pulumi-vault 6.7.0a1743576047__py3-none-any.whl → 6.7.0a1744267302__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (264) hide show
  1. pulumi_vault/__init__.py +1 -0
  2. pulumi_vault/_inputs.py +554 -553
  3. pulumi_vault/ad/__init__.py +1 -0
  4. pulumi_vault/ad/get_access_credentials.py +20 -19
  5. pulumi_vault/ad/secret_backend.py +477 -476
  6. pulumi_vault/ad/secret_library.py +99 -98
  7. pulumi_vault/ad/secret_role.py +85 -84
  8. pulumi_vault/alicloud/__init__.py +1 -0
  9. pulumi_vault/alicloud/auth_backend_role.py +183 -182
  10. pulumi_vault/approle/__init__.py +1 -0
  11. pulumi_vault/approle/auth_backend_login.py +106 -105
  12. pulumi_vault/approle/auth_backend_role.py +239 -238
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +162 -161
  14. pulumi_vault/approle/get_auth_backend_role_id.py +18 -17
  15. pulumi_vault/audit.py +85 -84
  16. pulumi_vault/audit_request_header.py +43 -42
  17. pulumi_vault/auth_backend.py +106 -105
  18. pulumi_vault/aws/__init__.py +1 -0
  19. pulumi_vault/aws/auth_backend_cert.py +71 -70
  20. pulumi_vault/aws/auth_backend_client.py +253 -252
  21. pulumi_vault/aws/auth_backend_config_identity.py +85 -84
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +57 -56
  23. pulumi_vault/aws/auth_backend_login.py +209 -208
  24. pulumi_vault/aws/auth_backend_role.py +400 -399
  25. pulumi_vault/aws/auth_backend_role_tag.py +127 -126
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +57 -56
  27. pulumi_vault/aws/auth_backend_sts_role.py +71 -70
  28. pulumi_vault/aws/get_access_credentials.py +44 -43
  29. pulumi_vault/aws/get_static_access_credentials.py +13 -12
  30. pulumi_vault/aws/secret_backend.py +337 -336
  31. pulumi_vault/aws/secret_backend_role.py +211 -210
  32. pulumi_vault/aws/secret_backend_static_role.py +113 -112
  33. pulumi_vault/azure/__init__.py +1 -0
  34. pulumi_vault/azure/_inputs.py +21 -20
  35. pulumi_vault/azure/auth_backend_config.py +183 -182
  36. pulumi_vault/azure/auth_backend_role.py +253 -252
  37. pulumi_vault/azure/backend.py +239 -238
  38. pulumi_vault/azure/backend_role.py +141 -140
  39. pulumi_vault/azure/get_access_credentials.py +58 -57
  40. pulumi_vault/azure/outputs.py +11 -10
  41. pulumi_vault/cert_auth_backend_role.py +365 -364
  42. pulumi_vault/config/__init__.py +1 -0
  43. pulumi_vault/config/__init__.pyi +1 -0
  44. pulumi_vault/config/_inputs.py +11 -10
  45. pulumi_vault/config/outputs.py +287 -286
  46. pulumi_vault/config/ui_custom_message.py +113 -112
  47. pulumi_vault/config/vars.py +1 -0
  48. pulumi_vault/consul/__init__.py +1 -0
  49. pulumi_vault/consul/secret_backend.py +197 -196
  50. pulumi_vault/consul/secret_backend_role.py +183 -182
  51. pulumi_vault/database/__init__.py +1 -0
  52. pulumi_vault/database/_inputs.py +2525 -2524
  53. pulumi_vault/database/outputs.py +1529 -1528
  54. pulumi_vault/database/secret_backend_connection.py +169 -168
  55. pulumi_vault/database/secret_backend_role.py +169 -168
  56. pulumi_vault/database/secret_backend_static_role.py +179 -178
  57. pulumi_vault/database/secrets_mount.py +267 -266
  58. pulumi_vault/egp_policy.py +71 -70
  59. pulumi_vault/gcp/__init__.py +1 -0
  60. pulumi_vault/gcp/_inputs.py +82 -81
  61. pulumi_vault/gcp/auth_backend.py +260 -259
  62. pulumi_vault/gcp/auth_backend_role.py +281 -280
  63. pulumi_vault/gcp/get_auth_backend_role.py +70 -69
  64. pulumi_vault/gcp/outputs.py +50 -49
  65. pulumi_vault/gcp/secret_backend.py +232 -231
  66. pulumi_vault/gcp/secret_impersonated_account.py +92 -91
  67. pulumi_vault/gcp/secret_roleset.py +92 -91
  68. pulumi_vault/gcp/secret_static_account.py +92 -91
  69. pulumi_vault/generic/__init__.py +1 -0
  70. pulumi_vault/generic/endpoint.py +113 -112
  71. pulumi_vault/generic/get_secret.py +28 -27
  72. pulumi_vault/generic/secret.py +78 -77
  73. pulumi_vault/get_auth_backend.py +19 -18
  74. pulumi_vault/get_auth_backends.py +14 -13
  75. pulumi_vault/get_namespace.py +15 -14
  76. pulumi_vault/get_namespaces.py +8 -7
  77. pulumi_vault/get_nomad_access_token.py +19 -18
  78. pulumi_vault/get_policy_document.py +6 -5
  79. pulumi_vault/get_raft_autopilot_state.py +18 -17
  80. pulumi_vault/github/__init__.py +1 -0
  81. pulumi_vault/github/_inputs.py +42 -41
  82. pulumi_vault/github/auth_backend.py +232 -231
  83. pulumi_vault/github/outputs.py +26 -25
  84. pulumi_vault/github/team.py +57 -56
  85. pulumi_vault/github/user.py +57 -56
  86. pulumi_vault/identity/__init__.py +1 -0
  87. pulumi_vault/identity/entity.py +85 -84
  88. pulumi_vault/identity/entity_alias.py +71 -70
  89. pulumi_vault/identity/entity_policies.py +64 -63
  90. pulumi_vault/identity/get_entity.py +43 -42
  91. pulumi_vault/identity/get_group.py +50 -49
  92. pulumi_vault/identity/get_oidc_client_creds.py +14 -13
  93. pulumi_vault/identity/get_oidc_openid_config.py +24 -23
  94. pulumi_vault/identity/get_oidc_public_keys.py +13 -12
  95. pulumi_vault/identity/group.py +141 -140
  96. pulumi_vault/identity/group_alias.py +57 -56
  97. pulumi_vault/identity/group_member_entity_ids.py +57 -56
  98. pulumi_vault/identity/group_member_group_ids.py +57 -56
  99. pulumi_vault/identity/group_policies.py +64 -63
  100. pulumi_vault/identity/mfa_duo.py +148 -147
  101. pulumi_vault/identity/mfa_login_enforcement.py +120 -119
  102. pulumi_vault/identity/mfa_okta.py +134 -133
  103. pulumi_vault/identity/mfa_pingid.py +127 -126
  104. pulumi_vault/identity/mfa_totp.py +176 -175
  105. pulumi_vault/identity/oidc.py +29 -28
  106. pulumi_vault/identity/oidc_assignment.py +57 -56
  107. pulumi_vault/identity/oidc_client.py +127 -126
  108. pulumi_vault/identity/oidc_key.py +85 -84
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +43 -42
  110. pulumi_vault/identity/oidc_provider.py +92 -91
  111. pulumi_vault/identity/oidc_role.py +85 -84
  112. pulumi_vault/identity/oidc_scope.py +57 -56
  113. pulumi_vault/identity/outputs.py +32 -31
  114. pulumi_vault/jwt/__init__.py +1 -0
  115. pulumi_vault/jwt/_inputs.py +42 -41
  116. pulumi_vault/jwt/auth_backend.py +288 -287
  117. pulumi_vault/jwt/auth_backend_role.py +407 -406
  118. pulumi_vault/jwt/outputs.py +26 -25
  119. pulumi_vault/kmip/__init__.py +1 -0
  120. pulumi_vault/kmip/secret_backend.py +183 -182
  121. pulumi_vault/kmip/secret_role.py +295 -294
  122. pulumi_vault/kmip/secret_scope.py +57 -56
  123. pulumi_vault/kubernetes/__init__.py +1 -0
  124. pulumi_vault/kubernetes/auth_backend_config.py +141 -140
  125. pulumi_vault/kubernetes/auth_backend_role.py +225 -224
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +47 -46
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +70 -69
  128. pulumi_vault/kubernetes/get_service_account_token.py +38 -37
  129. pulumi_vault/kubernetes/secret_backend.py +316 -315
  130. pulumi_vault/kubernetes/secret_backend_role.py +197 -196
  131. pulumi_vault/kv/__init__.py +1 -0
  132. pulumi_vault/kv/_inputs.py +21 -20
  133. pulumi_vault/kv/get_secret.py +17 -16
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +30 -29
  135. pulumi_vault/kv/get_secret_v2.py +29 -28
  136. pulumi_vault/kv/get_secrets_list.py +13 -12
  137. pulumi_vault/kv/get_secrets_list_v2.py +19 -18
  138. pulumi_vault/kv/outputs.py +13 -12
  139. pulumi_vault/kv/secret.py +50 -49
  140. pulumi_vault/kv/secret_backend_v2.py +71 -70
  141. pulumi_vault/kv/secret_v2.py +134 -133
  142. pulumi_vault/ldap/__init__.py +1 -0
  143. pulumi_vault/ldap/auth_backend.py +588 -587
  144. pulumi_vault/ldap/auth_backend_group.py +57 -56
  145. pulumi_vault/ldap/auth_backend_user.py +71 -70
  146. pulumi_vault/ldap/get_dynamic_credentials.py +17 -16
  147. pulumi_vault/ldap/get_static_credentials.py +18 -17
  148. pulumi_vault/ldap/secret_backend.py +554 -553
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +127 -126
  150. pulumi_vault/ldap/secret_backend_library_set.py +99 -98
  151. pulumi_vault/ldap/secret_backend_static_role.py +99 -98
  152. pulumi_vault/managed/__init__.py +1 -0
  153. pulumi_vault/managed/_inputs.py +229 -228
  154. pulumi_vault/managed/keys.py +15 -14
  155. pulumi_vault/managed/outputs.py +139 -138
  156. pulumi_vault/mfa_duo.py +113 -112
  157. pulumi_vault/mfa_okta.py +113 -112
  158. pulumi_vault/mfa_pingid.py +120 -119
  159. pulumi_vault/mfa_totp.py +127 -126
  160. pulumi_vault/mongodbatlas/__init__.py +1 -0
  161. pulumi_vault/mongodbatlas/secret_backend.py +64 -63
  162. pulumi_vault/mongodbatlas/secret_role.py +155 -154
  163. pulumi_vault/mount.py +274 -273
  164. pulumi_vault/namespace.py +64 -63
  165. pulumi_vault/nomad_secret_backend.py +211 -210
  166. pulumi_vault/nomad_secret_role.py +85 -84
  167. pulumi_vault/okta/__init__.py +1 -0
  168. pulumi_vault/okta/_inputs.py +26 -25
  169. pulumi_vault/okta/auth_backend.py +274 -273
  170. pulumi_vault/okta/auth_backend_group.py +57 -56
  171. pulumi_vault/okta/auth_backend_user.py +71 -70
  172. pulumi_vault/okta/outputs.py +16 -15
  173. pulumi_vault/outputs.py +56 -55
  174. pulumi_vault/password_policy.py +43 -42
  175. pulumi_vault/pkisecret/__init__.py +1 -0
  176. pulumi_vault/pkisecret/_inputs.py +31 -30
  177. pulumi_vault/pkisecret/backend_acme_eab.py +92 -91
  178. pulumi_vault/pkisecret/backend_config_acme.py +141 -140
  179. pulumi_vault/pkisecret/backend_config_auto_tidy.py +323 -322
  180. pulumi_vault/pkisecret/backend_config_cluster.py +57 -56
  181. pulumi_vault/pkisecret/backend_config_cmpv2.py +106 -105
  182. pulumi_vault/pkisecret/backend_config_est.py +120 -119
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +22 -21
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +22 -21
  185. pulumi_vault/pkisecret/get_backend_config_est.py +19 -18
  186. pulumi_vault/pkisecret/get_backend_issuer.py +45 -44
  187. pulumi_vault/pkisecret/get_backend_issuers.py +15 -14
  188. pulumi_vault/pkisecret/get_backend_key.py +20 -19
  189. pulumi_vault/pkisecret/get_backend_keys.py +15 -14
  190. pulumi_vault/pkisecret/outputs.py +28 -27
  191. pulumi_vault/pkisecret/secret_backend_cert.py +337 -336
  192. pulumi_vault/pkisecret/secret_backend_config_ca.py +43 -42
  193. pulumi_vault/pkisecret/secret_backend_config_issuers.py +57 -56
  194. pulumi_vault/pkisecret/secret_backend_config_urls.py +85 -84
  195. pulumi_vault/pkisecret/secret_backend_crl_config.py +197 -196
  196. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +421 -420
  197. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +57 -56
  198. pulumi_vault/pkisecret/secret_backend_issuer.py +232 -231
  199. pulumi_vault/pkisecret/secret_backend_key.py +120 -119
  200. pulumi_vault/pkisecret/secret_backend_role.py +715 -714
  201. pulumi_vault/pkisecret/secret_backend_root_cert.py +554 -553
  202. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +526 -525
  203. pulumi_vault/pkisecret/secret_backend_sign.py +281 -280
  204. pulumi_vault/plugin.py +127 -126
  205. pulumi_vault/plugin_pinned_version.py +43 -42
  206. pulumi_vault/policy.py +43 -42
  207. pulumi_vault/provider.py +120 -119
  208. pulumi_vault/pulumi-plugin.json +1 -1
  209. pulumi_vault/quota_lease_count.py +85 -84
  210. pulumi_vault/quota_rate_limit.py +113 -112
  211. pulumi_vault/rabbitmq/__init__.py +1 -0
  212. pulumi_vault/rabbitmq/_inputs.py +41 -40
  213. pulumi_vault/rabbitmq/outputs.py +25 -24
  214. pulumi_vault/rabbitmq/secret_backend.py +169 -168
  215. pulumi_vault/rabbitmq/secret_backend_role.py +57 -56
  216. pulumi_vault/raft_autopilot.py +113 -112
  217. pulumi_vault/raft_snapshot_agent_config.py +393 -392
  218. pulumi_vault/rgp_policy.py +57 -56
  219. pulumi_vault/saml/__init__.py +1 -0
  220. pulumi_vault/saml/auth_backend.py +155 -154
  221. pulumi_vault/saml/auth_backend_role.py +239 -238
  222. pulumi_vault/secrets/__init__.py +1 -0
  223. pulumi_vault/secrets/_inputs.py +16 -15
  224. pulumi_vault/secrets/outputs.py +10 -9
  225. pulumi_vault/secrets/sync_association.py +71 -70
  226. pulumi_vault/secrets/sync_aws_destination.py +148 -147
  227. pulumi_vault/secrets/sync_azure_destination.py +148 -147
  228. pulumi_vault/secrets/sync_config.py +43 -42
  229. pulumi_vault/secrets/sync_gcp_destination.py +106 -105
  230. pulumi_vault/secrets/sync_gh_destination.py +134 -133
  231. pulumi_vault/secrets/sync_github_apps.py +64 -63
  232. pulumi_vault/secrets/sync_vercel_destination.py +120 -119
  233. pulumi_vault/ssh/__init__.py +1 -0
  234. pulumi_vault/ssh/_inputs.py +11 -10
  235. pulumi_vault/ssh/get_secret_backend_sign.py +52 -51
  236. pulumi_vault/ssh/outputs.py +7 -6
  237. pulumi_vault/ssh/secret_backend_ca.py +99 -98
  238. pulumi_vault/ssh/secret_backend_role.py +365 -364
  239. pulumi_vault/terraformcloud/__init__.py +1 -0
  240. pulumi_vault/terraformcloud/secret_backend.py +111 -110
  241. pulumi_vault/terraformcloud/secret_creds.py +74 -73
  242. pulumi_vault/terraformcloud/secret_role.py +93 -92
  243. pulumi_vault/token.py +246 -245
  244. pulumi_vault/tokenauth/__init__.py +1 -0
  245. pulumi_vault/tokenauth/auth_backend_role.py +267 -266
  246. pulumi_vault/transform/__init__.py +1 -0
  247. pulumi_vault/transform/alphabet.py +57 -56
  248. pulumi_vault/transform/get_decode.py +47 -46
  249. pulumi_vault/transform/get_encode.py +47 -46
  250. pulumi_vault/transform/role.py +57 -56
  251. pulumi_vault/transform/template.py +113 -112
  252. pulumi_vault/transform/transformation.py +141 -140
  253. pulumi_vault/transit/__init__.py +1 -0
  254. pulumi_vault/transit/get_decrypt.py +18 -17
  255. pulumi_vault/transit/get_encrypt.py +21 -20
  256. pulumi_vault/transit/get_sign.py +54 -53
  257. pulumi_vault/transit/get_verify.py +60 -59
  258. pulumi_vault/transit/secret_backend_key.py +274 -273
  259. pulumi_vault/transit/secret_cache_config.py +43 -42
  260. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/METADATA +1 -1
  261. pulumi_vault-6.7.0a1744267302.dist-info/RECORD +265 -0
  262. pulumi_vault-6.7.0a1743576047.dist-info/RECORD +0 -265
  263. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/WHEEL +0 -0
  264. {pulumi_vault-6.7.0a1743576047.dist-info → pulumi_vault-6.7.0a1744267302.dist-info}/top_level.txt +0 -0
@@ -2,6 +2,7 @@
2
2
  # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
+ import builtins
5
6
  import copy
6
7
  import warnings
7
8
  import sys
@@ -19,28 +20,28 @@ __all__ = ['OidcRoleArgs', 'OidcRole']
19
20
  @pulumi.input_type
20
21
  class OidcRoleArgs:
21
22
  def __init__(__self__, *,
22
- key: pulumi.Input[str],
23
- client_id: Optional[pulumi.Input[str]] = None,
24
- name: Optional[pulumi.Input[str]] = None,
25
- namespace: Optional[pulumi.Input[str]] = None,
26
- template: Optional[pulumi.Input[str]] = None,
27
- ttl: Optional[pulumi.Input[int]] = None):
23
+ key: pulumi.Input[builtins.str],
24
+ client_id: Optional[pulumi.Input[builtins.str]] = None,
25
+ name: Optional[pulumi.Input[builtins.str]] = None,
26
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
27
+ template: Optional[pulumi.Input[builtins.str]] = None,
28
+ ttl: Optional[pulumi.Input[builtins.int]] = None):
28
29
  """
29
30
  The set of arguments for constructing a OidcRole resource.
30
- :param pulumi.Input[str] key: A configured named key, the key must already exist
31
+ :param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
31
32
  before tokens can be issued.
32
- :param pulumi.Input[str] client_id: The value that will be included in the `aud` field of all the OIDC identity
33
+ :param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
33
34
  tokens issued by this role
34
- :param pulumi.Input[str] name: Name of the OIDC Role to create.
35
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
35
+ :param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
36
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
36
37
  The value should not contain leading or trailing forward slashes.
37
38
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
38
39
  *Available only for Vault Enterprise*.
39
- :param pulumi.Input[str] template: The template string to use for generating tokens. This may be in
40
+ :param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
40
41
  string-ified JSON or base64 format. See the
41
42
  [documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
42
43
  for the template format.
43
- :param pulumi.Input[int] ttl: TTL of the tokens generated against the role in number of seconds.
44
+ :param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
44
45
  """
45
46
  pulumi.set(__self__, "key", key)
46
47
  if client_id is not None:
@@ -56,7 +57,7 @@ class OidcRoleArgs:
56
57
 
57
58
  @property
58
59
  @pulumi.getter
59
- def key(self) -> pulumi.Input[str]:
60
+ def key(self) -> pulumi.Input[builtins.str]:
60
61
  """
61
62
  A configured named key, the key must already exist
62
63
  before tokens can be issued.
@@ -64,12 +65,12 @@ class OidcRoleArgs:
64
65
  return pulumi.get(self, "key")
65
66
 
66
67
  @key.setter
67
- def key(self, value: pulumi.Input[str]):
68
+ def key(self, value: pulumi.Input[builtins.str]):
68
69
  pulumi.set(self, "key", value)
69
70
 
70
71
  @property
71
72
  @pulumi.getter(name="clientId")
72
- def client_id(self) -> Optional[pulumi.Input[str]]:
73
+ def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
73
74
  """
74
75
  The value that will be included in the `aud` field of all the OIDC identity
75
76
  tokens issued by this role
@@ -77,24 +78,24 @@ class OidcRoleArgs:
77
78
  return pulumi.get(self, "client_id")
78
79
 
79
80
  @client_id.setter
80
- def client_id(self, value: Optional[pulumi.Input[str]]):
81
+ def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
81
82
  pulumi.set(self, "client_id", value)
82
83
 
83
84
  @property
84
85
  @pulumi.getter
85
- def name(self) -> Optional[pulumi.Input[str]]:
86
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
86
87
  """
87
88
  Name of the OIDC Role to create.
88
89
  """
89
90
  return pulumi.get(self, "name")
90
91
 
91
92
  @name.setter
92
- def name(self, value: Optional[pulumi.Input[str]]):
93
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
93
94
  pulumi.set(self, "name", value)
94
95
 
95
96
  @property
96
97
  @pulumi.getter
97
- def namespace(self) -> Optional[pulumi.Input[str]]:
98
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
98
99
  """
99
100
  The namespace to provision the resource in.
100
101
  The value should not contain leading or trailing forward slashes.
@@ -104,12 +105,12 @@ class OidcRoleArgs:
104
105
  return pulumi.get(self, "namespace")
105
106
 
106
107
  @namespace.setter
107
- def namespace(self, value: Optional[pulumi.Input[str]]):
108
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
108
109
  pulumi.set(self, "namespace", value)
109
110
 
110
111
  @property
111
112
  @pulumi.getter
112
- def template(self) -> Optional[pulumi.Input[str]]:
113
+ def template(self) -> Optional[pulumi.Input[builtins.str]]:
113
114
  """
114
115
  The template string to use for generating tokens. This may be in
115
116
  string-ified JSON or base64 format. See the
@@ -119,47 +120,47 @@ class OidcRoleArgs:
119
120
  return pulumi.get(self, "template")
120
121
 
121
122
  @template.setter
122
- def template(self, value: Optional[pulumi.Input[str]]):
123
+ def template(self, value: Optional[pulumi.Input[builtins.str]]):
123
124
  pulumi.set(self, "template", value)
124
125
 
125
126
  @property
126
127
  @pulumi.getter
127
- def ttl(self) -> Optional[pulumi.Input[int]]:
128
+ def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
128
129
  """
129
130
  TTL of the tokens generated against the role in number of seconds.
130
131
  """
131
132
  return pulumi.get(self, "ttl")
132
133
 
133
134
  @ttl.setter
134
- def ttl(self, value: Optional[pulumi.Input[int]]):
135
+ def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
135
136
  pulumi.set(self, "ttl", value)
136
137
 
137
138
 
138
139
  @pulumi.input_type
139
140
  class _OidcRoleState:
140
141
  def __init__(__self__, *,
141
- client_id: Optional[pulumi.Input[str]] = None,
142
- key: Optional[pulumi.Input[str]] = None,
143
- name: Optional[pulumi.Input[str]] = None,
144
- namespace: Optional[pulumi.Input[str]] = None,
145
- template: Optional[pulumi.Input[str]] = None,
146
- ttl: Optional[pulumi.Input[int]] = None):
142
+ client_id: Optional[pulumi.Input[builtins.str]] = None,
143
+ key: Optional[pulumi.Input[builtins.str]] = None,
144
+ name: Optional[pulumi.Input[builtins.str]] = None,
145
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
146
+ template: Optional[pulumi.Input[builtins.str]] = None,
147
+ ttl: Optional[pulumi.Input[builtins.int]] = None):
147
148
  """
148
149
  Input properties used for looking up and filtering OidcRole resources.
149
- :param pulumi.Input[str] client_id: The value that will be included in the `aud` field of all the OIDC identity
150
+ :param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
150
151
  tokens issued by this role
151
- :param pulumi.Input[str] key: A configured named key, the key must already exist
152
+ :param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
152
153
  before tokens can be issued.
153
- :param pulumi.Input[str] name: Name of the OIDC Role to create.
154
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
154
+ :param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
155
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
155
156
  The value should not contain leading or trailing forward slashes.
156
157
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
157
158
  *Available only for Vault Enterprise*.
158
- :param pulumi.Input[str] template: The template string to use for generating tokens. This may be in
159
+ :param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
159
160
  string-ified JSON or base64 format. See the
160
161
  [documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
161
162
  for the template format.
162
- :param pulumi.Input[int] ttl: TTL of the tokens generated against the role in number of seconds.
163
+ :param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
163
164
  """
164
165
  if client_id is not None:
165
166
  pulumi.set(__self__, "client_id", client_id)
@@ -176,7 +177,7 @@ class _OidcRoleState:
176
177
 
177
178
  @property
178
179
  @pulumi.getter(name="clientId")
179
- def client_id(self) -> Optional[pulumi.Input[str]]:
180
+ def client_id(self) -> Optional[pulumi.Input[builtins.str]]:
180
181
  """
181
182
  The value that will be included in the `aud` field of all the OIDC identity
182
183
  tokens issued by this role
@@ -184,12 +185,12 @@ class _OidcRoleState:
184
185
  return pulumi.get(self, "client_id")
185
186
 
186
187
  @client_id.setter
187
- def client_id(self, value: Optional[pulumi.Input[str]]):
188
+ def client_id(self, value: Optional[pulumi.Input[builtins.str]]):
188
189
  pulumi.set(self, "client_id", value)
189
190
 
190
191
  @property
191
192
  @pulumi.getter
192
- def key(self) -> Optional[pulumi.Input[str]]:
193
+ def key(self) -> Optional[pulumi.Input[builtins.str]]:
193
194
  """
194
195
  A configured named key, the key must already exist
195
196
  before tokens can be issued.
@@ -197,24 +198,24 @@ class _OidcRoleState:
197
198
  return pulumi.get(self, "key")
198
199
 
199
200
  @key.setter
200
- def key(self, value: Optional[pulumi.Input[str]]):
201
+ def key(self, value: Optional[pulumi.Input[builtins.str]]):
201
202
  pulumi.set(self, "key", value)
202
203
 
203
204
  @property
204
205
  @pulumi.getter
205
- def name(self) -> Optional[pulumi.Input[str]]:
206
+ def name(self) -> Optional[pulumi.Input[builtins.str]]:
206
207
  """
207
208
  Name of the OIDC Role to create.
208
209
  """
209
210
  return pulumi.get(self, "name")
210
211
 
211
212
  @name.setter
212
- def name(self, value: Optional[pulumi.Input[str]]):
213
+ def name(self, value: Optional[pulumi.Input[builtins.str]]):
213
214
  pulumi.set(self, "name", value)
214
215
 
215
216
  @property
216
217
  @pulumi.getter
217
- def namespace(self) -> Optional[pulumi.Input[str]]:
218
+ def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
218
219
  """
219
220
  The namespace to provision the resource in.
220
221
  The value should not contain leading or trailing forward slashes.
@@ -224,12 +225,12 @@ class _OidcRoleState:
224
225
  return pulumi.get(self, "namespace")
225
226
 
226
227
  @namespace.setter
227
- def namespace(self, value: Optional[pulumi.Input[str]]):
228
+ def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
228
229
  pulumi.set(self, "namespace", value)
229
230
 
230
231
  @property
231
232
  @pulumi.getter
232
- def template(self) -> Optional[pulumi.Input[str]]:
233
+ def template(self) -> Optional[pulumi.Input[builtins.str]]:
233
234
  """
234
235
  The template string to use for generating tokens. This may be in
235
236
  string-ified JSON or base64 format. See the
@@ -239,19 +240,19 @@ class _OidcRoleState:
239
240
  return pulumi.get(self, "template")
240
241
 
241
242
  @template.setter
242
- def template(self, value: Optional[pulumi.Input[str]]):
243
+ def template(self, value: Optional[pulumi.Input[builtins.str]]):
243
244
  pulumi.set(self, "template", value)
244
245
 
245
246
  @property
246
247
  @pulumi.getter
247
- def ttl(self) -> Optional[pulumi.Input[int]]:
248
+ def ttl(self) -> Optional[pulumi.Input[builtins.int]]:
248
249
  """
249
250
  TTL of the tokens generated against the role in number of seconds.
250
251
  """
251
252
  return pulumi.get(self, "ttl")
252
253
 
253
254
  @ttl.setter
254
- def ttl(self, value: Optional[pulumi.Input[int]]):
255
+ def ttl(self, value: Optional[pulumi.Input[builtins.int]]):
255
256
  pulumi.set(self, "ttl", value)
256
257
 
257
258
 
@@ -260,12 +261,12 @@ class OidcRole(pulumi.CustomResource):
260
261
  def __init__(__self__,
261
262
  resource_name: str,
262
263
  opts: Optional[pulumi.ResourceOptions] = None,
263
- client_id: Optional[pulumi.Input[str]] = None,
264
- key: Optional[pulumi.Input[str]] = None,
265
- name: Optional[pulumi.Input[str]] = None,
266
- namespace: Optional[pulumi.Input[str]] = None,
267
- template: Optional[pulumi.Input[str]] = None,
268
- ttl: Optional[pulumi.Input[int]] = None,
264
+ client_id: Optional[pulumi.Input[builtins.str]] = None,
265
+ key: Optional[pulumi.Input[builtins.str]] = None,
266
+ name: Optional[pulumi.Input[builtins.str]] = None,
267
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
268
+ template: Optional[pulumi.Input[builtins.str]] = None,
269
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
269
270
  __props__=None):
270
271
  """
271
272
  ## Example Usage
@@ -322,20 +323,20 @@ class OidcRole(pulumi.CustomResource):
322
323
 
323
324
  :param str resource_name: The name of the resource.
324
325
  :param pulumi.ResourceOptions opts: Options for the resource.
325
- :param pulumi.Input[str] client_id: The value that will be included in the `aud` field of all the OIDC identity
326
+ :param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
326
327
  tokens issued by this role
327
- :param pulumi.Input[str] key: A configured named key, the key must already exist
328
+ :param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
328
329
  before tokens can be issued.
329
- :param pulumi.Input[str] name: Name of the OIDC Role to create.
330
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
330
+ :param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
331
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
331
332
  The value should not contain leading or trailing forward slashes.
332
333
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
333
334
  *Available only for Vault Enterprise*.
334
- :param pulumi.Input[str] template: The template string to use for generating tokens. This may be in
335
+ :param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
335
336
  string-ified JSON or base64 format. See the
336
337
  [documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
337
338
  for the template format.
338
- :param pulumi.Input[int] ttl: TTL of the tokens generated against the role in number of seconds.
339
+ :param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
339
340
  """
340
341
  ...
341
342
  @overload
@@ -411,12 +412,12 @@ class OidcRole(pulumi.CustomResource):
411
412
  def _internal_init(__self__,
412
413
  resource_name: str,
413
414
  opts: Optional[pulumi.ResourceOptions] = None,
414
- client_id: Optional[pulumi.Input[str]] = None,
415
- key: Optional[pulumi.Input[str]] = None,
416
- name: Optional[pulumi.Input[str]] = None,
417
- namespace: Optional[pulumi.Input[str]] = None,
418
- template: Optional[pulumi.Input[str]] = None,
419
- ttl: Optional[pulumi.Input[int]] = None,
415
+ client_id: Optional[pulumi.Input[builtins.str]] = None,
416
+ key: Optional[pulumi.Input[builtins.str]] = None,
417
+ name: Optional[pulumi.Input[builtins.str]] = None,
418
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
419
+ template: Optional[pulumi.Input[builtins.str]] = None,
420
+ ttl: Optional[pulumi.Input[builtins.int]] = None,
420
421
  __props__=None):
421
422
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
422
423
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -444,12 +445,12 @@ class OidcRole(pulumi.CustomResource):
444
445
  def get(resource_name: str,
445
446
  id: pulumi.Input[str],
446
447
  opts: Optional[pulumi.ResourceOptions] = None,
447
- client_id: Optional[pulumi.Input[str]] = None,
448
- key: Optional[pulumi.Input[str]] = None,
449
- name: Optional[pulumi.Input[str]] = None,
450
- namespace: Optional[pulumi.Input[str]] = None,
451
- template: Optional[pulumi.Input[str]] = None,
452
- ttl: Optional[pulumi.Input[int]] = None) -> 'OidcRole':
448
+ client_id: Optional[pulumi.Input[builtins.str]] = None,
449
+ key: Optional[pulumi.Input[builtins.str]] = None,
450
+ name: Optional[pulumi.Input[builtins.str]] = None,
451
+ namespace: Optional[pulumi.Input[builtins.str]] = None,
452
+ template: Optional[pulumi.Input[builtins.str]] = None,
453
+ ttl: Optional[pulumi.Input[builtins.int]] = None) -> 'OidcRole':
453
454
  """
454
455
  Get an existing OidcRole resource's state with the given name, id, and optional extra
455
456
  properties used to qualify the lookup.
@@ -457,20 +458,20 @@ class OidcRole(pulumi.CustomResource):
457
458
  :param str resource_name: The unique name of the resulting resource.
458
459
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
459
460
  :param pulumi.ResourceOptions opts: Options for the resource.
460
- :param pulumi.Input[str] client_id: The value that will be included in the `aud` field of all the OIDC identity
461
+ :param pulumi.Input[builtins.str] client_id: The value that will be included in the `aud` field of all the OIDC identity
461
462
  tokens issued by this role
462
- :param pulumi.Input[str] key: A configured named key, the key must already exist
463
+ :param pulumi.Input[builtins.str] key: A configured named key, the key must already exist
463
464
  before tokens can be issued.
464
- :param pulumi.Input[str] name: Name of the OIDC Role to create.
465
- :param pulumi.Input[str] namespace: The namespace to provision the resource in.
465
+ :param pulumi.Input[builtins.str] name: Name of the OIDC Role to create.
466
+ :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
466
467
  The value should not contain leading or trailing forward slashes.
467
468
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
468
469
  *Available only for Vault Enterprise*.
469
- :param pulumi.Input[str] template: The template string to use for generating tokens. This may be in
470
+ :param pulumi.Input[builtins.str] template: The template string to use for generating tokens. This may be in
470
471
  string-ified JSON or base64 format. See the
471
472
  [documentation](https://www.vaultproject.io/docs/secrets/identity/index.html#token-contents-and-templates)
472
473
  for the template format.
473
- :param pulumi.Input[int] ttl: TTL of the tokens generated against the role in number of seconds.
474
+ :param pulumi.Input[builtins.int] ttl: TTL of the tokens generated against the role in number of seconds.
474
475
  """
475
476
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
476
477
 
@@ -486,7 +487,7 @@ class OidcRole(pulumi.CustomResource):
486
487
 
487
488
  @property
488
489
  @pulumi.getter(name="clientId")
489
- def client_id(self) -> pulumi.Output[str]:
490
+ def client_id(self) -> pulumi.Output[builtins.str]:
490
491
  """
491
492
  The value that will be included in the `aud` field of all the OIDC identity
492
493
  tokens issued by this role
@@ -495,7 +496,7 @@ class OidcRole(pulumi.CustomResource):
495
496
 
496
497
  @property
497
498
  @pulumi.getter
498
- def key(self) -> pulumi.Output[str]:
499
+ def key(self) -> pulumi.Output[builtins.str]:
499
500
  """
500
501
  A configured named key, the key must already exist
501
502
  before tokens can be issued.
@@ -504,7 +505,7 @@ class OidcRole(pulumi.CustomResource):
504
505
 
505
506
  @property
506
507
  @pulumi.getter
507
- def name(self) -> pulumi.Output[str]:
508
+ def name(self) -> pulumi.Output[builtins.str]:
508
509
  """
509
510
  Name of the OIDC Role to create.
510
511
  """
@@ -512,7 +513,7 @@ class OidcRole(pulumi.CustomResource):
512
513
 
513
514
  @property
514
515
  @pulumi.getter
515
- def namespace(self) -> pulumi.Output[Optional[str]]:
516
+ def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
516
517
  """
517
518
  The namespace to provision the resource in.
518
519
  The value should not contain leading or trailing forward slashes.
@@ -523,7 +524,7 @@ class OidcRole(pulumi.CustomResource):
523
524
 
524
525
  @property
525
526
  @pulumi.getter
526
- def template(self) -> pulumi.Output[Optional[str]]:
527
+ def template(self) -> pulumi.Output[Optional[builtins.str]]:
527
528
  """
528
529
  The template string to use for generating tokens. This may be in
529
530
  string-ified JSON or base64 format. See the
@@ -534,7 +535,7 @@ class OidcRole(pulumi.CustomResource):
534
535
 
535
536
  @property
536
537
  @pulumi.getter
537
- def ttl(self) -> pulumi.Output[Optional[int]]:
538
+ def ttl(self) -> pulumi.Output[Optional[builtins.int]]:
538
539
  """
539
540
  TTL of the tokens generated against the role in number of seconds.
540
541
  """