pulumi-vault 7.1.0__py3-none-any.whl → 7.2.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (269) hide show
  1. pulumi_vault/__init__.py +19 -1
  2. pulumi_vault/_inputs.py +873 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +1016 -439
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +1057 -285
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +887 -256
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +426 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +878 -336
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +400 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +1006 -227
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +431 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +732 -693
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +380 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +909 -271
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/oci_auth_backend.py +683 -0
  168. pulumi_vault/oci_auth_backend_role.py +798 -0
  169. pulumi_vault/okta/__init__.py +1 -1
  170. pulumi_vault/okta/_inputs.py +31 -32
  171. pulumi_vault/okta/auth_backend.py +305 -306
  172. pulumi_vault/okta/auth_backend_group.py +69 -70
  173. pulumi_vault/okta/auth_backend_user.py +86 -87
  174. pulumi_vault/okta/outputs.py +21 -22
  175. pulumi_vault/outputs.py +234 -82
  176. pulumi_vault/pkisecret/__init__.py +1 -1
  177. pulumi_vault/pkisecret/_inputs.py +55 -56
  178. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  179. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  180. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  181. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  182. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  183. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  184. pulumi_vault/pkisecret/backend_config_scep.py +205 -159
  185. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  186. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  187. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  188. pulumi_vault/pkisecret/get_backend_config_scep.py +50 -31
  189. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  190. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  191. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  192. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  193. pulumi_vault/pkisecret/outputs.py +61 -62
  194. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  195. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  196. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  197. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  198. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  199. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  200. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  201. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  202. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  203. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  204. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  205. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  206. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  207. pulumi_vault/plugin.py +154 -155
  208. pulumi_vault/plugin_pinned_version.py +52 -53
  209. pulumi_vault/policy.py +52 -53
  210. pulumi_vault/provider.py +160 -161
  211. pulumi_vault/pulumi-plugin.json +1 -1
  212. pulumi_vault/quota_lease_count.py +103 -104
  213. pulumi_vault/quota_rate_limit.py +171 -172
  214. pulumi_vault/rabbitmq/__init__.py +1 -1
  215. pulumi_vault/rabbitmq/_inputs.py +50 -51
  216. pulumi_vault/rabbitmq/outputs.py +34 -35
  217. pulumi_vault/rabbitmq/secret_backend.py +902 -231
  218. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  219. pulumi_vault/raft_autopilot.py +137 -138
  220. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  221. pulumi_vault/rgp_policy.py +69 -70
  222. pulumi_vault/saml/__init__.py +1 -1
  223. pulumi_vault/saml/auth_backend.py +188 -189
  224. pulumi_vault/saml/auth_backend_role.py +290 -291
  225. pulumi_vault/scep_auth_backend_role.py +252 -253
  226. pulumi_vault/secrets/__init__.py +1 -1
  227. pulumi_vault/secrets/_inputs.py +19 -20
  228. pulumi_vault/secrets/outputs.py +13 -14
  229. pulumi_vault/secrets/sync_association.py +88 -89
  230. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  231. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  232. pulumi_vault/secrets/sync_config.py +52 -53
  233. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  234. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  235. pulumi_vault/secrets/sync_github_apps.py +78 -79
  236. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  237. pulumi_vault/ssh/__init__.py +1 -1
  238. pulumi_vault/ssh/_inputs.py +13 -14
  239. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  240. pulumi_vault/ssh/outputs.py +9 -10
  241. pulumi_vault/ssh/secret_backend_ca.py +217 -124
  242. pulumi_vault/ssh/secret_backend_role.py +446 -447
  243. pulumi_vault/terraformcloud/__init__.py +1 -1
  244. pulumi_vault/terraformcloud/secret_backend.py +833 -155
  245. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  246. pulumi_vault/terraformcloud/secret_role.py +117 -118
  247. pulumi_vault/token.py +301 -302
  248. pulumi_vault/tokenauth/__init__.py +1 -1
  249. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  250. pulumi_vault/transform/__init__.py +1 -1
  251. pulumi_vault/transform/alphabet.py +69 -70
  252. pulumi_vault/transform/get_decode.py +57 -58
  253. pulumi_vault/transform/get_encode.py +57 -58
  254. pulumi_vault/transform/role.py +69 -70
  255. pulumi_vault/transform/template.py +137 -138
  256. pulumi_vault/transform/transformation.py +171 -172
  257. pulumi_vault/transit/__init__.py +1 -1
  258. pulumi_vault/transit/get_cmac.py +47 -48
  259. pulumi_vault/transit/get_decrypt.py +25 -26
  260. pulumi_vault/transit/get_encrypt.py +29 -30
  261. pulumi_vault/transit/get_sign.py +71 -72
  262. pulumi_vault/transit/get_verify.py +83 -84
  263. pulumi_vault/transit/secret_backend_key.py +377 -350
  264. pulumi_vault/transit/secret_cache_config.py +52 -53
  265. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/METADATA +1 -1
  266. pulumi_vault-7.2.0.dist-info/RECORD +270 -0
  267. pulumi_vault-7.1.0.dist-info/RECORD +0 -268
  268. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/WHEEL +0 -0
  269. {pulumi_vault-7.1.0.dist-info → pulumi_vault-7.2.0.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,76 +19,76 @@ __all__ = ['CertAuthBackendRoleArgs', 'CertAuthBackendRole']
20
19
  @pulumi.input_type
21
20
  class CertAuthBackendRoleArgs:
22
21
  def __init__(__self__, *,
23
- certificate: pulumi.Input[builtins.str],
24
- allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
25
- allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
26
- allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
27
- allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
28
- allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
29
- allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
30
- backend: Optional[pulumi.Input[builtins.str]] = None,
31
- display_name: Optional[pulumi.Input[builtins.str]] = None,
32
- name: Optional[pulumi.Input[builtins.str]] = None,
33
- namespace: Optional[pulumi.Input[builtins.str]] = None,
34
- ocsp_ca_certificates: Optional[pulumi.Input[builtins.str]] = None,
35
- ocsp_enabled: Optional[pulumi.Input[builtins.bool]] = None,
36
- ocsp_fail_open: Optional[pulumi.Input[builtins.bool]] = None,
37
- ocsp_query_all_servers: Optional[pulumi.Input[builtins.bool]] = None,
38
- ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
39
- required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
40
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
41
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
42
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
43
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
44
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
45
- token_period: Optional[pulumi.Input[builtins.int]] = None,
46
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
47
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
48
- token_type: Optional[pulumi.Input[builtins.str]] = None):
22
+ certificate: pulumi.Input[_builtins.str],
23
+ allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
24
+ allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
25
+ allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
26
+ allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
27
+ allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
28
+ allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
29
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
30
+ display_name: Optional[pulumi.Input[_builtins.str]] = None,
31
+ name: Optional[pulumi.Input[_builtins.str]] = None,
32
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
33
+ ocsp_ca_certificates: Optional[pulumi.Input[_builtins.str]] = None,
34
+ ocsp_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
35
+ ocsp_fail_open: Optional[pulumi.Input[_builtins.bool]] = None,
36
+ ocsp_query_all_servers: Optional[pulumi.Input[_builtins.bool]] = None,
37
+ ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
38
+ required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
39
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
40
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
41
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
42
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
43
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
44
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
45
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
46
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
47
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
49
48
  """
50
49
  The set of arguments for constructing a CertAuthBackendRole resource.
51
- :param pulumi.Input[builtins.str] certificate: CA certificate used to validate client certificates
52
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
53
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
54
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
55
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
56
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
57
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
58
- :param pulumi.Input[builtins.str] backend: Path to the mounted Cert auth backend
59
- :param pulumi.Input[builtins.str] display_name: The name to display on tokens issued under this role.
60
- :param pulumi.Input[builtins.str] name: Name of the role
61
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
50
+ :param pulumi.Input[_builtins.str] certificate: CA certificate used to validate client certificates
51
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
52
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
53
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
54
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
55
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
56
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
57
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted Cert auth backend
58
+ :param pulumi.Input[_builtins.str] display_name: The name to display on tokens issued under this role.
59
+ :param pulumi.Input[_builtins.str] name: Name of the role
60
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
62
61
  The value should not contain leading or trailing forward slashes.
63
62
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
64
63
  *Available only for Vault Enterprise*.
65
- :param pulumi.Input[builtins.str] ocsp_ca_certificates: Any additional CA certificates
64
+ :param pulumi.Input[_builtins.str] ocsp_ca_certificates: Any additional CA certificates
66
65
  needed to verify OCSP responses. Provided as base64 encoded PEM data.
67
66
  Requires Vault version 1.13+.
68
- :param pulumi.Input[builtins.bool] ocsp_enabled: If enabled, validate certificates'
67
+ :param pulumi.Input[_builtins.bool] ocsp_enabled: If enabled, validate certificates'
69
68
  revocation status using OCSP. Requires Vault version 1.13+.
70
- :param pulumi.Input[builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
69
+ :param pulumi.Input[_builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
71
70
  be fetched or is of an unknown status, the login will proceed as if the
72
71
  certificate has not been revoked.
73
72
  Requires Vault version 1.13+.
74
- :param pulumi.Input[builtins.bool] ocsp_query_all_servers: If set to true, rather than
73
+ :param pulumi.Input[_builtins.bool] ocsp_query_all_servers: If set to true, rather than
75
74
  accepting the first successful OCSP response, query all servers and consider
76
75
  the certificate valid only if all servers agree.
77
76
  Requires Vault version 1.13+.
78
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
77
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
79
78
  server addresses. If unset, the OCSP server is determined from the
80
79
  AuthorityInformationAccess extension on the certificate being inspected.
81
80
  Requires Vault version 1.13+.
82
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] required_extensions: TLS extensions required on
81
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] required_extensions: TLS extensions required on
83
82
  client certificates
84
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
85
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
86
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
87
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
88
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
89
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
90
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
91
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
92
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
83
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
84
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
85
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
86
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
87
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
88
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
89
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
90
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
91
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
93
92
  """
94
93
  pulumi.set(__self__, "certificate", certificate)
95
94
  if allowed_common_names is not None:
@@ -143,129 +142,129 @@ class CertAuthBackendRoleArgs:
143
142
  if token_type is not None:
144
143
  pulumi.set(__self__, "token_type", token_type)
145
144
 
146
- @property
145
+ @_builtins.property
147
146
  @pulumi.getter
148
- def certificate(self) -> pulumi.Input[builtins.str]:
147
+ def certificate(self) -> pulumi.Input[_builtins.str]:
149
148
  """
150
149
  CA certificate used to validate client certificates
151
150
  """
152
151
  return pulumi.get(self, "certificate")
153
152
 
154
153
  @certificate.setter
155
- def certificate(self, value: pulumi.Input[builtins.str]):
154
+ def certificate(self, value: pulumi.Input[_builtins.str]):
156
155
  pulumi.set(self, "certificate", value)
157
156
 
158
- @property
157
+ @_builtins.property
159
158
  @pulumi.getter(name="allowedCommonNames")
160
- def allowed_common_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
159
+ def allowed_common_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
161
160
  """
162
161
  Allowed the common names for authenticated client certificates
163
162
  """
164
163
  return pulumi.get(self, "allowed_common_names")
165
164
 
166
165
  @allowed_common_names.setter
167
- def allowed_common_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
166
+ def allowed_common_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
168
167
  pulumi.set(self, "allowed_common_names", value)
169
168
 
170
- @property
169
+ @_builtins.property
171
170
  @pulumi.getter(name="allowedDnsSans")
172
- def allowed_dns_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
171
+ def allowed_dns_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
173
172
  """
174
173
  Allowed alternative dns names for authenticated client certificates
175
174
  """
176
175
  return pulumi.get(self, "allowed_dns_sans")
177
176
 
178
177
  @allowed_dns_sans.setter
179
- def allowed_dns_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
178
+ def allowed_dns_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
180
179
  pulumi.set(self, "allowed_dns_sans", value)
181
180
 
182
- @property
181
+ @_builtins.property
183
182
  @pulumi.getter(name="allowedEmailSans")
184
- def allowed_email_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
183
+ def allowed_email_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
185
184
  """
186
185
  Allowed emails for authenticated client certificates
187
186
  """
188
187
  return pulumi.get(self, "allowed_email_sans")
189
188
 
190
189
  @allowed_email_sans.setter
191
- def allowed_email_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
190
+ def allowed_email_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
192
191
  pulumi.set(self, "allowed_email_sans", value)
193
192
 
194
- @property
193
+ @_builtins.property
195
194
  @pulumi.getter(name="allowedNames")
196
- def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
195
+ def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
197
196
  """
198
197
  DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
199
198
  """
200
199
  return pulumi.get(self, "allowed_names")
201
200
 
202
201
  @allowed_names.setter
203
- def allowed_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
202
+ def allowed_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
204
203
  pulumi.set(self, "allowed_names", value)
205
204
 
206
- @property
205
+ @_builtins.property
207
206
  @pulumi.getter(name="allowedOrganizationalUnits")
208
- def allowed_organizational_units(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
207
+ def allowed_organizational_units(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
209
208
  """
210
209
  Allowed organization units for authenticated client certificates.
211
210
  """
212
211
  return pulumi.get(self, "allowed_organizational_units")
213
212
 
214
213
  @allowed_organizational_units.setter
215
- def allowed_organizational_units(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
214
+ def allowed_organizational_units(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
216
215
  pulumi.set(self, "allowed_organizational_units", value)
217
216
 
218
- @property
217
+ @_builtins.property
219
218
  @pulumi.getter(name="allowedUriSans")
220
- def allowed_uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
219
+ def allowed_uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
221
220
  """
222
221
  Allowed URIs for authenticated client certificates
223
222
  """
224
223
  return pulumi.get(self, "allowed_uri_sans")
225
224
 
226
225
  @allowed_uri_sans.setter
227
- def allowed_uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
226
+ def allowed_uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
228
227
  pulumi.set(self, "allowed_uri_sans", value)
229
228
 
230
- @property
229
+ @_builtins.property
231
230
  @pulumi.getter
232
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
231
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
233
232
  """
234
233
  Path to the mounted Cert auth backend
235
234
  """
236
235
  return pulumi.get(self, "backend")
237
236
 
238
237
  @backend.setter
239
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
238
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
240
239
  pulumi.set(self, "backend", value)
241
240
 
242
- @property
241
+ @_builtins.property
243
242
  @pulumi.getter(name="displayName")
244
- def display_name(self) -> Optional[pulumi.Input[builtins.str]]:
243
+ def display_name(self) -> Optional[pulumi.Input[_builtins.str]]:
245
244
  """
246
245
  The name to display on tokens issued under this role.
247
246
  """
248
247
  return pulumi.get(self, "display_name")
249
248
 
250
249
  @display_name.setter
251
- def display_name(self, value: Optional[pulumi.Input[builtins.str]]):
250
+ def display_name(self, value: Optional[pulumi.Input[_builtins.str]]):
252
251
  pulumi.set(self, "display_name", value)
253
252
 
254
- @property
253
+ @_builtins.property
255
254
  @pulumi.getter
256
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
255
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
257
256
  """
258
257
  Name of the role
259
258
  """
260
259
  return pulumi.get(self, "name")
261
260
 
262
261
  @name.setter
263
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
262
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
264
263
  pulumi.set(self, "name", value)
265
264
 
266
- @property
265
+ @_builtins.property
267
266
  @pulumi.getter
268
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
267
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
269
268
  """
270
269
  The namespace to provision the resource in.
271
270
  The value should not contain leading or trailing forward slashes.
@@ -275,12 +274,12 @@ class CertAuthBackendRoleArgs:
275
274
  return pulumi.get(self, "namespace")
276
275
 
277
276
  @namespace.setter
278
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
277
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
279
278
  pulumi.set(self, "namespace", value)
280
279
 
281
- @property
280
+ @_builtins.property
282
281
  @pulumi.getter(name="ocspCaCertificates")
283
- def ocsp_ca_certificates(self) -> Optional[pulumi.Input[builtins.str]]:
282
+ def ocsp_ca_certificates(self) -> Optional[pulumi.Input[_builtins.str]]:
284
283
  """
285
284
  Any additional CA certificates
286
285
  needed to verify OCSP responses. Provided as base64 encoded PEM data.
@@ -289,12 +288,12 @@ class CertAuthBackendRoleArgs:
289
288
  return pulumi.get(self, "ocsp_ca_certificates")
290
289
 
291
290
  @ocsp_ca_certificates.setter
292
- def ocsp_ca_certificates(self, value: Optional[pulumi.Input[builtins.str]]):
291
+ def ocsp_ca_certificates(self, value: Optional[pulumi.Input[_builtins.str]]):
293
292
  pulumi.set(self, "ocsp_ca_certificates", value)
294
293
 
295
- @property
294
+ @_builtins.property
296
295
  @pulumi.getter(name="ocspEnabled")
297
- def ocsp_enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
296
+ def ocsp_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
298
297
  """
299
298
  If enabled, validate certificates'
300
299
  revocation status using OCSP. Requires Vault version 1.13+.
@@ -302,12 +301,12 @@ class CertAuthBackendRoleArgs:
302
301
  return pulumi.get(self, "ocsp_enabled")
303
302
 
304
303
  @ocsp_enabled.setter
305
- def ocsp_enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
304
+ def ocsp_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
306
305
  pulumi.set(self, "ocsp_enabled", value)
307
306
 
308
- @property
307
+ @_builtins.property
309
308
  @pulumi.getter(name="ocspFailOpen")
310
- def ocsp_fail_open(self) -> Optional[pulumi.Input[builtins.bool]]:
309
+ def ocsp_fail_open(self) -> Optional[pulumi.Input[_builtins.bool]]:
311
310
  """
312
311
  If true and an OCSP response cannot
313
312
  be fetched or is of an unknown status, the login will proceed as if the
@@ -317,12 +316,12 @@ class CertAuthBackendRoleArgs:
317
316
  return pulumi.get(self, "ocsp_fail_open")
318
317
 
319
318
  @ocsp_fail_open.setter
320
- def ocsp_fail_open(self, value: Optional[pulumi.Input[builtins.bool]]):
319
+ def ocsp_fail_open(self, value: Optional[pulumi.Input[_builtins.bool]]):
321
320
  pulumi.set(self, "ocsp_fail_open", value)
322
321
 
323
- @property
322
+ @_builtins.property
324
323
  @pulumi.getter(name="ocspQueryAllServers")
325
- def ocsp_query_all_servers(self) -> Optional[pulumi.Input[builtins.bool]]:
324
+ def ocsp_query_all_servers(self) -> Optional[pulumi.Input[_builtins.bool]]:
326
325
  """
327
326
  If set to true, rather than
328
327
  accepting the first successful OCSP response, query all servers and consider
@@ -332,12 +331,12 @@ class CertAuthBackendRoleArgs:
332
331
  return pulumi.get(self, "ocsp_query_all_servers")
333
332
 
334
333
  @ocsp_query_all_servers.setter
335
- def ocsp_query_all_servers(self, value: Optional[pulumi.Input[builtins.bool]]):
334
+ def ocsp_query_all_servers(self, value: Optional[pulumi.Input[_builtins.bool]]):
336
335
  pulumi.set(self, "ocsp_query_all_servers", value)
337
336
 
338
- @property
337
+ @_builtins.property
339
338
  @pulumi.getter(name="ocspServersOverrides")
340
- def ocsp_servers_overrides(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
339
+ def ocsp_servers_overrides(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
341
340
  """
342
341
  : A comma-separated list of OCSP
343
342
  server addresses. If unset, the OCSP server is determined from the
@@ -347,12 +346,12 @@ class CertAuthBackendRoleArgs:
347
346
  return pulumi.get(self, "ocsp_servers_overrides")
348
347
 
349
348
  @ocsp_servers_overrides.setter
350
- def ocsp_servers_overrides(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
349
+ def ocsp_servers_overrides(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
351
350
  pulumi.set(self, "ocsp_servers_overrides", value)
352
351
 
353
- @property
352
+ @_builtins.property
354
353
  @pulumi.getter(name="requiredExtensions")
355
- def required_extensions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
354
+ def required_extensions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
356
355
  """
357
356
  TLS extensions required on
358
357
  client certificates
@@ -360,191 +359,191 @@ class CertAuthBackendRoleArgs:
360
359
  return pulumi.get(self, "required_extensions")
361
360
 
362
361
  @required_extensions.setter
363
- def required_extensions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
362
+ def required_extensions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
364
363
  pulumi.set(self, "required_extensions", value)
365
364
 
366
- @property
365
+ @_builtins.property
367
366
  @pulumi.getter(name="tokenBoundCidrs")
368
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
367
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
369
368
  """
370
369
  Specifies the blocks of IP addresses which are allowed to use the generated token
371
370
  """
372
371
  return pulumi.get(self, "token_bound_cidrs")
373
372
 
374
373
  @token_bound_cidrs.setter
375
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
374
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
376
375
  pulumi.set(self, "token_bound_cidrs", value)
377
376
 
378
- @property
377
+ @_builtins.property
379
378
  @pulumi.getter(name="tokenExplicitMaxTtl")
380
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
379
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
381
380
  """
382
381
  Generated Token's Explicit Maximum TTL in seconds
383
382
  """
384
383
  return pulumi.get(self, "token_explicit_max_ttl")
385
384
 
386
385
  @token_explicit_max_ttl.setter
387
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
386
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
388
387
  pulumi.set(self, "token_explicit_max_ttl", value)
389
388
 
390
- @property
389
+ @_builtins.property
391
390
  @pulumi.getter(name="tokenMaxTtl")
392
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
391
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
393
392
  """
394
393
  The maximum lifetime of the generated token
395
394
  """
396
395
  return pulumi.get(self, "token_max_ttl")
397
396
 
398
397
  @token_max_ttl.setter
399
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
398
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
400
399
  pulumi.set(self, "token_max_ttl", value)
401
400
 
402
- @property
401
+ @_builtins.property
403
402
  @pulumi.getter(name="tokenNoDefaultPolicy")
404
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
403
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
405
404
  """
406
405
  If true, the 'default' policy will not automatically be added to generated tokens
407
406
  """
408
407
  return pulumi.get(self, "token_no_default_policy")
409
408
 
410
409
  @token_no_default_policy.setter
411
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
410
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
412
411
  pulumi.set(self, "token_no_default_policy", value)
413
412
 
414
- @property
413
+ @_builtins.property
415
414
  @pulumi.getter(name="tokenNumUses")
416
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
415
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
417
416
  """
418
417
  The maximum number of times a token may be used, a value of zero means unlimited
419
418
  """
420
419
  return pulumi.get(self, "token_num_uses")
421
420
 
422
421
  @token_num_uses.setter
423
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
422
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
424
423
  pulumi.set(self, "token_num_uses", value)
425
424
 
426
- @property
425
+ @_builtins.property
427
426
  @pulumi.getter(name="tokenPeriod")
428
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
427
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
429
428
  """
430
429
  Generated Token's Period
431
430
  """
432
431
  return pulumi.get(self, "token_period")
433
432
 
434
433
  @token_period.setter
435
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
434
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
436
435
  pulumi.set(self, "token_period", value)
437
436
 
438
- @property
437
+ @_builtins.property
439
438
  @pulumi.getter(name="tokenPolicies")
440
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
439
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
441
440
  """
442
441
  Generated Token's Policies
443
442
  """
444
443
  return pulumi.get(self, "token_policies")
445
444
 
446
445
  @token_policies.setter
447
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
446
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
448
447
  pulumi.set(self, "token_policies", value)
449
448
 
450
- @property
449
+ @_builtins.property
451
450
  @pulumi.getter(name="tokenTtl")
452
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
451
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
453
452
  """
454
453
  The initial ttl of the token to generate in seconds
455
454
  """
456
455
  return pulumi.get(self, "token_ttl")
457
456
 
458
457
  @token_ttl.setter
459
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
458
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
460
459
  pulumi.set(self, "token_ttl", value)
461
460
 
462
- @property
461
+ @_builtins.property
463
462
  @pulumi.getter(name="tokenType")
464
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
463
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
465
464
  """
466
465
  The type of token to generate, service or batch
467
466
  """
468
467
  return pulumi.get(self, "token_type")
469
468
 
470
469
  @token_type.setter
471
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
470
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
472
471
  pulumi.set(self, "token_type", value)
473
472
 
474
473
 
475
474
  @pulumi.input_type
476
475
  class _CertAuthBackendRoleState:
477
476
  def __init__(__self__, *,
478
- allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
479
- allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
480
- allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
481
- allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
482
- allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
483
- allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
484
- backend: Optional[pulumi.Input[builtins.str]] = None,
485
- certificate: Optional[pulumi.Input[builtins.str]] = None,
486
- display_name: Optional[pulumi.Input[builtins.str]] = None,
487
- name: Optional[pulumi.Input[builtins.str]] = None,
488
- namespace: Optional[pulumi.Input[builtins.str]] = None,
489
- ocsp_ca_certificates: Optional[pulumi.Input[builtins.str]] = None,
490
- ocsp_enabled: Optional[pulumi.Input[builtins.bool]] = None,
491
- ocsp_fail_open: Optional[pulumi.Input[builtins.bool]] = None,
492
- ocsp_query_all_servers: Optional[pulumi.Input[builtins.bool]] = None,
493
- ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
494
- required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
495
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
496
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
497
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
498
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
499
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
500
- token_period: Optional[pulumi.Input[builtins.int]] = None,
501
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
502
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
503
- token_type: Optional[pulumi.Input[builtins.str]] = None):
477
+ allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
478
+ allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
479
+ allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
480
+ allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
481
+ allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
482
+ allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
483
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
484
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
485
+ display_name: Optional[pulumi.Input[_builtins.str]] = None,
486
+ name: Optional[pulumi.Input[_builtins.str]] = None,
487
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
488
+ ocsp_ca_certificates: Optional[pulumi.Input[_builtins.str]] = None,
489
+ ocsp_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
490
+ ocsp_fail_open: Optional[pulumi.Input[_builtins.bool]] = None,
491
+ ocsp_query_all_servers: Optional[pulumi.Input[_builtins.bool]] = None,
492
+ ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
493
+ required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
494
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
495
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
496
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
497
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
498
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
499
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
500
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
501
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
502
+ token_type: Optional[pulumi.Input[_builtins.str]] = None):
504
503
  """
505
504
  Input properties used for looking up and filtering CertAuthBackendRole resources.
506
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
507
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
508
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
509
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
510
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
511
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
512
- :param pulumi.Input[builtins.str] backend: Path to the mounted Cert auth backend
513
- :param pulumi.Input[builtins.str] certificate: CA certificate used to validate client certificates
514
- :param pulumi.Input[builtins.str] display_name: The name to display on tokens issued under this role.
515
- :param pulumi.Input[builtins.str] name: Name of the role
516
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
505
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
506
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
507
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
508
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
509
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
510
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
511
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted Cert auth backend
512
+ :param pulumi.Input[_builtins.str] certificate: CA certificate used to validate client certificates
513
+ :param pulumi.Input[_builtins.str] display_name: The name to display on tokens issued under this role.
514
+ :param pulumi.Input[_builtins.str] name: Name of the role
515
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
517
516
  The value should not contain leading or trailing forward slashes.
518
517
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
519
518
  *Available only for Vault Enterprise*.
520
- :param pulumi.Input[builtins.str] ocsp_ca_certificates: Any additional CA certificates
519
+ :param pulumi.Input[_builtins.str] ocsp_ca_certificates: Any additional CA certificates
521
520
  needed to verify OCSP responses. Provided as base64 encoded PEM data.
522
521
  Requires Vault version 1.13+.
523
- :param pulumi.Input[builtins.bool] ocsp_enabled: If enabled, validate certificates'
522
+ :param pulumi.Input[_builtins.bool] ocsp_enabled: If enabled, validate certificates'
524
523
  revocation status using OCSP. Requires Vault version 1.13+.
525
- :param pulumi.Input[builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
524
+ :param pulumi.Input[_builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
526
525
  be fetched or is of an unknown status, the login will proceed as if the
527
526
  certificate has not been revoked.
528
527
  Requires Vault version 1.13+.
529
- :param pulumi.Input[builtins.bool] ocsp_query_all_servers: If set to true, rather than
528
+ :param pulumi.Input[_builtins.bool] ocsp_query_all_servers: If set to true, rather than
530
529
  accepting the first successful OCSP response, query all servers and consider
531
530
  the certificate valid only if all servers agree.
532
531
  Requires Vault version 1.13+.
533
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
532
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
534
533
  server addresses. If unset, the OCSP server is determined from the
535
534
  AuthorityInformationAccess extension on the certificate being inspected.
536
535
  Requires Vault version 1.13+.
537
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] required_extensions: TLS extensions required on
536
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] required_extensions: TLS extensions required on
538
537
  client certificates
539
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
540
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
541
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
542
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
543
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
544
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
545
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
546
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
547
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
538
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
539
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
540
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
541
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
542
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
543
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
544
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
545
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
546
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
548
547
  """
549
548
  if allowed_common_names is not None:
550
549
  pulumi.set(__self__, "allowed_common_names", allowed_common_names)
@@ -599,129 +598,129 @@ class _CertAuthBackendRoleState:
599
598
  if token_type is not None:
600
599
  pulumi.set(__self__, "token_type", token_type)
601
600
 
602
- @property
601
+ @_builtins.property
603
602
  @pulumi.getter(name="allowedCommonNames")
604
- def allowed_common_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
603
+ def allowed_common_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
605
604
  """
606
605
  Allowed the common names for authenticated client certificates
607
606
  """
608
607
  return pulumi.get(self, "allowed_common_names")
609
608
 
610
609
  @allowed_common_names.setter
611
- def allowed_common_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
610
+ def allowed_common_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
612
611
  pulumi.set(self, "allowed_common_names", value)
613
612
 
614
- @property
613
+ @_builtins.property
615
614
  @pulumi.getter(name="allowedDnsSans")
616
- def allowed_dns_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
615
+ def allowed_dns_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
617
616
  """
618
617
  Allowed alternative dns names for authenticated client certificates
619
618
  """
620
619
  return pulumi.get(self, "allowed_dns_sans")
621
620
 
622
621
  @allowed_dns_sans.setter
623
- def allowed_dns_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
622
+ def allowed_dns_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
624
623
  pulumi.set(self, "allowed_dns_sans", value)
625
624
 
626
- @property
625
+ @_builtins.property
627
626
  @pulumi.getter(name="allowedEmailSans")
628
- def allowed_email_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
627
+ def allowed_email_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
629
628
  """
630
629
  Allowed emails for authenticated client certificates
631
630
  """
632
631
  return pulumi.get(self, "allowed_email_sans")
633
632
 
634
633
  @allowed_email_sans.setter
635
- def allowed_email_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
634
+ def allowed_email_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
636
635
  pulumi.set(self, "allowed_email_sans", value)
637
636
 
638
- @property
637
+ @_builtins.property
639
638
  @pulumi.getter(name="allowedNames")
640
- def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
639
+ def allowed_names(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
641
640
  """
642
641
  DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
643
642
  """
644
643
  return pulumi.get(self, "allowed_names")
645
644
 
646
645
  @allowed_names.setter
647
- def allowed_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
646
+ def allowed_names(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
648
647
  pulumi.set(self, "allowed_names", value)
649
648
 
650
- @property
649
+ @_builtins.property
651
650
  @pulumi.getter(name="allowedOrganizationalUnits")
652
- def allowed_organizational_units(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
651
+ def allowed_organizational_units(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
653
652
  """
654
653
  Allowed organization units for authenticated client certificates.
655
654
  """
656
655
  return pulumi.get(self, "allowed_organizational_units")
657
656
 
658
657
  @allowed_organizational_units.setter
659
- def allowed_organizational_units(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
658
+ def allowed_organizational_units(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
660
659
  pulumi.set(self, "allowed_organizational_units", value)
661
660
 
662
- @property
661
+ @_builtins.property
663
662
  @pulumi.getter(name="allowedUriSans")
664
- def allowed_uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
663
+ def allowed_uri_sans(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
665
664
  """
666
665
  Allowed URIs for authenticated client certificates
667
666
  """
668
667
  return pulumi.get(self, "allowed_uri_sans")
669
668
 
670
669
  @allowed_uri_sans.setter
671
- def allowed_uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
670
+ def allowed_uri_sans(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
672
671
  pulumi.set(self, "allowed_uri_sans", value)
673
672
 
674
- @property
673
+ @_builtins.property
675
674
  @pulumi.getter
676
- def backend(self) -> Optional[pulumi.Input[builtins.str]]:
675
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
677
676
  """
678
677
  Path to the mounted Cert auth backend
679
678
  """
680
679
  return pulumi.get(self, "backend")
681
680
 
682
681
  @backend.setter
683
- def backend(self, value: Optional[pulumi.Input[builtins.str]]):
682
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
684
683
  pulumi.set(self, "backend", value)
685
684
 
686
- @property
685
+ @_builtins.property
687
686
  @pulumi.getter
688
- def certificate(self) -> Optional[pulumi.Input[builtins.str]]:
687
+ def certificate(self) -> Optional[pulumi.Input[_builtins.str]]:
689
688
  """
690
689
  CA certificate used to validate client certificates
691
690
  """
692
691
  return pulumi.get(self, "certificate")
693
692
 
694
693
  @certificate.setter
695
- def certificate(self, value: Optional[pulumi.Input[builtins.str]]):
694
+ def certificate(self, value: Optional[pulumi.Input[_builtins.str]]):
696
695
  pulumi.set(self, "certificate", value)
697
696
 
698
- @property
697
+ @_builtins.property
699
698
  @pulumi.getter(name="displayName")
700
- def display_name(self) -> Optional[pulumi.Input[builtins.str]]:
699
+ def display_name(self) -> Optional[pulumi.Input[_builtins.str]]:
701
700
  """
702
701
  The name to display on tokens issued under this role.
703
702
  """
704
703
  return pulumi.get(self, "display_name")
705
704
 
706
705
  @display_name.setter
707
- def display_name(self, value: Optional[pulumi.Input[builtins.str]]):
706
+ def display_name(self, value: Optional[pulumi.Input[_builtins.str]]):
708
707
  pulumi.set(self, "display_name", value)
709
708
 
710
- @property
709
+ @_builtins.property
711
710
  @pulumi.getter
712
- def name(self) -> Optional[pulumi.Input[builtins.str]]:
711
+ def name(self) -> Optional[pulumi.Input[_builtins.str]]:
713
712
  """
714
713
  Name of the role
715
714
  """
716
715
  return pulumi.get(self, "name")
717
716
 
718
717
  @name.setter
719
- def name(self, value: Optional[pulumi.Input[builtins.str]]):
718
+ def name(self, value: Optional[pulumi.Input[_builtins.str]]):
720
719
  pulumi.set(self, "name", value)
721
720
 
722
- @property
721
+ @_builtins.property
723
722
  @pulumi.getter
724
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
723
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
725
724
  """
726
725
  The namespace to provision the resource in.
727
726
  The value should not contain leading or trailing forward slashes.
@@ -731,12 +730,12 @@ class _CertAuthBackendRoleState:
731
730
  return pulumi.get(self, "namespace")
732
731
 
733
732
  @namespace.setter
734
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
733
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
735
734
  pulumi.set(self, "namespace", value)
736
735
 
737
- @property
736
+ @_builtins.property
738
737
  @pulumi.getter(name="ocspCaCertificates")
739
- def ocsp_ca_certificates(self) -> Optional[pulumi.Input[builtins.str]]:
738
+ def ocsp_ca_certificates(self) -> Optional[pulumi.Input[_builtins.str]]:
740
739
  """
741
740
  Any additional CA certificates
742
741
  needed to verify OCSP responses. Provided as base64 encoded PEM data.
@@ -745,12 +744,12 @@ class _CertAuthBackendRoleState:
745
744
  return pulumi.get(self, "ocsp_ca_certificates")
746
745
 
747
746
  @ocsp_ca_certificates.setter
748
- def ocsp_ca_certificates(self, value: Optional[pulumi.Input[builtins.str]]):
747
+ def ocsp_ca_certificates(self, value: Optional[pulumi.Input[_builtins.str]]):
749
748
  pulumi.set(self, "ocsp_ca_certificates", value)
750
749
 
751
- @property
750
+ @_builtins.property
752
751
  @pulumi.getter(name="ocspEnabled")
753
- def ocsp_enabled(self) -> Optional[pulumi.Input[builtins.bool]]:
752
+ def ocsp_enabled(self) -> Optional[pulumi.Input[_builtins.bool]]:
754
753
  """
755
754
  If enabled, validate certificates'
756
755
  revocation status using OCSP. Requires Vault version 1.13+.
@@ -758,12 +757,12 @@ class _CertAuthBackendRoleState:
758
757
  return pulumi.get(self, "ocsp_enabled")
759
758
 
760
759
  @ocsp_enabled.setter
761
- def ocsp_enabled(self, value: Optional[pulumi.Input[builtins.bool]]):
760
+ def ocsp_enabled(self, value: Optional[pulumi.Input[_builtins.bool]]):
762
761
  pulumi.set(self, "ocsp_enabled", value)
763
762
 
764
- @property
763
+ @_builtins.property
765
764
  @pulumi.getter(name="ocspFailOpen")
766
- def ocsp_fail_open(self) -> Optional[pulumi.Input[builtins.bool]]:
765
+ def ocsp_fail_open(self) -> Optional[pulumi.Input[_builtins.bool]]:
767
766
  """
768
767
  If true and an OCSP response cannot
769
768
  be fetched or is of an unknown status, the login will proceed as if the
@@ -773,12 +772,12 @@ class _CertAuthBackendRoleState:
773
772
  return pulumi.get(self, "ocsp_fail_open")
774
773
 
775
774
  @ocsp_fail_open.setter
776
- def ocsp_fail_open(self, value: Optional[pulumi.Input[builtins.bool]]):
775
+ def ocsp_fail_open(self, value: Optional[pulumi.Input[_builtins.bool]]):
777
776
  pulumi.set(self, "ocsp_fail_open", value)
778
777
 
779
- @property
778
+ @_builtins.property
780
779
  @pulumi.getter(name="ocspQueryAllServers")
781
- def ocsp_query_all_servers(self) -> Optional[pulumi.Input[builtins.bool]]:
780
+ def ocsp_query_all_servers(self) -> Optional[pulumi.Input[_builtins.bool]]:
782
781
  """
783
782
  If set to true, rather than
784
783
  accepting the first successful OCSP response, query all servers and consider
@@ -788,12 +787,12 @@ class _CertAuthBackendRoleState:
788
787
  return pulumi.get(self, "ocsp_query_all_servers")
789
788
 
790
789
  @ocsp_query_all_servers.setter
791
- def ocsp_query_all_servers(self, value: Optional[pulumi.Input[builtins.bool]]):
790
+ def ocsp_query_all_servers(self, value: Optional[pulumi.Input[_builtins.bool]]):
792
791
  pulumi.set(self, "ocsp_query_all_servers", value)
793
792
 
794
- @property
793
+ @_builtins.property
795
794
  @pulumi.getter(name="ocspServersOverrides")
796
- def ocsp_servers_overrides(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
795
+ def ocsp_servers_overrides(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
797
796
  """
798
797
  : A comma-separated list of OCSP
799
798
  server addresses. If unset, the OCSP server is determined from the
@@ -803,12 +802,12 @@ class _CertAuthBackendRoleState:
803
802
  return pulumi.get(self, "ocsp_servers_overrides")
804
803
 
805
804
  @ocsp_servers_overrides.setter
806
- def ocsp_servers_overrides(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
805
+ def ocsp_servers_overrides(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
807
806
  pulumi.set(self, "ocsp_servers_overrides", value)
808
807
 
809
- @property
808
+ @_builtins.property
810
809
  @pulumi.getter(name="requiredExtensions")
811
- def required_extensions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
810
+ def required_extensions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
812
811
  """
813
812
  TLS extensions required on
814
813
  client certificates
@@ -816,115 +815,115 @@ class _CertAuthBackendRoleState:
816
815
  return pulumi.get(self, "required_extensions")
817
816
 
818
817
  @required_extensions.setter
819
- def required_extensions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
818
+ def required_extensions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
820
819
  pulumi.set(self, "required_extensions", value)
821
820
 
822
- @property
821
+ @_builtins.property
823
822
  @pulumi.getter(name="tokenBoundCidrs")
824
- def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
823
+ def token_bound_cidrs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
825
824
  """
826
825
  Specifies the blocks of IP addresses which are allowed to use the generated token
827
826
  """
828
827
  return pulumi.get(self, "token_bound_cidrs")
829
828
 
830
829
  @token_bound_cidrs.setter
831
- def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
830
+ def token_bound_cidrs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
832
831
  pulumi.set(self, "token_bound_cidrs", value)
833
832
 
834
- @property
833
+ @_builtins.property
835
834
  @pulumi.getter(name="tokenExplicitMaxTtl")
836
- def token_explicit_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
835
+ def token_explicit_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
837
836
  """
838
837
  Generated Token's Explicit Maximum TTL in seconds
839
838
  """
840
839
  return pulumi.get(self, "token_explicit_max_ttl")
841
840
 
842
841
  @token_explicit_max_ttl.setter
843
- def token_explicit_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
842
+ def token_explicit_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
844
843
  pulumi.set(self, "token_explicit_max_ttl", value)
845
844
 
846
- @property
845
+ @_builtins.property
847
846
  @pulumi.getter(name="tokenMaxTtl")
848
- def token_max_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
847
+ def token_max_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
849
848
  """
850
849
  The maximum lifetime of the generated token
851
850
  """
852
851
  return pulumi.get(self, "token_max_ttl")
853
852
 
854
853
  @token_max_ttl.setter
855
- def token_max_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
854
+ def token_max_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
856
855
  pulumi.set(self, "token_max_ttl", value)
857
856
 
858
- @property
857
+ @_builtins.property
859
858
  @pulumi.getter(name="tokenNoDefaultPolicy")
860
- def token_no_default_policy(self) -> Optional[pulumi.Input[builtins.bool]]:
859
+ def token_no_default_policy(self) -> Optional[pulumi.Input[_builtins.bool]]:
861
860
  """
862
861
  If true, the 'default' policy will not automatically be added to generated tokens
863
862
  """
864
863
  return pulumi.get(self, "token_no_default_policy")
865
864
 
866
865
  @token_no_default_policy.setter
867
- def token_no_default_policy(self, value: Optional[pulumi.Input[builtins.bool]]):
866
+ def token_no_default_policy(self, value: Optional[pulumi.Input[_builtins.bool]]):
868
867
  pulumi.set(self, "token_no_default_policy", value)
869
868
 
870
- @property
869
+ @_builtins.property
871
870
  @pulumi.getter(name="tokenNumUses")
872
- def token_num_uses(self) -> Optional[pulumi.Input[builtins.int]]:
871
+ def token_num_uses(self) -> Optional[pulumi.Input[_builtins.int]]:
873
872
  """
874
873
  The maximum number of times a token may be used, a value of zero means unlimited
875
874
  """
876
875
  return pulumi.get(self, "token_num_uses")
877
876
 
878
877
  @token_num_uses.setter
879
- def token_num_uses(self, value: Optional[pulumi.Input[builtins.int]]):
878
+ def token_num_uses(self, value: Optional[pulumi.Input[_builtins.int]]):
880
879
  pulumi.set(self, "token_num_uses", value)
881
880
 
882
- @property
881
+ @_builtins.property
883
882
  @pulumi.getter(name="tokenPeriod")
884
- def token_period(self) -> Optional[pulumi.Input[builtins.int]]:
883
+ def token_period(self) -> Optional[pulumi.Input[_builtins.int]]:
885
884
  """
886
885
  Generated Token's Period
887
886
  """
888
887
  return pulumi.get(self, "token_period")
889
888
 
890
889
  @token_period.setter
891
- def token_period(self, value: Optional[pulumi.Input[builtins.int]]):
890
+ def token_period(self, value: Optional[pulumi.Input[_builtins.int]]):
892
891
  pulumi.set(self, "token_period", value)
893
892
 
894
- @property
893
+ @_builtins.property
895
894
  @pulumi.getter(name="tokenPolicies")
896
- def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
895
+ def token_policies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
897
896
  """
898
897
  Generated Token's Policies
899
898
  """
900
899
  return pulumi.get(self, "token_policies")
901
900
 
902
901
  @token_policies.setter
903
- def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
902
+ def token_policies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
904
903
  pulumi.set(self, "token_policies", value)
905
904
 
906
- @property
905
+ @_builtins.property
907
906
  @pulumi.getter(name="tokenTtl")
908
- def token_ttl(self) -> Optional[pulumi.Input[builtins.int]]:
907
+ def token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
909
908
  """
910
909
  The initial ttl of the token to generate in seconds
911
910
  """
912
911
  return pulumi.get(self, "token_ttl")
913
912
 
914
913
  @token_ttl.setter
915
- def token_ttl(self, value: Optional[pulumi.Input[builtins.int]]):
914
+ def token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
916
915
  pulumi.set(self, "token_ttl", value)
917
916
 
918
- @property
917
+ @_builtins.property
919
918
  @pulumi.getter(name="tokenType")
920
- def token_type(self) -> Optional[pulumi.Input[builtins.str]]:
919
+ def token_type(self) -> Optional[pulumi.Input[_builtins.str]]:
921
920
  """
922
921
  The type of token to generate, service or batch
923
922
  """
924
923
  return pulumi.get(self, "token_type")
925
924
 
926
925
  @token_type.setter
927
- def token_type(self, value: Optional[pulumi.Input[builtins.str]]):
926
+ def token_type(self, value: Optional[pulumi.Input[_builtins.str]]):
928
927
  pulumi.set(self, "token_type", value)
929
928
 
930
929
 
@@ -934,32 +933,32 @@ class CertAuthBackendRole(pulumi.CustomResource):
934
933
  def __init__(__self__,
935
934
  resource_name: str,
936
935
  opts: Optional[pulumi.ResourceOptions] = None,
937
- allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
938
- allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
939
- allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
940
- allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
941
- allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
942
- allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
943
- backend: Optional[pulumi.Input[builtins.str]] = None,
944
- certificate: Optional[pulumi.Input[builtins.str]] = None,
945
- display_name: Optional[pulumi.Input[builtins.str]] = None,
946
- name: Optional[pulumi.Input[builtins.str]] = None,
947
- namespace: Optional[pulumi.Input[builtins.str]] = None,
948
- ocsp_ca_certificates: Optional[pulumi.Input[builtins.str]] = None,
949
- ocsp_enabled: Optional[pulumi.Input[builtins.bool]] = None,
950
- ocsp_fail_open: Optional[pulumi.Input[builtins.bool]] = None,
951
- ocsp_query_all_servers: Optional[pulumi.Input[builtins.bool]] = None,
952
- ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
953
- required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
954
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
955
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
956
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
957
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
958
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
959
- token_period: Optional[pulumi.Input[builtins.int]] = None,
960
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
961
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
962
- token_type: Optional[pulumi.Input[builtins.str]] = None,
936
+ allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
937
+ allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
938
+ allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
939
+ allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
940
+ allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
941
+ allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
942
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
943
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
944
+ display_name: Optional[pulumi.Input[_builtins.str]] = None,
945
+ name: Optional[pulumi.Input[_builtins.str]] = None,
946
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
947
+ ocsp_ca_certificates: Optional[pulumi.Input[_builtins.str]] = None,
948
+ ocsp_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
949
+ ocsp_fail_open: Optional[pulumi.Input[_builtins.bool]] = None,
950
+ ocsp_query_all_servers: Optional[pulumi.Input[_builtins.bool]] = None,
951
+ ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
952
+ required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
953
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
954
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
955
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
956
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
957
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
958
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
959
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
960
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
961
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
963
962
  __props__=None):
964
963
  """
965
964
  Provides a resource to create a role in an [Cert auth backend within Vault](https://www.vaultproject.io/docs/auth/cert.html).
@@ -989,48 +988,48 @@ class CertAuthBackendRole(pulumi.CustomResource):
989
988
 
990
989
  :param str resource_name: The name of the resource.
991
990
  :param pulumi.ResourceOptions opts: Options for the resource.
992
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
993
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
994
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
995
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
996
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
997
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
998
- :param pulumi.Input[builtins.str] backend: Path to the mounted Cert auth backend
999
- :param pulumi.Input[builtins.str] certificate: CA certificate used to validate client certificates
1000
- :param pulumi.Input[builtins.str] display_name: The name to display on tokens issued under this role.
1001
- :param pulumi.Input[builtins.str] name: Name of the role
1002
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
991
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
992
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
993
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
994
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
995
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
996
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
997
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted Cert auth backend
998
+ :param pulumi.Input[_builtins.str] certificate: CA certificate used to validate client certificates
999
+ :param pulumi.Input[_builtins.str] display_name: The name to display on tokens issued under this role.
1000
+ :param pulumi.Input[_builtins.str] name: Name of the role
1001
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1003
1002
  The value should not contain leading or trailing forward slashes.
1004
1003
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1005
1004
  *Available only for Vault Enterprise*.
1006
- :param pulumi.Input[builtins.str] ocsp_ca_certificates: Any additional CA certificates
1005
+ :param pulumi.Input[_builtins.str] ocsp_ca_certificates: Any additional CA certificates
1007
1006
  needed to verify OCSP responses. Provided as base64 encoded PEM data.
1008
1007
  Requires Vault version 1.13+.
1009
- :param pulumi.Input[builtins.bool] ocsp_enabled: If enabled, validate certificates'
1008
+ :param pulumi.Input[_builtins.bool] ocsp_enabled: If enabled, validate certificates'
1010
1009
  revocation status using OCSP. Requires Vault version 1.13+.
1011
- :param pulumi.Input[builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
1010
+ :param pulumi.Input[_builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
1012
1011
  be fetched or is of an unknown status, the login will proceed as if the
1013
1012
  certificate has not been revoked.
1014
1013
  Requires Vault version 1.13+.
1015
- :param pulumi.Input[builtins.bool] ocsp_query_all_servers: If set to true, rather than
1014
+ :param pulumi.Input[_builtins.bool] ocsp_query_all_servers: If set to true, rather than
1016
1015
  accepting the first successful OCSP response, query all servers and consider
1017
1016
  the certificate valid only if all servers agree.
1018
1017
  Requires Vault version 1.13+.
1019
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
1018
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
1020
1019
  server addresses. If unset, the OCSP server is determined from the
1021
1020
  AuthorityInformationAccess extension on the certificate being inspected.
1022
1021
  Requires Vault version 1.13+.
1023
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] required_extensions: TLS extensions required on
1022
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] required_extensions: TLS extensions required on
1024
1023
  client certificates
1025
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1026
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1027
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
1028
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1029
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1030
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
1031
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
1032
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1033
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
1024
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1025
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1026
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
1027
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1028
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1029
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
1030
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
1031
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1032
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
1034
1033
  """
1035
1034
  ...
1036
1035
  @overload
@@ -1079,32 +1078,32 @@ class CertAuthBackendRole(pulumi.CustomResource):
1079
1078
  def _internal_init(__self__,
1080
1079
  resource_name: str,
1081
1080
  opts: Optional[pulumi.ResourceOptions] = None,
1082
- allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1083
- allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1084
- allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1085
- allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1086
- allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1087
- allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1088
- backend: Optional[pulumi.Input[builtins.str]] = None,
1089
- certificate: Optional[pulumi.Input[builtins.str]] = None,
1090
- display_name: Optional[pulumi.Input[builtins.str]] = None,
1091
- name: Optional[pulumi.Input[builtins.str]] = None,
1092
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1093
- ocsp_ca_certificates: Optional[pulumi.Input[builtins.str]] = None,
1094
- ocsp_enabled: Optional[pulumi.Input[builtins.bool]] = None,
1095
- ocsp_fail_open: Optional[pulumi.Input[builtins.bool]] = None,
1096
- ocsp_query_all_servers: Optional[pulumi.Input[builtins.bool]] = None,
1097
- ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1098
- required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1099
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1100
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1101
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1102
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
1103
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
1104
- token_period: Optional[pulumi.Input[builtins.int]] = None,
1105
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1106
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1107
- token_type: Optional[pulumi.Input[builtins.str]] = None,
1081
+ allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1082
+ allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1083
+ allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1084
+ allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1085
+ allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1086
+ allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1087
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1088
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
1089
+ display_name: Optional[pulumi.Input[_builtins.str]] = None,
1090
+ name: Optional[pulumi.Input[_builtins.str]] = None,
1091
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1092
+ ocsp_ca_certificates: Optional[pulumi.Input[_builtins.str]] = None,
1093
+ ocsp_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
1094
+ ocsp_fail_open: Optional[pulumi.Input[_builtins.bool]] = None,
1095
+ ocsp_query_all_servers: Optional[pulumi.Input[_builtins.bool]] = None,
1096
+ ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1097
+ required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1098
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1099
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1100
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1101
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
1102
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
1103
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
1104
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1105
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1106
+ token_type: Optional[pulumi.Input[_builtins.str]] = None,
1108
1107
  __props__=None):
1109
1108
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
1110
1109
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -1152,32 +1151,32 @@ class CertAuthBackendRole(pulumi.CustomResource):
1152
1151
  def get(resource_name: str,
1153
1152
  id: pulumi.Input[str],
1154
1153
  opts: Optional[pulumi.ResourceOptions] = None,
1155
- allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1156
- allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1157
- allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1158
- allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1159
- allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1160
- allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1161
- backend: Optional[pulumi.Input[builtins.str]] = None,
1162
- certificate: Optional[pulumi.Input[builtins.str]] = None,
1163
- display_name: Optional[pulumi.Input[builtins.str]] = None,
1164
- name: Optional[pulumi.Input[builtins.str]] = None,
1165
- namespace: Optional[pulumi.Input[builtins.str]] = None,
1166
- ocsp_ca_certificates: Optional[pulumi.Input[builtins.str]] = None,
1167
- ocsp_enabled: Optional[pulumi.Input[builtins.bool]] = None,
1168
- ocsp_fail_open: Optional[pulumi.Input[builtins.bool]] = None,
1169
- ocsp_query_all_servers: Optional[pulumi.Input[builtins.bool]] = None,
1170
- ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1171
- required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1172
- token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1173
- token_explicit_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1174
- token_max_ttl: Optional[pulumi.Input[builtins.int]] = None,
1175
- token_no_default_policy: Optional[pulumi.Input[builtins.bool]] = None,
1176
- token_num_uses: Optional[pulumi.Input[builtins.int]] = None,
1177
- token_period: Optional[pulumi.Input[builtins.int]] = None,
1178
- token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
1179
- token_ttl: Optional[pulumi.Input[builtins.int]] = None,
1180
- token_type: Optional[pulumi.Input[builtins.str]] = None) -> 'CertAuthBackendRole':
1154
+ allowed_common_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1155
+ allowed_dns_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1156
+ allowed_email_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1157
+ allowed_names: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1158
+ allowed_organizational_units: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1159
+ allowed_uri_sans: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1160
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
1161
+ certificate: Optional[pulumi.Input[_builtins.str]] = None,
1162
+ display_name: Optional[pulumi.Input[_builtins.str]] = None,
1163
+ name: Optional[pulumi.Input[_builtins.str]] = None,
1164
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
1165
+ ocsp_ca_certificates: Optional[pulumi.Input[_builtins.str]] = None,
1166
+ ocsp_enabled: Optional[pulumi.Input[_builtins.bool]] = None,
1167
+ ocsp_fail_open: Optional[pulumi.Input[_builtins.bool]] = None,
1168
+ ocsp_query_all_servers: Optional[pulumi.Input[_builtins.bool]] = None,
1169
+ ocsp_servers_overrides: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1170
+ required_extensions: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1171
+ token_bound_cidrs: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1172
+ token_explicit_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1173
+ token_max_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1174
+ token_no_default_policy: Optional[pulumi.Input[_builtins.bool]] = None,
1175
+ token_num_uses: Optional[pulumi.Input[_builtins.int]] = None,
1176
+ token_period: Optional[pulumi.Input[_builtins.int]] = None,
1177
+ token_policies: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
1178
+ token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
1179
+ token_type: Optional[pulumi.Input[_builtins.str]] = None) -> 'CertAuthBackendRole':
1181
1180
  """
1182
1181
  Get an existing CertAuthBackendRole resource's state with the given name, id, and optional extra
1183
1182
  properties used to qualify the lookup.
@@ -1185,48 +1184,48 @@ class CertAuthBackendRole(pulumi.CustomResource):
1185
1184
  :param str resource_name: The unique name of the resulting resource.
1186
1185
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
1187
1186
  :param pulumi.ResourceOptions opts: Options for the resource.
1188
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
1189
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
1190
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
1191
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
1192
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
1193
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
1194
- :param pulumi.Input[builtins.str] backend: Path to the mounted Cert auth backend
1195
- :param pulumi.Input[builtins.str] certificate: CA certificate used to validate client certificates
1196
- :param pulumi.Input[builtins.str] display_name: The name to display on tokens issued under this role.
1197
- :param pulumi.Input[builtins.str] name: Name of the role
1198
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
1187
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_common_names: Allowed the common names for authenticated client certificates
1188
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_dns_sans: Allowed alternative dns names for authenticated client certificates
1189
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_email_sans: Allowed emails for authenticated client certificates
1190
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_names: DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
1191
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_organizational_units: Allowed organization units for authenticated client certificates.
1192
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] allowed_uri_sans: Allowed URIs for authenticated client certificates
1193
+ :param pulumi.Input[_builtins.str] backend: Path to the mounted Cert auth backend
1194
+ :param pulumi.Input[_builtins.str] certificate: CA certificate used to validate client certificates
1195
+ :param pulumi.Input[_builtins.str] display_name: The name to display on tokens issued under this role.
1196
+ :param pulumi.Input[_builtins.str] name: Name of the role
1197
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
1199
1198
  The value should not contain leading or trailing forward slashes.
1200
1199
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1201
1200
  *Available only for Vault Enterprise*.
1202
- :param pulumi.Input[builtins.str] ocsp_ca_certificates: Any additional CA certificates
1201
+ :param pulumi.Input[_builtins.str] ocsp_ca_certificates: Any additional CA certificates
1203
1202
  needed to verify OCSP responses. Provided as base64 encoded PEM data.
1204
1203
  Requires Vault version 1.13+.
1205
- :param pulumi.Input[builtins.bool] ocsp_enabled: If enabled, validate certificates'
1204
+ :param pulumi.Input[_builtins.bool] ocsp_enabled: If enabled, validate certificates'
1206
1205
  revocation status using OCSP. Requires Vault version 1.13+.
1207
- :param pulumi.Input[builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
1206
+ :param pulumi.Input[_builtins.bool] ocsp_fail_open: If true and an OCSP response cannot
1208
1207
  be fetched or is of an unknown status, the login will proceed as if the
1209
1208
  certificate has not been revoked.
1210
1209
  Requires Vault version 1.13+.
1211
- :param pulumi.Input[builtins.bool] ocsp_query_all_servers: If set to true, rather than
1210
+ :param pulumi.Input[_builtins.bool] ocsp_query_all_servers: If set to true, rather than
1212
1211
  accepting the first successful OCSP response, query all servers and consider
1213
1212
  the certificate valid only if all servers agree.
1214
1213
  Requires Vault version 1.13+.
1215
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
1214
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] ocsp_servers_overrides: : A comma-separated list of OCSP
1216
1215
  server addresses. If unset, the OCSP server is determined from the
1217
1216
  AuthorityInformationAccess extension on the certificate being inspected.
1218
1217
  Requires Vault version 1.13+.
1219
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] required_extensions: TLS extensions required on
1218
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] required_extensions: TLS extensions required on
1220
1219
  client certificates
1221
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1222
- :param pulumi.Input[builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1223
- :param pulumi.Input[builtins.int] token_max_ttl: The maximum lifetime of the generated token
1224
- :param pulumi.Input[builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1225
- :param pulumi.Input[builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1226
- :param pulumi.Input[builtins.int] token_period: Generated Token's Period
1227
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] token_policies: Generated Token's Policies
1228
- :param pulumi.Input[builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1229
- :param pulumi.Input[builtins.str] token_type: The type of token to generate, service or batch
1220
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_bound_cidrs: Specifies the blocks of IP addresses which are allowed to use the generated token
1221
+ :param pulumi.Input[_builtins.int] token_explicit_max_ttl: Generated Token's Explicit Maximum TTL in seconds
1222
+ :param pulumi.Input[_builtins.int] token_max_ttl: The maximum lifetime of the generated token
1223
+ :param pulumi.Input[_builtins.bool] token_no_default_policy: If true, the 'default' policy will not automatically be added to generated tokens
1224
+ :param pulumi.Input[_builtins.int] token_num_uses: The maximum number of times a token may be used, a value of zero means unlimited
1225
+ :param pulumi.Input[_builtins.int] token_period: Generated Token's Period
1226
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] token_policies: Generated Token's Policies
1227
+ :param pulumi.Input[_builtins.int] token_ttl: The initial ttl of the token to generate in seconds
1228
+ :param pulumi.Input[_builtins.str] token_type: The type of token to generate, service or batch
1230
1229
  """
1231
1230
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
1232
1231
 
@@ -1260,89 +1259,89 @@ class CertAuthBackendRole(pulumi.CustomResource):
1260
1259
  __props__.__dict__["token_type"] = token_type
1261
1260
  return CertAuthBackendRole(resource_name, opts=opts, __props__=__props__)
1262
1261
 
1263
- @property
1262
+ @_builtins.property
1264
1263
  @pulumi.getter(name="allowedCommonNames")
1265
- def allowed_common_names(self) -> pulumi.Output[Sequence[builtins.str]]:
1264
+ def allowed_common_names(self) -> pulumi.Output[Sequence[_builtins.str]]:
1266
1265
  """
1267
1266
  Allowed the common names for authenticated client certificates
1268
1267
  """
1269
1268
  return pulumi.get(self, "allowed_common_names")
1270
1269
 
1271
- @property
1270
+ @_builtins.property
1272
1271
  @pulumi.getter(name="allowedDnsSans")
1273
- def allowed_dns_sans(self) -> pulumi.Output[Sequence[builtins.str]]:
1272
+ def allowed_dns_sans(self) -> pulumi.Output[Sequence[_builtins.str]]:
1274
1273
  """
1275
1274
  Allowed alternative dns names for authenticated client certificates
1276
1275
  """
1277
1276
  return pulumi.get(self, "allowed_dns_sans")
1278
1277
 
1279
- @property
1278
+ @_builtins.property
1280
1279
  @pulumi.getter(name="allowedEmailSans")
1281
- def allowed_email_sans(self) -> pulumi.Output[Sequence[builtins.str]]:
1280
+ def allowed_email_sans(self) -> pulumi.Output[Sequence[_builtins.str]]:
1282
1281
  """
1283
1282
  Allowed emails for authenticated client certificates
1284
1283
  """
1285
1284
  return pulumi.get(self, "allowed_email_sans")
1286
1285
 
1287
- @property
1286
+ @_builtins.property
1288
1287
  @pulumi.getter(name="allowedNames")
1289
- def allowed_names(self) -> pulumi.Output[Sequence[builtins.str]]:
1288
+ def allowed_names(self) -> pulumi.Output[Sequence[_builtins.str]]:
1290
1289
  """
1291
1290
  DEPRECATED: Please use the individual `allowed_X_sans` parameters instead. Allowed subject names for authenticated client certificates
1292
1291
  """
1293
1292
  return pulumi.get(self, "allowed_names")
1294
1293
 
1295
- @property
1294
+ @_builtins.property
1296
1295
  @pulumi.getter(name="allowedOrganizationalUnits")
1297
- def allowed_organizational_units(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1296
+ def allowed_organizational_units(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1298
1297
  """
1299
1298
  Allowed organization units for authenticated client certificates.
1300
1299
  """
1301
1300
  return pulumi.get(self, "allowed_organizational_units")
1302
1301
 
1303
- @property
1302
+ @_builtins.property
1304
1303
  @pulumi.getter(name="allowedUriSans")
1305
- def allowed_uri_sans(self) -> pulumi.Output[Sequence[builtins.str]]:
1304
+ def allowed_uri_sans(self) -> pulumi.Output[Sequence[_builtins.str]]:
1306
1305
  """
1307
1306
  Allowed URIs for authenticated client certificates
1308
1307
  """
1309
1308
  return pulumi.get(self, "allowed_uri_sans")
1310
1309
 
1311
- @property
1310
+ @_builtins.property
1312
1311
  @pulumi.getter
1313
- def backend(self) -> pulumi.Output[Optional[builtins.str]]:
1312
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
1314
1313
  """
1315
1314
  Path to the mounted Cert auth backend
1316
1315
  """
1317
1316
  return pulumi.get(self, "backend")
1318
1317
 
1319
- @property
1318
+ @_builtins.property
1320
1319
  @pulumi.getter
1321
- def certificate(self) -> pulumi.Output[builtins.str]:
1320
+ def certificate(self) -> pulumi.Output[_builtins.str]:
1322
1321
  """
1323
1322
  CA certificate used to validate client certificates
1324
1323
  """
1325
1324
  return pulumi.get(self, "certificate")
1326
1325
 
1327
- @property
1326
+ @_builtins.property
1328
1327
  @pulumi.getter(name="displayName")
1329
- def display_name(self) -> pulumi.Output[builtins.str]:
1328
+ def display_name(self) -> pulumi.Output[_builtins.str]:
1330
1329
  """
1331
1330
  The name to display on tokens issued under this role.
1332
1331
  """
1333
1332
  return pulumi.get(self, "display_name")
1334
1333
 
1335
- @property
1334
+ @_builtins.property
1336
1335
  @pulumi.getter
1337
- def name(self) -> pulumi.Output[builtins.str]:
1336
+ def name(self) -> pulumi.Output[_builtins.str]:
1338
1337
  """
1339
1338
  Name of the role
1340
1339
  """
1341
1340
  return pulumi.get(self, "name")
1342
1341
 
1343
- @property
1342
+ @_builtins.property
1344
1343
  @pulumi.getter
1345
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
1344
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1346
1345
  """
1347
1346
  The namespace to provision the resource in.
1348
1347
  The value should not contain leading or trailing forward slashes.
@@ -1351,9 +1350,9 @@ class CertAuthBackendRole(pulumi.CustomResource):
1351
1350
  """
1352
1351
  return pulumi.get(self, "namespace")
1353
1352
 
1354
- @property
1353
+ @_builtins.property
1355
1354
  @pulumi.getter(name="ocspCaCertificates")
1356
- def ocsp_ca_certificates(self) -> pulumi.Output[Optional[builtins.str]]:
1355
+ def ocsp_ca_certificates(self) -> pulumi.Output[Optional[_builtins.str]]:
1357
1356
  """
1358
1357
  Any additional CA certificates
1359
1358
  needed to verify OCSP responses. Provided as base64 encoded PEM data.
@@ -1361,18 +1360,18 @@ class CertAuthBackendRole(pulumi.CustomResource):
1361
1360
  """
1362
1361
  return pulumi.get(self, "ocsp_ca_certificates")
1363
1362
 
1364
- @property
1363
+ @_builtins.property
1365
1364
  @pulumi.getter(name="ocspEnabled")
1366
- def ocsp_enabled(self) -> pulumi.Output[builtins.bool]:
1365
+ def ocsp_enabled(self) -> pulumi.Output[_builtins.bool]:
1367
1366
  """
1368
1367
  If enabled, validate certificates'
1369
1368
  revocation status using OCSP. Requires Vault version 1.13+.
1370
1369
  """
1371
1370
  return pulumi.get(self, "ocsp_enabled")
1372
1371
 
1373
- @property
1372
+ @_builtins.property
1374
1373
  @pulumi.getter(name="ocspFailOpen")
1375
- def ocsp_fail_open(self) -> pulumi.Output[builtins.bool]:
1374
+ def ocsp_fail_open(self) -> pulumi.Output[_builtins.bool]:
1376
1375
  """
1377
1376
  If true and an OCSP response cannot
1378
1377
  be fetched or is of an unknown status, the login will proceed as if the
@@ -1381,9 +1380,9 @@ class CertAuthBackendRole(pulumi.CustomResource):
1381
1380
  """
1382
1381
  return pulumi.get(self, "ocsp_fail_open")
1383
1382
 
1384
- @property
1383
+ @_builtins.property
1385
1384
  @pulumi.getter(name="ocspQueryAllServers")
1386
- def ocsp_query_all_servers(self) -> pulumi.Output[builtins.bool]:
1385
+ def ocsp_query_all_servers(self) -> pulumi.Output[_builtins.bool]:
1387
1386
  """
1388
1387
  If set to true, rather than
1389
1388
  accepting the first successful OCSP response, query all servers and consider
@@ -1392,9 +1391,9 @@ class CertAuthBackendRole(pulumi.CustomResource):
1392
1391
  """
1393
1392
  return pulumi.get(self, "ocsp_query_all_servers")
1394
1393
 
1395
- @property
1394
+ @_builtins.property
1396
1395
  @pulumi.getter(name="ocspServersOverrides")
1397
- def ocsp_servers_overrides(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1396
+ def ocsp_servers_overrides(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1398
1397
  """
1399
1398
  : A comma-separated list of OCSP
1400
1399
  server addresses. If unset, the OCSP server is determined from the
@@ -1403,82 +1402,82 @@ class CertAuthBackendRole(pulumi.CustomResource):
1403
1402
  """
1404
1403
  return pulumi.get(self, "ocsp_servers_overrides")
1405
1404
 
1406
- @property
1405
+ @_builtins.property
1407
1406
  @pulumi.getter(name="requiredExtensions")
1408
- def required_extensions(self) -> pulumi.Output[Sequence[builtins.str]]:
1407
+ def required_extensions(self) -> pulumi.Output[Sequence[_builtins.str]]:
1409
1408
  """
1410
1409
  TLS extensions required on
1411
1410
  client certificates
1412
1411
  """
1413
1412
  return pulumi.get(self, "required_extensions")
1414
1413
 
1415
- @property
1414
+ @_builtins.property
1416
1415
  @pulumi.getter(name="tokenBoundCidrs")
1417
- def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1416
+ def token_bound_cidrs(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1418
1417
  """
1419
1418
  Specifies the blocks of IP addresses which are allowed to use the generated token
1420
1419
  """
1421
1420
  return pulumi.get(self, "token_bound_cidrs")
1422
1421
 
1423
- @property
1422
+ @_builtins.property
1424
1423
  @pulumi.getter(name="tokenExplicitMaxTtl")
1425
- def token_explicit_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1424
+ def token_explicit_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1426
1425
  """
1427
1426
  Generated Token's Explicit Maximum TTL in seconds
1428
1427
  """
1429
1428
  return pulumi.get(self, "token_explicit_max_ttl")
1430
1429
 
1431
- @property
1430
+ @_builtins.property
1432
1431
  @pulumi.getter(name="tokenMaxTtl")
1433
- def token_max_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1432
+ def token_max_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1434
1433
  """
1435
1434
  The maximum lifetime of the generated token
1436
1435
  """
1437
1436
  return pulumi.get(self, "token_max_ttl")
1438
1437
 
1439
- @property
1438
+ @_builtins.property
1440
1439
  @pulumi.getter(name="tokenNoDefaultPolicy")
1441
- def token_no_default_policy(self) -> pulumi.Output[Optional[builtins.bool]]:
1440
+ def token_no_default_policy(self) -> pulumi.Output[Optional[_builtins.bool]]:
1442
1441
  """
1443
1442
  If true, the 'default' policy will not automatically be added to generated tokens
1444
1443
  """
1445
1444
  return pulumi.get(self, "token_no_default_policy")
1446
1445
 
1447
- @property
1446
+ @_builtins.property
1448
1447
  @pulumi.getter(name="tokenNumUses")
1449
- def token_num_uses(self) -> pulumi.Output[Optional[builtins.int]]:
1448
+ def token_num_uses(self) -> pulumi.Output[Optional[_builtins.int]]:
1450
1449
  """
1451
1450
  The maximum number of times a token may be used, a value of zero means unlimited
1452
1451
  """
1453
1452
  return pulumi.get(self, "token_num_uses")
1454
1453
 
1455
- @property
1454
+ @_builtins.property
1456
1455
  @pulumi.getter(name="tokenPeriod")
1457
- def token_period(self) -> pulumi.Output[Optional[builtins.int]]:
1456
+ def token_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1458
1457
  """
1459
1458
  Generated Token's Period
1460
1459
  """
1461
1460
  return pulumi.get(self, "token_period")
1462
1461
 
1463
- @property
1462
+ @_builtins.property
1464
1463
  @pulumi.getter(name="tokenPolicies")
1465
- def token_policies(self) -> pulumi.Output[Optional[Sequence[builtins.str]]]:
1464
+ def token_policies(self) -> pulumi.Output[Optional[Sequence[_builtins.str]]]:
1466
1465
  """
1467
1466
  Generated Token's Policies
1468
1467
  """
1469
1468
  return pulumi.get(self, "token_policies")
1470
1469
 
1471
- @property
1470
+ @_builtins.property
1472
1471
  @pulumi.getter(name="tokenTtl")
1473
- def token_ttl(self) -> pulumi.Output[Optional[builtins.int]]:
1472
+ def token_ttl(self) -> pulumi.Output[Optional[_builtins.int]]:
1474
1473
  """
1475
1474
  The initial ttl of the token to generate in seconds
1476
1475
  """
1477
1476
  return pulumi.get(self, "token_ttl")
1478
1477
 
1479
- @property
1478
+ @_builtins.property
1480
1479
  @pulumi.getter(name="tokenType")
1481
- def token_type(self) -> pulumi.Output[Optional[builtins.str]]:
1480
+ def token_type(self) -> pulumi.Output[Optional[_builtins.str]]:
1482
1481
  """
1483
1482
  The type of token to generate, service or batch
1484
1483
  """