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
835
- token_num_uses: Optional[pulumi.Input[int]] = None,
836
- token_period: Optional[pulumi.Input[int]] = None,
837
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
838
- token_ttl: Optional[pulumi.Input[int]] = None,
839
- token_type: Optional[pulumi.Input[str]] = None,
825
+ base_url: Optional[pulumi.Input[builtins.str]] = None,
826
+ description: Optional[pulumi.Input[builtins.str]] = None,
827
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
828
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
829
+ organization: Optional[pulumi.Input[builtins.str]] = None,
830
+ organization_id: Optional[pulumi.Input[builtins.int]] = None,
831
+ path: Optional[pulumi.Input[builtins.str]] = None,
832
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
833
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
834
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
835
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
836
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
837
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
838
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
839
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
840
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
840
841
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None,
841
842
  __props__=None):
842
843
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
@@ -877,23 +878,23 @@ class AuthBackend(pulumi.CustomResource):
877
878
  def get(resource_name: str,
878
879
  id: pulumi.Input[str],
879
880
  opts: Optional[pulumi.ResourceOptions] = None,
880
- accessor: Optional[pulumi.Input[str]] = None,
881
- base_url: Optional[pulumi.Input[str]] = None,
882
- description: Optional[pulumi.Input[str]] = None,
883
- disable_remount: Optional[pulumi.Input[bool]] = None,
884
- namespace: Optional[pulumi.Input[str]] = None,
885
- organization: Optional[pulumi.Input[str]] = None,
886
- organization_id: Optional[pulumi.Input[int]] = None,
887
- path: Optional[pulumi.Input[str]] = None,
888
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
889
- token_explicit_max_ttl: Optional[pulumi.Input[int]] = None,
890
- token_max_ttl: Optional[pulumi.Input[int]] = None,
891
- token_no_default_policy: Optional[pulumi.Input[bool]] = None,
892
- token_num_uses: Optional[pulumi.Input[int]] = None,
893
- token_period: Optional[pulumi.Input[int]] = None,
894
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
895
- token_ttl: Optional[pulumi.Input[int]] = None,
896
- token_type: Optional[pulumi.Input[str]] = None,
881
+ accessor: Optional[pulumi.Input[builtins.str]] = None,
882
+ base_url: Optional[pulumi.Input[builtins.str]] = None,
883
+ description: Optional[pulumi.Input[builtins.str]] = None,
884
+ disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
885
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
886
+ organization: Optional[pulumi.Input[builtins.str]] = None,
887
+ organization_id: Optional[pulumi.Input[builtins.int]] = None,
888
+ path: Optional[pulumi.Input[builtins.str]] = None,
889
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
890
+ token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
891
+ token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
892
+ token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
893
+ token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
894
+ token_period: Optional[pulumi.Input[builtins.int]] = None,
895
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
896
+ token_ttl: Optional[pulumi.Input[builtins.int]] = None,
897
+ token_type: Optional[pulumi.Input[builtins.str]] = None,
897
898
  tune: Optional[pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']]] = None) -> 'AuthBackend':
898
899
  """
899
900
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
@@ -902,44 +903,44 @@ class AuthBackend(pulumi.CustomResource):
902
903
  :param str resource_name: The unique name of the resulting resource.
903
904
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
904
905
  :param pulumi.ResourceOptions opts: Options for the resource.
905
- :param pulumi.Input[str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
906
- :param pulumi.Input[str] base_url: The API endpoint to use. Useful if you
906
+ :param pulumi.Input[builtins.str] accessor: The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
907
+ :param pulumi.Input[builtins.str] base_url: The API endpoint to use. Useful if you
907
908
  are running GitHub Enterprise or an API-compatible authentication server.
908
- :param pulumi.Input[str] description: Specifies the description of the mount.
909
+ :param pulumi.Input[builtins.str] description: Specifies the description of the mount.
909
910
  This overrides the current stored value, if any.
910
- :param pulumi.Input[bool] disable_remount: If set, opts out of mount migration on path updates.
911
+ :param pulumi.Input[builtins.bool] disable_remount: If set, opts out of mount migration on path updates.
911
912
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
912
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
913
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
913
914
  The value should not contain leading or trailing forward slashes.
914
915
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
915
916
  *Available only for Vault Enterprise*.
916
- :param pulumi.Input[str] organization: The organization configured users must be part of.
917
- :param pulumi.Input[int] organization_id: The ID of the organization users must be part of.
917
+ :param pulumi.Input[builtins.str] organization: The organization configured users must be part of.
918
+ :param pulumi.Input[builtins.int] organization_id: The ID of the organization users must be part of.
918
919
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
919
- :param pulumi.Input[str] path: Path where the auth backend is mounted. Defaults to `auth/github`
920
+ :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted. Defaults to `auth/github`
920
921
  if not specified.
921
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
922
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: (Optional) List of CIDR blocks; if set, specifies blocks of IP
922
923
  addresses which can authenticate successfully, and ties the resulting token to these blocks
923
924
  as well.
924
- :param pulumi.Input[int] token_explicit_max_ttl: (Optional) If set, will encode an
925
+ :param pulumi.Input[builtins.int] token_explicit_max_ttl: (Optional) If set, will encode an
925
926
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
926
927
  onto the token in number of seconds. This is a hard cap even if `token_ttl` and
927
928
  `token_max_ttl` would otherwise allow a renewal.
928
- :param pulumi.Input[int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
929
+ :param pulumi.Input[builtins.int] token_max_ttl: (Optional) The maximum lifetime for generated tokens in number of seconds.
929
930
  Its current value will be referenced at renewal time.
930
- :param pulumi.Input[bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
931
+ :param pulumi.Input[builtins.bool] token_no_default_policy: (Optional) If set, the default policy will not be set on
931
932
  generated tokens; otherwise it will be added to the policies set in token_policies.
932
- :param pulumi.Input[int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
933
+ :param pulumi.Input[builtins.int] token_num_uses: (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
933
934
  of times a generated token may be used (within its lifetime); 0 means unlimited.
934
- :param pulumi.Input[int] token_period: (Optional) If set, indicates that the
935
+ :param pulumi.Input[builtins.int] token_period: (Optional) If set, indicates that the
935
936
  token generated using this role should never expire. The token should be renewed within the
936
937
  duration specified by this value. At each renewal, the token's TTL will be set to the
937
938
  value of this field. Specified in seconds.
938
- :param pulumi.Input[Sequence[pulumi.Input[str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
939
+ :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: (Optional) List of policies to encode onto generated tokens. Depending
939
940
  on the auth method, this list may be supplemented by user/group/other values.
940
- :param pulumi.Input[int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
941
+ :param pulumi.Input[builtins.int] token_ttl: (Optional) The incremental lifetime for generated tokens in number of seconds.
941
942
  Its current value will be referenced at renewal time.
942
- :param pulumi.Input[str] token_type: Specifies the type of tokens that should be returned by
943
+ :param pulumi.Input[builtins.str] token_type: Specifies the type of tokens that should be returned by
943
944
  the mount. Valid values are "default-service", "default-batch", "service", "batch".
944
945
  :param pulumi.Input[Union['AuthBackendTuneArgs', 'AuthBackendTuneArgsDict']] tune: Extra configuration block. Structure is documented below.
945
946
 
@@ -971,7 +972,7 @@ class AuthBackend(pulumi.CustomResource):
971
972
 
972
973
  @property
973
974
  @pulumi.getter
974
- def accessor(self) -> pulumi.Output[str]:
975
+ def accessor(self) -> pulumi.Output[builtins.str]:
975
976
  """
976
977
  The mount accessor related to the auth mount. It is useful for integration with [Identity Secrets Engine](https://www.vaultproject.io/docs/secrets/identity/index.html).
977
978
  """
@@ -979,7 +980,7 @@ class AuthBackend(pulumi.CustomResource):
979
980
 
980
981
  @property
981
982
  @pulumi.getter(name="baseUrl")
982
- def base_url(self) -> pulumi.Output[Optional[str]]:
983
+ def base_url(self) -> pulumi.Output[Optional[builtins.str]]:
983
984
  """
984
985
  The API endpoint to use. Useful if you
985
986
  are running GitHub Enterprise or an API-compatible authentication server.
@@ -988,7 +989,7 @@ class AuthBackend(pulumi.CustomResource):
988
989
 
989
990
  @property
990
991
  @pulumi.getter
991
- def description(self) -> pulumi.Output[Optional[str]]:
992
+ def description(self) -> pulumi.Output[Optional[builtins.str]]:
992
993
  """
993
994
  Specifies the description of the mount.
994
995
  This overrides the current stored value, if any.
@@ -997,7 +998,7 @@ class AuthBackend(pulumi.CustomResource):
997
998
 
998
999
  @property
999
1000
  @pulumi.getter(name="disableRemount")
1000
- def disable_remount(self) -> pulumi.Output[Optional[bool]]:
1001
+ def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
1001
1002
  """
1002
1003
  If set, opts out of mount migration on path updates.
1003
1004
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -1006,7 +1007,7 @@ class AuthBackend(pulumi.CustomResource):
1006
1007
 
1007
1008
  @property
1008
1009
  @pulumi.getter
1009
- def namespace(self) -> pulumi.Output[Optional[str]]:
1010
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1010
1011
  """
1011
1012
  The namespace to provision the resource in.
1012
1013
  The value should not contain leading or trailing forward slashes.
@@ -1017,7 +1018,7 @@ class AuthBackend(pulumi.CustomResource):
1017
1018
 
1018
1019
  @property
1019
1020
  @pulumi.getter
1020
- def organization(self) -> pulumi.Output[str]:
1021
+ def organization(self) -> pulumi.Output[builtins.str]:
1021
1022
  """
1022
1023
  The organization configured users must be part of.
1023
1024
  """
@@ -1025,7 +1026,7 @@ class AuthBackend(pulumi.CustomResource):
1025
1026
 
1026
1027
  @property
1027
1028
  @pulumi.getter(name="organizationId")
1028
- def organization_id(self) -> pulumi.Output[int]:
1029
+ def organization_id(self) -> pulumi.Output[builtins.int]:
1029
1030
  """
1030
1031
  The ID of the organization users must be part of.
1031
1032
  Vault will attempt to fetch and set this value if it is not provided. (Vault 1.10+)
@@ -1034,7 +1035,7 @@ class AuthBackend(pulumi.CustomResource):
1034
1035
 
1035
1036
  @property
1036
1037
  @pulumi.getter
1037
- def path(self) -> pulumi.Output[Optional[str]]:
1038
+ def path(self) -> pulumi.Output[Optional[builtins.str]]:
1038
1039
  """
1039
1040
  Path where the auth backend is mounted. Defaults to `auth/github`
1040
1041
  if not specified.
@@ -1043,7 +1044,7 @@ class AuthBackend(pulumi.CustomResource):
1043
1044
 
1044
1045
  @property
1045
1046
  @pulumi.getter(name="tokenBoundCidrs")
1046
- def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[str]]]:
1047
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1047
1048
  """
1048
1049
  (Optional) List of CIDR blocks; if set, specifies blocks of IP
1049
1050
  addresses which can authenticate successfully, and ties the resulting token to these blocks
@@ -1053,7 +1054,7 @@ class AuthBackend(pulumi.CustomResource):
1053
1054
 
1054
1055
  @property
1055
1056
  @pulumi.getter(name="tokenExplicitMaxTtl")
1056
- def token_explicit_max_ttl(self) -> pulumi.Output[Optional[int]]:
1057
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1057
1058
  """
1058
1059
  (Optional) If set, will encode an
1059
1060
  [explicit max TTL](https://www.vaultproject.io/docs/concepts/tokens.html#token-time-to-live-periodic-tokens-and-explicit-max-ttls)
@@ -1064,7 +1065,7 @@ class AuthBackend(pulumi.CustomResource):
1064
1065
 
1065
1066
  @property
1066
1067
  @pulumi.getter(name="tokenMaxTtl")
1067
- def token_max_ttl(self) -> pulumi.Output[Optional[int]]:
1068
+ def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1068
1069
  """
1069
1070
  (Optional) The maximum lifetime for generated tokens in number of seconds.
1070
1071
  Its current value will be referenced at renewal time.
@@ -1073,7 +1074,7 @@ class AuthBackend(pulumi.CustomResource):
1073
1074
 
1074
1075
  @property
1075
1076
  @pulumi.getter(name="tokenNoDefaultPolicy")
1076
- def token_no_default_policy(self) -> pulumi.Output[Optional[bool]]:
1077
+ def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
1077
1078
  """
1078
1079
  (Optional) If set, the default policy will not be set on
1079
1080
  generated tokens; otherwise it will be added to the policies set in token_policies.
@@ -1082,7 +1083,7 @@ class AuthBackend(pulumi.CustomResource):
1082
1083
 
1083
1084
  @property
1084
1085
  @pulumi.getter(name="tokenNumUses")
1085
- def token_num_uses(self) -> pulumi.Output[Optional[int]]:
1086
+ def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
1086
1087
  """
1087
1088
  (Optional) The [maximum number](https://www.vaultproject.io/api-docs/github#token_num_uses)
1088
1089
  of times a generated token may be used (within its lifetime); 0 means unlimited.
@@ -1091,7 +1092,7 @@ class AuthBackend(pulumi.CustomResource):
1091
1092
 
1092
1093
  @property
1093
1094
  @pulumi.getter(name="tokenPeriod")
1094
- def token_period(self) -> pulumi.Output[Optional[int]]:
1095
+ def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
1095
1096
  """
1096
1097
  (Optional) If set, indicates that the
1097
1098
  token generated using this role should never expire. The token should be renewed within the
@@ -1102,7 +1103,7 @@ class AuthBackend(pulumi.CustomResource):
1102
1103
 
1103
1104
  @property
1104
1105
  @pulumi.getter(name="tokenPolicies")
1105
- def token_policies(self) -> pulumi.Output[Optional[Sequence[str]]]:
1106
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1106
1107
  """
1107
1108
  (Optional) List of policies to encode onto generated tokens. Depending
1108
1109
  on the auth method, this list may be supplemented by user/group/other values.
@@ -1111,7 +1112,7 @@ class AuthBackend(pulumi.CustomResource):
1111
1112
 
1112
1113
  @property
1113
1114
  @pulumi.getter(name="tokenTtl")
1114
- def token_ttl(self) -> pulumi.Output[Optional[int]]:
1115
+ def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1115
1116
  """
1116
1117
  (Optional) The incremental lifetime for generated tokens in number of seconds.
1117
1118
  Its current value will be referenced at renewal time.
@@ -1120,7 +1121,7 @@ class AuthBackend(pulumi.CustomResource):
1120
1121
 
1121
1122
  @property
1122
1123
  @pulumi.getter(name="tokenType")
1123
- def token_type(self) -> pulumi.Output[Optional[str]]:
1124
+ def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
1124
1125
  """
1125
1126
  Specifies the type of tokens that should be returned by
1126
1127
  the mount. Valid values are "default-service", "default-batch", "service", "batch".