pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,48 +19,48 @@ __all__ = ['AuthBackendRoleArgs', 'AuthBackendRole']
20
19
  @pulumi.input_type
21
20
  class AuthBackendRoleArgs:
22
21
  def __init__(__self__, *,
23
- path: pulumi.Input[builtins.str],
24
- bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
25
- bound_attributes_type: Optional[pulumi.Input[builtins.str]] = None,
26
- bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- bound_subjects_type: Optional[pulumi.Input[builtins.str]] = None,
28
- groups_attribute: Optional[pulumi.Input[builtins.str]] = None,
29
- name: Optional[pulumi.Input[builtins.str]] = None,
30
- namespace: Optional[pulumi.Input[builtins.str]] = None,
31
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
32
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
33
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
34
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
35
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
36
- token_period: Optional[pulumi.Input[builtins.int]] = None,
37
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
38
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
39
- token_type: Optional[pulumi.Input[builtins.str]] = None):
22
+ path: pulumi.Input[_builtins.str],
23
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
24
+ bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
25
+ bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
27
+ groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
28
+ name: Optional[pulumi.Input[_builtins.str]] = None,
29
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
30
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
31
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
32
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
33
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
34
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
35
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
36
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
37
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
38
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
40
39
  """
41
40
  The set of arguments for constructing a AuthBackendRole resource.
42
- :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted.
43
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
41
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
42
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
44
43
  exist in the SAML assertion.
45
- :param pulumi.Input[builtins.str] bound_attributes_type: The type of matching assertion to perform on
44
+ :param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
46
45
  `bound_attributes_type`.
47
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
48
- :param pulumi.Input[builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
49
- :param pulumi.Input[builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
46
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
47
+ :param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
48
+ :param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
50
49
  user belongs.
51
- :param pulumi.Input[builtins.str] name: Unique name of the role.
52
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
50
+ :param pulumi.Input[_builtins.str] name: Unique name of the role.
51
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
53
52
  The value should not contain leading or trailing forward slashes.
54
53
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
55
54
  *Available only for Vault Enterprise*.
56
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
57
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
58
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
59
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
60
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
61
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
62
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
63
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
64
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
56
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
57
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
58
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
59
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
60
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
61
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
62
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
63
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
65
64
  """
66
65
  pulumi.set(__self__, "path", path)
67
66
  if bound_attributes is not None:
@@ -97,21 +96,21 @@ class AuthBackendRoleArgs:
97
96
  if token_type is not None:
98
97
  pulumi.set(__self__, "token_type", token_type)
99
98
 
100
- @property
99
+ @_builtins.property
101
100
  @pulumi.getter
102
- def path(self) -> pulumi.Input[builtins.str]:
101
+ def path(self) -> pulumi.Input[_builtins.str]:
103
102
  """
104
103
  Path where the auth backend is mounted.
105
104
  """
106
105
  return pulumi.get(self, "path")
107
106
 
108
107
  @path.setter
109
- def path(self, value: pulumi.Input[builtins.str]):
108
+ def path(self, value: pulumi.Input[_builtins.str]):
110
109
  pulumi.set(self, "path", value)
111
110
 
112
- @property
111
+ @_builtins.property
113
112
  @pulumi.getter(name="boundAttributes")
114
- def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
113
+ def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
115
114
  """
116
115
  Mapping of attribute names to values that are expected to
117
116
  exist in the SAML assertion.
@@ -119,12 +118,12 @@ class AuthBackendRoleArgs:
119
118
  return pulumi.get(self, "bound_attributes")
120
119
 
121
120
  @bound_attributes.setter
122
- def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
121
+ def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
123
122
  pulumi.set(self, "bound_attributes", value)
124
123
 
125
- @property
124
+ @_builtins.property
126
125
  @pulumi.getter(name="boundAttributesType")
127
- def bound_attributes_type(self) -> Optional[pulumi.Input[builtins.str]]:
126
+ def bound_attributes_type(self) -> Optional[pulumi.Input[_builtins.str]]:
128
127
  """
129
128
  The type of matching assertion to perform on
130
129
  `bound_attributes_type`.
@@ -132,36 +131,36 @@ class AuthBackendRoleArgs:
132
131
  return pulumi.get(self, "bound_attributes_type")
133
132
 
134
133
  @bound_attributes_type.setter
135
- def bound_attributes_type(self, value: Optional[pulumi.Input[builtins.str]]):
134
+ def bound_attributes_type(self, value: Optional[pulumi.Input[_builtins.str]]):
136
135
  pulumi.set(self, "bound_attributes_type", value)
137
136
 
138
- @property
137
+ @_builtins.property
139
138
  @pulumi.getter(name="boundSubjects")
140
- def bound_subjects(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
139
+ def bound_subjects(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
141
140
  """
142
141
  List of subjects being asserted for SAML authentication.
143
142
  """
144
143
  return pulumi.get(self, "bound_subjects")
145
144
 
146
145
  @bound_subjects.setter
147
- def bound_subjects(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
146
+ def bound_subjects(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
148
147
  pulumi.set(self, "bound_subjects", value)
149
148
 
150
- @property
149
+ @_builtins.property
151
150
  @pulumi.getter(name="boundSubjectsType")
152
- def bound_subjects_type(self) -> Optional[pulumi.Input[builtins.str]]:
151
+ def bound_subjects_type(self) -> Optional[pulumi.Input[_builtins.str]]:
153
152
  """
154
153
  The type of matching assertion to perform on `bound_subjects`.
155
154
  """
156
155
  return pulumi.get(self, "bound_subjects_type")
157
156
 
158
157
  @bound_subjects_type.setter
159
- def bound_subjects_type(self, value: Optional[pulumi.Input[builtins.str]]):
158
+ def bound_subjects_type(self, value: Optional[pulumi.Input[_builtins.str]]):
160
159
  pulumi.set(self, "bound_subjects_type", value)
161
160
 
162
- @property
161
+ @_builtins.property
163
162
  @pulumi.getter(name="groupsAttribute")
164
- def groups_attribute(self) -> Optional[pulumi.Input[builtins.str]]:
163
+ def groups_attribute(self) -> Optional[pulumi.Input[_builtins.str]]:
165
164
  """
166
165
  The attribute to use to identify the set of groups to which the
167
166
  user belongs.
@@ -169,24 +168,24 @@ class AuthBackendRoleArgs:
169
168
  return pulumi.get(self, "groups_attribute")
170
169
 
171
170
  @groups_attribute.setter
172
- def groups_attribute(self, value: Optional[pulumi.Input[builtins.str]]):
171
+ def groups_attribute(self, value: Optional[pulumi.Input[_builtins.str]]):
173
172
  pulumi.set(self, "groups_attribute", value)
174
173
 
175
- @property
174
+ @_builtins.property
176
175
  @pulumi.getter
177
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
176
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
178
177
  """
179
178
  Unique name of the role.
180
179
  """
181
180
  return pulumi.get(self, "name")
182
181
 
183
182
  @name.setter
184
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
183
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
185
184
  pulumi.set(self, "name", value)
186
185
 
187
- @property
186
+ @_builtins.property
188
187
  @pulumi.getter
189
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
188
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
190
189
  """
191
190
  The namespace to provision the resource in.
192
191
  The value should not contain leading or trailing forward slashes.
@@ -196,163 +195,163 @@ class AuthBackendRoleArgs:
196
195
  return pulumi.get(self, "namespace")
197
196
 
198
197
  @namespace.setter
199
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
198
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
200
199
  pulumi.set(self, "namespace", value)
201
200
 
202
- @property
201
+ @_builtins.property
203
202
  @pulumi.getter(name="tokenBoundCidrs")
204
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
203
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
205
204
  """
206
205
  Specifies the blocks of IP addresses which are allowed to use the generated token
207
206
  """
208
207
  return pulumi.get(self, "token_bound_cidrs")
209
208
 
210
209
  @token_bound_cidrs.setter
211
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
210
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
212
211
  pulumi.set(self, "token_bound_cidrs", value)
213
212
 
214
- @property
213
+ @_builtins.property
215
214
  @pulumi.getter(name="tokenExplicitMaxTtl")
216
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
215
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
217
216
  """
218
217
  Generated Token's Explicit Maximum TTL in seconds
219
218
  """
220
219
  return pulumi.get(self, "token_explicit_max_ttl")
221
220
 
222
221
  @token_explicit_max_ttl.setter
223
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
222
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
224
223
  pulumi.set(self, "token_explicit_max_ttl", value)
225
224
 
226
- @property
225
+ @_builtins.property
227
226
  @pulumi.getter(name="tokenMaxTtl")
228
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
227
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
229
228
  """
230
229
  The maximum lifetime of the generated token
231
230
  """
232
231
  return pulumi.get(self, "token_max_ttl")
233
232
 
234
233
  @token_max_ttl.setter
235
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
234
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
236
235
  pulumi.set(self, "token_max_ttl", value)
237
236
 
238
- @property
237
+ @_builtins.property
239
238
  @pulumi.getter(name="tokenNoDefaultPolicy")
240
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
239
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
241
240
  """
242
241
  If true, the 'default' policy will not automatically be added to generated tokens
243
242
  """
244
243
  return pulumi.get(self, "token_no_default_policy")
245
244
 
246
245
  @token_no_default_policy.setter
247
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
246
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
248
247
  pulumi.set(self, "token_no_default_policy", value)
249
248
 
250
- @property
249
+ @_builtins.property
251
250
  @pulumi.getter(name="tokenNumUses")
252
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
251
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
253
252
  """
254
253
  The maximum number of times a token may be used, a value of zero means unlimited
255
254
  """
256
255
  return pulumi.get(self, "token_num_uses")
257
256
 
258
257
  @token_num_uses.setter
259
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
258
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
260
259
  pulumi.set(self, "token_num_uses", value)
261
260
 
262
- @property
261
+ @_builtins.property
263
262
  @pulumi.getter(name="tokenPeriod")
264
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
263
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
265
264
  """
266
265
  Generated Token's Period
267
266
  """
268
267
  return pulumi.get(self, "token_period")
269
268
 
270
269
  @token_period.setter
271
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
270
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
272
271
  pulumi.set(self, "token_period", value)
273
272
 
274
- @property
273
+ @_builtins.property
275
274
  @pulumi.getter(name="tokenPolicies")
276
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
275
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
277
276
  """
278
277
  Generated Token's Policies
279
278
  """
280
279
  return pulumi.get(self, "token_policies")
281
280
 
282
281
  @token_policies.setter
283
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
282
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
284
283
  pulumi.set(self, "token_policies", value)
285
284
 
286
- @property
285
+ @_builtins.property
287
286
  @pulumi.getter(name="tokenTtl")
288
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
287
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
289
288
  """
290
289
  The initial ttl of the token to generate in seconds
291
290
  """
292
291
  return pulumi.get(self, "token_ttl")
293
292
 
294
293
  @token_ttl.setter
295
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
294
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
296
295
  pulumi.set(self, "token_ttl", value)
297
296
 
298
- @property
297
+ @_builtins.property
299
298
  @pulumi.getter(name="tokenType")
300
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
299
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
301
300
  """
302
301
  The type of token to generate, service or batch
303
302
  """
304
303
  return pulumi.get(self, "token_type")
305
304
 
306
305
  @token_type.setter
307
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
306
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
308
307
  pulumi.set(self, "token_type", value)
309
308
 
310
309
 
311
310
  @pulumi.input_type
312
311
  class _AuthBackendRoleState:
313
312
  def __init__(__self__, *,
314
- bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
315
- bound_attributes_type: Optional[pulumi.Input[builtins.str]] = None,
316
- bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
317
- bound_subjects_type: Optional[pulumi.Input[builtins.str]] = None,
318
- groups_attribute: Optional[pulumi.Input[builtins.str]] = None,
319
- name: Optional[pulumi.Input[builtins.str]] = None,
320
- namespace: Optional[pulumi.Input[builtins.str]] = None,
321
- path: Optional[pulumi.Input[builtins.str]] = None,
322
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
323
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
324
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
325
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
326
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
327
- token_period: Optional[pulumi.Input[builtins.int]] = None,
328
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
329
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
330
- token_type: Optional[pulumi.Input[builtins.str]] = None):
313
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
314
+ bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
315
+ bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
316
+ bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
317
+ groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
318
+ name: Optional[pulumi.Input[_builtins.str]] = None,
319
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
320
+ path: Optional[pulumi.Input[_builtins.str]] = None,
321
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
322
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
323
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
324
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
325
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
326
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
327
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
328
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
329
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
331
330
  """
332
331
  Input properties used for looking up and filtering AuthBackendRole resources.
333
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
332
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
334
333
  exist in the SAML assertion.
335
- :param pulumi.Input[builtins.str] bound_attributes_type: The type of matching assertion to perform on
334
+ :param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
336
335
  `bound_attributes_type`.
337
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
338
- :param pulumi.Input[builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
339
- :param pulumi.Input[builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
336
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
337
+ :param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
338
+ :param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
340
339
  user belongs.
341
- :param pulumi.Input[builtins.str] name: Unique name of the role.
342
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
340
+ :param pulumi.Input[_builtins.str] name: Unique name of the role.
341
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
343
342
  The value should not contain leading or trailing forward slashes.
344
343
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
345
344
  *Available only for Vault Enterprise*.
346
- :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted.
347
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
348
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
349
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
350
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
351
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
352
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
353
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
354
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
355
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
345
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
346
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
347
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
348
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
349
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
350
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
351
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
352
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
353
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
354
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
356
355
  """
357
356
  if bound_attributes is not None:
358
357
  pulumi.set(__self__, "bound_attributes", bound_attributes)
@@ -389,9 +388,9 @@ class _AuthBackendRoleState:
389
388
  if token_type is not None:
390
389
  pulumi.set(__self__, "token_type", token_type)
391
390
 
392
- @property
391
+ @_builtins.property
393
392
  @pulumi.getter(name="boundAttributes")
394
- def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]:
393
+ def bound_attributes(self) -> Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]:
395
394
  """
396
395
  Mapping of attribute names to values that are expected to
397
396
  exist in the SAML assertion.
@@ -399,12 +398,12 @@ class _AuthBackendRoleState:
399
398
  return pulumi.get(self, "bound_attributes")
400
399
 
401
400
  @bound_attributes.setter
402
- def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]]):
401
+ def bound_attributes(self, value: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]]):
403
402
  pulumi.set(self, "bound_attributes", value)
404
403
 
405
- @property
404
+ @_builtins.property
406
405
  @pulumi.getter(name="boundAttributesType")
407
- def bound_attributes_type(self) -> Optional[pulumi.Input[builtins.str]]:
406
+ def bound_attributes_type(self) -> Optional[pulumi.Input[_builtins.str]]:
408
407
  """
409
408
  The type of matching assertion to perform on
410
409
  `bound_attributes_type`.
@@ -412,36 +411,36 @@ class _AuthBackendRoleState:
412
411
  return pulumi.get(self, "bound_attributes_type")
413
412
 
414
413
  @bound_attributes_type.setter
415
- def bound_attributes_type(self, value: Optional[pulumi.Input[builtins.str]]):
414
+ def bound_attributes_type(self, value: Optional[pulumi.Input[_builtins.str]]):
416
415
  pulumi.set(self, "bound_attributes_type", value)
417
416
 
418
- @property
417
+ @_builtins.property
419
418
  @pulumi.getter(name="boundSubjects")
420
- def bound_subjects(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
419
+ def bound_subjects(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
421
420
  """
422
421
  List of subjects being asserted for SAML authentication.
423
422
  """
424
423
  return pulumi.get(self, "bound_subjects")
425
424
 
426
425
  @bound_subjects.setter
427
- def bound_subjects(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
426
+ def bound_subjects(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
428
427
  pulumi.set(self, "bound_subjects", value)
429
428
 
430
- @property
429
+ @_builtins.property
431
430
  @pulumi.getter(name="boundSubjectsType")
432
- def bound_subjects_type(self) -> Optional[pulumi.Input[builtins.str]]:
431
+ def bound_subjects_type(self) -> Optional[pulumi.Input[_builtins.str]]:
433
432
  """
434
433
  The type of matching assertion to perform on `bound_subjects`.
435
434
  """
436
435
  return pulumi.get(self, "bound_subjects_type")
437
436
 
438
437
  @bound_subjects_type.setter
439
- def bound_subjects_type(self, value: Optional[pulumi.Input[builtins.str]]):
438
+ def bound_subjects_type(self, value: Optional[pulumi.Input[_builtins.str]]):
440
439
  pulumi.set(self, "bound_subjects_type", value)
441
440
 
442
- @property
441
+ @_builtins.property
443
442
  @pulumi.getter(name="groupsAttribute")
444
- def groups_attribute(self) -> Optional[pulumi.Input[builtins.str]]:
443
+ def groups_attribute(self) -> Optional[pulumi.Input[_builtins.str]]:
445
444
  """
446
445
  The attribute to use to identify the set of groups to which the
447
446
  user belongs.
@@ -449,24 +448,24 @@ class _AuthBackendRoleState:
449
448
  return pulumi.get(self, "groups_attribute")
450
449
 
451
450
  @groups_attribute.setter
452
- def groups_attribute(self, value: Optional[pulumi.Input[builtins.str]]):
451
+ def groups_attribute(self, value: Optional[pulumi.Input[_builtins.str]]):
453
452
  pulumi.set(self, "groups_attribute", value)
454
453
 
455
- @property
454
+ @_builtins.property
456
455
  @pulumi.getter
457
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
456
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
458
457
  """
459
458
  Unique name of the role.
460
459
  """
461
460
  return pulumi.get(self, "name")
462
461
 
463
462
  @name.setter
464
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
463
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
465
464
  pulumi.set(self, "name", value)
466
465
 
467
- @property
466
+ @_builtins.property
468
467
  @pulumi.getter
469
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
468
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
470
469
  """
471
470
  The namespace to provision the resource in.
472
471
  The value should not contain leading or trailing forward slashes.
@@ -476,127 +475,127 @@ class _AuthBackendRoleState:
476
475
  return pulumi.get(self, "namespace")
477
476
 
478
477
  @namespace.setter
479
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
478
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
480
479
  pulumi.set(self, "namespace", value)
481
480
 
482
- @property
481
+ @_builtins.property
483
482
  @pulumi.getter
484
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
483
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
485
484
  """
486
485
  Path where the auth backend is mounted.
487
486
  """
488
487
  return pulumi.get(self, "path")
489
488
 
490
489
  @path.setter
491
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
490
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
492
491
  pulumi.set(self, "path", value)
493
492
 
494
- @property
493
+ @_builtins.property
495
494
  @pulumi.getter(name="tokenBoundCidrs")
496
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
495
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
497
496
  """
498
497
  Specifies the blocks of IP addresses which are allowed to use the generated token
499
498
  """
500
499
  return pulumi.get(self, "token_bound_cidrs")
501
500
 
502
501
  @token_bound_cidrs.setter
503
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
502
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
504
503
  pulumi.set(self, "token_bound_cidrs", value)
505
504
 
506
- @property
505
+ @_builtins.property
507
506
  @pulumi.getter(name="tokenExplicitMaxTtl")
508
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
507
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
509
508
  """
510
509
  Generated Token's Explicit Maximum TTL in seconds
511
510
  """
512
511
  return pulumi.get(self, "token_explicit_max_ttl")
513
512
 
514
513
  @token_explicit_max_ttl.setter
515
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
514
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
516
515
  pulumi.set(self, "token_explicit_max_ttl", value)
517
516
 
518
- @property
517
+ @_builtins.property
519
518
  @pulumi.getter(name="tokenMaxTtl")
520
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
519
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
521
520
  """
522
521
  The maximum lifetime of the generated token
523
522
  """
524
523
  return pulumi.get(self, "token_max_ttl")
525
524
 
526
525
  @token_max_ttl.setter
527
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
526
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
528
527
  pulumi.set(self, "token_max_ttl", value)
529
528
 
530
- @property
529
+ @_builtins.property
531
530
  @pulumi.getter(name="tokenNoDefaultPolicy")
532
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
531
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
533
532
  """
534
533
  If true, the 'default' policy will not automatically be added to generated tokens
535
534
  """
536
535
  return pulumi.get(self, "token_no_default_policy")
537
536
 
538
537
  @token_no_default_policy.setter
539
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
538
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
540
539
  pulumi.set(self, "token_no_default_policy", value)
541
540
 
542
- @property
541
+ @_builtins.property
543
542
  @pulumi.getter(name="tokenNumUses")
544
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
543
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
545
544
  """
546
545
  The maximum number of times a token may be used, a value of zero means unlimited
547
546
  """
548
547
  return pulumi.get(self, "token_num_uses")
549
548
 
550
549
  @token_num_uses.setter
551
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
550
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
552
551
  pulumi.set(self, "token_num_uses", value)
553
552
 
554
- @property
553
+ @_builtins.property
555
554
  @pulumi.getter(name="tokenPeriod")
556
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
555
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
557
556
  """
558
557
  Generated Token's Period
559
558
  """
560
559
  return pulumi.get(self, "token_period")
561
560
 
562
561
  @token_period.setter
563
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
562
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
564
563
  pulumi.set(self, "token_period", value)
565
564
 
566
- @property
565
+ @_builtins.property
567
566
  @pulumi.getter(name="tokenPolicies")
568
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
567
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
569
568
  """
570
569
  Generated Token's Policies
571
570
  """
572
571
  return pulumi.get(self, "token_policies")
573
572
 
574
573
  @token_policies.setter
575
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
574
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
576
575
  pulumi.set(self, "token_policies", value)
577
576
 
578
- @property
577
+ @_builtins.property
579
578
  @pulumi.getter(name="tokenTtl")
580
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
579
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
581
580
  """
582
581
  The initial ttl of the token to generate in seconds
583
582
  """
584
583
  return pulumi.get(self, "token_ttl")
585
584
 
586
585
  @token_ttl.setter
587
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
586
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
588
587
  pulumi.set(self, "token_ttl", value)
589
588
 
590
- @property
589
+ @_builtins.property
591
590
  @pulumi.getter(name="tokenType")
592
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
591
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
593
592
  """
594
593
  The type of token to generate, service or batch
595
594
  """
596
595
  return pulumi.get(self, "token_type")
597
596
 
598
597
  @token_type.setter
599
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
598
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
600
599
  pulumi.set(self, "token_type", value)
601
600
 
602
601
 
@@ -606,23 +605,23 @@ class AuthBackendRole(pulumi.CustomResource):
606
605
  def __init__(__self__,
607
606
  resource_name: str,
608
607
  opts: Optional[pulumi.ResourceOptions] = None,
609
- bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
610
- bound_attributes_type: Optional[pulumi.Input[builtins.str]] = None,
611
- bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
612
- bound_subjects_type: Optional[pulumi.Input[builtins.str]] = None,
613
- groups_attribute: Optional[pulumi.Input[builtins.str]] = None,
614
- name: Optional[pulumi.Input[builtins.str]] = None,
615
- namespace: Optional[pulumi.Input[builtins.str]] = None,
616
- path: Optional[pulumi.Input[builtins.str]] = None,
617
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
618
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
619
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
620
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
621
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
622
- token_period: Optional[pulumi.Input[builtins.int]] = None,
623
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
624
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
625
- token_type: Optional[pulumi.Input[builtins.str]] = None,
608
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
609
+ bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
610
+ bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
611
+ bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
612
+ groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
613
+ name: Optional[pulumi.Input[_builtins.str]] = None,
614
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
615
+ path: Optional[pulumi.Input[_builtins.str]] = None,
616
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
617
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
618
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
619
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
620
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
621
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
622
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
623
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
624
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
626
625
  __props__=None):
627
626
  """
628
627
  Manages an SAML auth backend role in a Vault server. See the [Vault
@@ -663,29 +662,29 @@ class AuthBackendRole(pulumi.CustomResource):
663
662
 
664
663
  :param str resource_name: The name of the resource.
665
664
  :param pulumi.ResourceOptions opts: Options for the resource.
666
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
665
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
667
666
  exist in the SAML assertion.
668
- :param pulumi.Input[builtins.str] bound_attributes_type: The type of matching assertion to perform on
667
+ :param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
669
668
  `bound_attributes_type`.
670
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
671
- :param pulumi.Input[builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
672
- :param pulumi.Input[builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
669
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
670
+ :param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
671
+ :param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
673
672
  user belongs.
674
- :param pulumi.Input[builtins.str] name: Unique name of the role.
675
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
673
+ :param pulumi.Input[_builtins.str] name: Unique name of the role.
674
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
676
675
  The value should not contain leading or trailing forward slashes.
677
676
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
678
677
  *Available only for Vault Enterprise*.
679
- :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted.
680
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
681
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
682
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
683
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
684
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
685
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
686
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
687
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
688
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
678
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
679
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
680
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
681
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
682
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
683
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
684
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
685
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
686
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
687
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
689
688
  """
690
689
  ...
691
690
  @overload
@@ -745,23 +744,23 @@ class AuthBackendRole(pulumi.CustomResource):
745
744
  def _internal_init(__self__,
746
745
  resource_name: str,
747
746
  opts: Optional[pulumi.ResourceOptions] = None,
748
- bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
749
- bound_attributes_type: Optional[pulumi.Input[builtins.str]] = None,
750
- bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
751
- bound_subjects_type: Optional[pulumi.Input[builtins.str]] = None,
752
- groups_attribute: Optional[pulumi.Input[builtins.str]] = None,
753
- name: Optional[pulumi.Input[builtins.str]] = None,
754
- namespace: Optional[pulumi.Input[builtins.str]] = None,
755
- path: Optional[pulumi.Input[builtins.str]] = None,
756
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
757
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
758
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
759
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
760
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
761
- token_period: Optional[pulumi.Input[builtins.int]] = None,
762
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
763
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
764
- token_type: Optional[pulumi.Input[builtins.str]] = None,
747
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
748
+ bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
749
+ bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
750
+ bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
751
+ groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
752
+ name: Optional[pulumi.Input[_builtins.str]] = None,
753
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
754
+ path: Optional[pulumi.Input[_builtins.str]] = None,
755
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
756
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
757
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
758
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
759
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
760
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
761
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
762
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
763
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
765
764
  __props__=None):
766
765
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
767
766
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -800,23 +799,23 @@ class AuthBackendRole(pulumi.CustomResource):
800
799
  def get(resource_name: str,
801
800
  id: pulumi.Input[str],
802
801
  opts: Optional[pulumi.ResourceOptions] = None,
803
- bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]]] = None,
804
- bound_attributes_type: Optional[pulumi.Input[builtins.str]] = None,
805
- bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
806
- bound_subjects_type: Optional[pulumi.Input[builtins.str]] = None,
807
- groups_attribute: Optional[pulumi.Input[builtins.str]] = None,
808
- name: Optional[pulumi.Input[builtins.str]] = None,
809
- namespace: Optional[pulumi.Input[builtins.str]] = None,
810
- path: Optional[pulumi.Input[builtins.str]] = None,
811
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
812
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
813
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
814
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
815
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
816
- token_period: Optional[pulumi.Input[builtins.int]] = None,
817
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
818
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
819
- token_type: Optional[pulumi.Input[builtins.str]] = None) -> 'AuthBackendRole':
802
+ bound_attributes: Optional[pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]]] = None,
803
+ bound_attributes_type: Optional[pulumi.Input[_builtins.str]] = None,
804
+ bound_subjects: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
805
+ bound_subjects_type: Optional[pulumi.Input[_builtins.str]] = None,
806
+ groups_attribute: Optional[pulumi.Input[_builtins.str]] = None,
807
+ name: Optional[pulumi.Input[_builtins.str]] = None,
808
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
809
+ path: Optional[pulumi.Input[_builtins.str]] = None,
810
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
811
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
812
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
813
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
814
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
815
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
816
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
817
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
818
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendRole':
820
819
  """
821
820
  Get an existing AuthBackendRole resource's state with the given name, id, and optional extra
822
821
  properties used to qualify the lookup.
@@ -824,29 +823,29 @@ class AuthBackendRole(pulumi.CustomResource):
824
823
  :param str resource_name: The unique name of the resulting resource.
825
824
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
826
825
  :param pulumi.ResourceOptions opts: Options for the resource.
827
- :param pulumi.Input[Mapping[str, pulumi.Input[builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
826
+ :param pulumi.Input[Mapping[str, pulumi.Input[_builtins.str]]] bound_attributes: Mapping of attribute names to values that are expected to
828
827
  exist in the SAML assertion.
829
- :param pulumi.Input[builtins.str] bound_attributes_type: The type of matching assertion to perform on
828
+ :param pulumi.Input[_builtins.str] bound_attributes_type: The type of matching assertion to perform on
830
829
  `bound_attributes_type`.
831
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
832
- :param pulumi.Input[builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
833
- :param pulumi.Input[builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
830
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] bound_subjects: List of subjects being asserted for SAML authentication.
831
+ :param pulumi.Input[_builtins.str] bound_subjects_type: The type of matching assertion to perform on `bound_subjects`.
832
+ :param pulumi.Input[_builtins.str] groups_attribute: The attribute to use to identify the set of groups to which the
834
833
  user belongs.
835
- :param pulumi.Input[builtins.str] name: Unique name of the role.
836
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
834
+ :param pulumi.Input[_builtins.str] name: Unique name of the role.
835
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
837
836
  The value should not contain leading or trailing forward slashes.
838
837
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
839
838
  *Available only for Vault Enterprise*.
840
- :param pulumi.Input[builtins.str] path: Path where the auth backend is mounted.
841
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
842
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
843
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
844
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
845
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
846
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
847
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
848
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
849
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
839
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend is mounted.
840
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
841
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
842
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
843
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
844
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
845
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
846
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
847
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
848
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
850
849
  """
851
850
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
852
851
 
@@ -871,60 +870,60 @@ class AuthBackendRole(pulumi.CustomResource):
871
870
  __props__.__dict__["token_type"] = token_type
872
871
  return AuthBackendRole(resource_name, opts=opts, __props__=__props__)
873
872
 
874
- @property
873
+ @_builtins.property
875
874
  @pulumi.getter(name="boundAttributes")
876
- def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, builtins.str]]]:
875
+ def bound_attributes(self) -> pulumi.Output[Optional[Mapping[str, _builtins.str]]]:
877
876
  """
878
877
  Mapping of attribute names to values that are expected to
879
878
  exist in the SAML assertion.
880
879
  """
881
880
  return pulumi.get(self, "bound_attributes")
882
881
 
883
- @property
882
+ @_builtins.property
884
883
  @pulumi.getter(name="boundAttributesType")
885
- def bound_attributes_type(self) -> pulumi.Output[builtins.str]:
884
+ def bound_attributes_type(self) -> pulumi.Output[_builtins.str]:
886
885
  """
887
886
  The type of matching assertion to perform on
888
887
  `bound_attributes_type`.
889
888
  """
890
889
  return pulumi.get(self, "bound_attributes_type")
891
890
 
892
- @property
891
+ @_builtins.property
893
892
  @pulumi.getter(name="boundSubjects")
894
- def bound_subjects(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
893
+ def bound_subjects(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
895
894
  """
896
895
  List of subjects being asserted for SAML authentication.
897
896
  """
898
897
  return pulumi.get(self, "bound_subjects")
899
898
 
900
- @property
899
+ @_builtins.property
901
900
  @pulumi.getter(name="boundSubjectsType")
902
- def bound_subjects_type(self) -> pulumi.Output[builtins.str]:
901
+ def bound_subjects_type(self) -> pulumi.Output[_builtins.str]:
903
902
  """
904
903
  The type of matching assertion to perform on `bound_subjects`.
905
904
  """
906
905
  return pulumi.get(self, "bound_subjects_type")
907
906
 
908
- @property
907
+ @_builtins.property
909
908
  @pulumi.getter(name="groupsAttribute")
910
- def groups_attribute(self) -> pulumi.Output[Optional[builtins.str]]:
909
+ def groups_attribute(self) -> pulumi.Output[Optional[_builtins.str]]:
911
910
  """
912
911
  The attribute to use to identify the set of groups to which the
913
912
  user belongs.
914
913
  """
915
914
  return pulumi.get(self, "groups_attribute")
916
915
 
917
- @property
916
+ @_builtins.property
918
917
  @pulumi.getter
919
- def name(self) -> pulumi.Output[builtins.str]:
918
+ def name(self) -> pulumi.Output[_builtins.str]:
920
919
  """
921
920
  Unique name of the role.
922
921
  """
923
922
  return pulumi.get(self, "name")
924
923
 
925
- @property
924
+ @_builtins.property
926
925
  @pulumi.getter
927
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
926
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
928
927
  """
929
928
  The namespace to provision the resource in.
930
929
  The value should not contain leading or trailing forward slashes.
@@ -933,81 +932,81 @@ class AuthBackendRole(pulumi.CustomResource):
933
932
  """
934
933
  return pulumi.get(self, "namespace")
935
934
 
936
- @property
935
+ @_builtins.property
937
936
  @pulumi.getter
938
- def path(self) -> pulumi.Output[builtins.str]:
937
+ def path(self) -> pulumi.Output[_builtins.str]:
939
938
  """
940
939
  Path where the auth backend is mounted.
941
940
  """
942
941
  return pulumi.get(self, "path")
943
942
 
944
- @property
943
+ @_builtins.property
945
944
  @pulumi.getter(name="tokenBoundCidrs")
946
- def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
945
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
947
946
  """
948
947
  Specifies the blocks of IP addresses which are allowed to use the generated token
949
948
  """
950
949
  return pulumi.get(self, "token_bound_cidrs")
951
950
 
952
- @property
951
+ @_builtins.property
953
952
  @pulumi.getter(name="tokenExplicitMaxTtl")
954
- def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
953
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
955
954
  """
956
955
  Generated Token's Explicit Maximum TTL in seconds
957
956
  """
958
957
  return pulumi.get(self, "token_explicit_max_ttl")
959
958
 
960
- @property
959
+ @_builtins.property
961
960
  @pulumi.getter(name="tokenMaxTtl")
962
- def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
961
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
963
962
  """
964
963
  The maximum lifetime of the generated token
965
964
  """
966
965
  return pulumi.get(self, "token_max_ttl")
967
966
 
968
- @property
967
+ @_builtins.property
969
968
  @pulumi.getter(name="tokenNoDefaultPolicy")
970
- def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
969
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
971
970
  """
972
971
  If true, the 'default' policy will not automatically be added to generated tokens
973
972
  """
974
973
  return pulumi.get(self, "token_no_default_policy")
975
974
 
976
- @property
975
+ @_builtins.property
977
976
  @pulumi.getter(name="tokenNumUses")
978
- def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
977
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
979
978
  """
980
979
  The maximum number of times a token may be used, a value of zero means unlimited
981
980
  """
982
981
  return pulumi.get(self, "token_num_uses")
983
982
 
984
- @property
983
+ @_builtins.property
985
984
  @pulumi.getter(name="tokenPeriod")
986
- def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
985
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
987
986
  """
988
987
  Generated Token's Period
989
988
  """
990
989
  return pulumi.get(self, "token_period")
991
990
 
992
- @property
991
+ @_builtins.property
993
992
  @pulumi.getter(name="tokenPolicies")
994
- def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
993
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
995
994
  """
996
995
  Generated Token's Policies
997
996
  """
998
997
  return pulumi.get(self, "token_policies")
999
998
 
1000
- @property
999
+ @_builtins.property
1001
1000
  @pulumi.getter(name="tokenTtl")
1002
- def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1001
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1003
1002
  """
1004
1003
  The initial ttl of the token to generate in seconds
1005
1004
  """
1006
1005
  return pulumi.get(self, "token_ttl")
1007
1006
 
1008
- @property
1007
+ @_builtins.property
1009
1008
  @pulumi.getter(name="tokenType")
1010
- def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
1009
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1011
1010
  """
1012
1011
  The type of token to generate, service or batch
1013
1012
  """