pulumi-vault 7.2.0a1752907825__py3-none-any.whl → 7.2.0a1753398491__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (267) hide show
  1. pulumi_vault/__init__.py +1 -1
  2. pulumi_vault/_inputs.py +672 -673
  3. pulumi_vault/ad/__init__.py +1 -1
  4. pulumi_vault/ad/get_access_credentials.py +27 -28
  5. pulumi_vault/ad/secret_backend.py +579 -580
  6. pulumi_vault/ad/secret_library.py +120 -121
  7. pulumi_vault/ad/secret_role.py +104 -105
  8. pulumi_vault/alicloud/__init__.py +1 -1
  9. pulumi_vault/alicloud/auth_backend_role.py +222 -223
  10. pulumi_vault/approle/__init__.py +1 -1
  11. pulumi_vault/approle/auth_backend_login.py +138 -139
  12. pulumi_vault/approle/auth_backend_role.py +292 -293
  13. pulumi_vault/approle/auth_backend_role_secret_id.py +202 -203
  14. pulumi_vault/approle/get_auth_backend_role_id.py +23 -24
  15. pulumi_vault/audit.py +103 -104
  16. pulumi_vault/audit_request_header.py +52 -53
  17. pulumi_vault/auth_backend.py +132 -133
  18. pulumi_vault/aws/__init__.py +1 -1
  19. pulumi_vault/aws/auth_backend_cert.py +86 -87
  20. pulumi_vault/aws/auth_backend_client.py +307 -308
  21. pulumi_vault/aws/auth_backend_config_identity.py +103 -104
  22. pulumi_vault/aws/auth_backend_identity_whitelist.py +69 -70
  23. pulumi_vault/aws/auth_backend_login.py +258 -259
  24. pulumi_vault/aws/auth_backend_role.py +486 -487
  25. pulumi_vault/aws/auth_backend_role_tag.py +155 -156
  26. pulumi_vault/aws/auth_backend_roletag_blacklist.py +69 -70
  27. pulumi_vault/aws/auth_backend_sts_role.py +86 -87
  28. pulumi_vault/aws/get_access_credentials.py +59 -60
  29. pulumi_vault/aws/get_static_access_credentials.py +19 -20
  30. pulumi_vault/aws/secret_backend.py +409 -410
  31. pulumi_vault/aws/secret_backend_role.py +256 -257
  32. pulumi_vault/aws/secret_backend_static_role.py +137 -138
  33. pulumi_vault/azure/__init__.py +1 -1
  34. pulumi_vault/azure/_inputs.py +26 -27
  35. pulumi_vault/azure/auth_backend_config.py +222 -223
  36. pulumi_vault/azure/auth_backend_role.py +307 -308
  37. pulumi_vault/azure/backend.py +273 -274
  38. pulumi_vault/azure/backend_role.py +194 -195
  39. pulumi_vault/azure/get_access_credentials.py +75 -76
  40. pulumi_vault/azure/outputs.py +16 -17
  41. pulumi_vault/cert_auth_backend_role.py +443 -444
  42. pulumi_vault/config/__init__.py +1 -1
  43. pulumi_vault/config/__init__.pyi +1 -2
  44. pulumi_vault/config/_inputs.py +13 -14
  45. pulumi_vault/config/outputs.py +380 -381
  46. pulumi_vault/config/ui_custom_message.py +140 -141
  47. pulumi_vault/config/vars.py +31 -32
  48. pulumi_vault/consul/__init__.py +1 -1
  49. pulumi_vault/consul/secret_backend.py +239 -240
  50. pulumi_vault/consul/secret_backend_role.py +222 -223
  51. pulumi_vault/database/__init__.py +1 -1
  52. pulumi_vault/database/_inputs.py +3167 -3168
  53. pulumi_vault/database/outputs.py +2123 -2124
  54. pulumi_vault/database/secret_backend_connection.py +259 -260
  55. pulumi_vault/database/secret_backend_role.py +205 -206
  56. pulumi_vault/database/secret_backend_static_role.py +218 -219
  57. pulumi_vault/database/secrets_mount.py +379 -380
  58. pulumi_vault/egp_policy.py +86 -87
  59. pulumi_vault/gcp/__init__.py +1 -1
  60. pulumi_vault/gcp/_inputs.py +98 -99
  61. pulumi_vault/gcp/auth_backend.py +322 -323
  62. pulumi_vault/gcp/auth_backend_role.py +347 -348
  63. pulumi_vault/gcp/get_auth_backend_role.py +91 -92
  64. pulumi_vault/gcp/outputs.py +66 -67
  65. pulumi_vault/gcp/secret_backend.py +299 -300
  66. pulumi_vault/gcp/secret_impersonated_account.py +112 -113
  67. pulumi_vault/gcp/secret_roleset.py +115 -116
  68. pulumi_vault/gcp/secret_static_account.py +115 -116
  69. pulumi_vault/generic/__init__.py +1 -1
  70. pulumi_vault/generic/endpoint.py +138 -139
  71. pulumi_vault/generic/get_secret.py +39 -40
  72. pulumi_vault/generic/secret.py +95 -96
  73. pulumi_vault/get_auth_backend.py +29 -30
  74. pulumi_vault/get_auth_backends.py +19 -20
  75. pulumi_vault/get_namespace.py +21 -22
  76. pulumi_vault/get_namespaces.py +19 -20
  77. pulumi_vault/get_nomad_access_token.py +25 -26
  78. pulumi_vault/get_policy_document.py +10 -11
  79. pulumi_vault/get_raft_autopilot_state.py +31 -32
  80. pulumi_vault/github/__init__.py +1 -1
  81. pulumi_vault/github/_inputs.py +50 -51
  82. pulumi_vault/github/auth_backend.py +285 -286
  83. pulumi_vault/github/outputs.py +34 -35
  84. pulumi_vault/github/team.py +69 -70
  85. pulumi_vault/github/user.py +69 -70
  86. pulumi_vault/identity/__init__.py +1 -1
  87. pulumi_vault/identity/entity.py +103 -104
  88. pulumi_vault/identity/entity_alias.py +86 -87
  89. pulumi_vault/identity/entity_policies.py +78 -79
  90. pulumi_vault/identity/get_entity.py +62 -63
  91. pulumi_vault/identity/get_group.py +75 -76
  92. pulumi_vault/identity/get_oidc_client_creds.py +19 -20
  93. pulumi_vault/identity/get_oidc_openid_config.py +39 -40
  94. pulumi_vault/identity/get_oidc_public_keys.py +17 -18
  95. pulumi_vault/identity/group.py +171 -172
  96. pulumi_vault/identity/group_alias.py +69 -70
  97. pulumi_vault/identity/group_member_entity_ids.py +69 -70
  98. pulumi_vault/identity/group_member_group_ids.py +69 -70
  99. pulumi_vault/identity/group_policies.py +78 -79
  100. pulumi_vault/identity/mfa_duo.py +183 -184
  101. pulumi_vault/identity/mfa_login_enforcement.py +147 -148
  102. pulumi_vault/identity/mfa_okta.py +166 -167
  103. pulumi_vault/identity/mfa_pingid.py +160 -161
  104. pulumi_vault/identity/mfa_totp.py +217 -218
  105. pulumi_vault/identity/oidc.py +35 -36
  106. pulumi_vault/identity/oidc_assignment.py +69 -70
  107. pulumi_vault/identity/oidc_client.py +155 -156
  108. pulumi_vault/identity/oidc_key.py +103 -104
  109. pulumi_vault/identity/oidc_key_allowed_client_id.py +52 -53
  110. pulumi_vault/identity/oidc_provider.py +112 -113
  111. pulumi_vault/identity/oidc_role.py +103 -104
  112. pulumi_vault/identity/oidc_scope.py +69 -70
  113. pulumi_vault/identity/outputs.py +42 -43
  114. pulumi_vault/jwt/__init__.py +1 -1
  115. pulumi_vault/jwt/_inputs.py +50 -51
  116. pulumi_vault/jwt/auth_backend.py +353 -354
  117. pulumi_vault/jwt/auth_backend_role.py +494 -495
  118. pulumi_vault/jwt/outputs.py +34 -35
  119. pulumi_vault/kmip/__init__.py +1 -1
  120. pulumi_vault/kmip/secret_backend.py +222 -223
  121. pulumi_vault/kmip/secret_role.py +358 -359
  122. pulumi_vault/kmip/secret_scope.py +69 -70
  123. pulumi_vault/kubernetes/__init__.py +1 -1
  124. pulumi_vault/kubernetes/auth_backend_config.py +171 -172
  125. pulumi_vault/kubernetes/auth_backend_role.py +273 -274
  126. pulumi_vault/kubernetes/get_auth_backend_config.py +57 -58
  127. pulumi_vault/kubernetes/get_auth_backend_role.py +87 -88
  128. pulumi_vault/kubernetes/get_service_account_token.py +51 -52
  129. pulumi_vault/kubernetes/secret_backend.py +384 -385
  130. pulumi_vault/kubernetes/secret_backend_role.py +239 -240
  131. pulumi_vault/kv/__init__.py +1 -1
  132. pulumi_vault/kv/_inputs.py +25 -26
  133. pulumi_vault/kv/get_secret.py +25 -26
  134. pulumi_vault/kv/get_secret_subkeys_v2.py +39 -40
  135. pulumi_vault/kv/get_secret_v2.py +41 -42
  136. pulumi_vault/kv/get_secrets_list.py +17 -18
  137. pulumi_vault/kv/get_secrets_list_v2.py +25 -26
  138. pulumi_vault/kv/outputs.py +17 -18
  139. pulumi_vault/kv/secret.py +61 -62
  140. pulumi_vault/kv/secret_backend_v2.py +86 -87
  141. pulumi_vault/kv/secret_v2.py +184 -185
  142. pulumi_vault/ldap/__init__.py +1 -1
  143. pulumi_vault/ldap/auth_backend.py +716 -717
  144. pulumi_vault/ldap/auth_backend_group.py +69 -70
  145. pulumi_vault/ldap/auth_backend_user.py +86 -87
  146. pulumi_vault/ldap/get_dynamic_credentials.py +27 -28
  147. pulumi_vault/ldap/get_static_credentials.py +29 -30
  148. pulumi_vault/ldap/secret_backend.py +673 -674
  149. pulumi_vault/ldap/secret_backend_dynamic_role.py +154 -155
  150. pulumi_vault/ldap/secret_backend_library_set.py +120 -121
  151. pulumi_vault/ldap/secret_backend_static_role.py +120 -121
  152. pulumi_vault/managed/__init__.py +1 -1
  153. pulumi_vault/managed/_inputs.py +274 -275
  154. pulumi_vault/managed/keys.py +27 -28
  155. pulumi_vault/managed/outputs.py +184 -185
  156. pulumi_vault/mfa_duo.py +137 -138
  157. pulumi_vault/mfa_okta.py +137 -138
  158. pulumi_vault/mfa_pingid.py +149 -150
  159. pulumi_vault/mfa_totp.py +154 -155
  160. pulumi_vault/mongodbatlas/__init__.py +1 -1
  161. pulumi_vault/mongodbatlas/secret_backend.py +78 -79
  162. pulumi_vault/mongodbatlas/secret_role.py +188 -189
  163. pulumi_vault/mount.py +333 -334
  164. pulumi_vault/namespace.py +78 -79
  165. pulumi_vault/nomad_secret_backend.py +256 -257
  166. pulumi_vault/nomad_secret_role.py +103 -104
  167. pulumi_vault/okta/__init__.py +1 -1
  168. pulumi_vault/okta/_inputs.py +31 -32
  169. pulumi_vault/okta/auth_backend.py +305 -306
  170. pulumi_vault/okta/auth_backend_group.py +69 -70
  171. pulumi_vault/okta/auth_backend_user.py +86 -87
  172. pulumi_vault/okta/outputs.py +21 -22
  173. pulumi_vault/outputs.py +81 -82
  174. pulumi_vault/pkisecret/__init__.py +1 -1
  175. pulumi_vault/pkisecret/_inputs.py +55 -56
  176. pulumi_vault/pkisecret/backend_acme_eab.py +116 -117
  177. pulumi_vault/pkisecret/backend_config_acme.py +175 -176
  178. pulumi_vault/pkisecret/backend_config_auto_tidy.py +394 -395
  179. pulumi_vault/pkisecret/backend_config_cluster.py +71 -72
  180. pulumi_vault/pkisecret/backend_config_cmpv2.py +132 -133
  181. pulumi_vault/pkisecret/backend_config_est.py +149 -150
  182. pulumi_vault/pkisecret/backend_config_scep.py +137 -138
  183. pulumi_vault/pkisecret/get_backend_cert_metadata.py +37 -38
  184. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +32 -33
  185. pulumi_vault/pkisecret/get_backend_config_est.py +30 -31
  186. pulumi_vault/pkisecret/get_backend_config_scep.py +29 -30
  187. pulumi_vault/pkisecret/get_backend_issuer.py +63 -64
  188. pulumi_vault/pkisecret/get_backend_issuers.py +23 -24
  189. pulumi_vault/pkisecret/get_backend_key.py +29 -30
  190. pulumi_vault/pkisecret/get_backend_keys.py +23 -24
  191. pulumi_vault/pkisecret/outputs.py +61 -62
  192. pulumi_vault/pkisecret/secret_backend_cert.py +415 -416
  193. pulumi_vault/pkisecret/secret_backend_config_ca.py +54 -55
  194. pulumi_vault/pkisecret/secret_backend_config_issuers.py +75 -76
  195. pulumi_vault/pkisecret/secret_backend_config_urls.py +105 -106
  196. pulumi_vault/pkisecret/secret_backend_crl_config.py +241 -242
  197. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +515 -516
  198. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +78 -79
  199. pulumi_vault/pkisecret/secret_backend_issuer.py +286 -287
  200. pulumi_vault/pkisecret/secret_backend_key.py +146 -147
  201. pulumi_vault/pkisecret/secret_backend_role.py +873 -874
  202. pulumi_vault/pkisecret/secret_backend_root_cert.py +677 -678
  203. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +660 -661
  204. pulumi_vault/pkisecret/secret_backend_sign.py +346 -347
  205. pulumi_vault/plugin.py +154 -155
  206. pulumi_vault/plugin_pinned_version.py +52 -53
  207. pulumi_vault/policy.py +52 -53
  208. pulumi_vault/provider.py +160 -161
  209. pulumi_vault/pulumi-plugin.json +1 -1
  210. pulumi_vault/quota_lease_count.py +103 -104
  211. pulumi_vault/quota_rate_limit.py +171 -172
  212. pulumi_vault/rabbitmq/__init__.py +1 -1
  213. pulumi_vault/rabbitmq/_inputs.py +50 -51
  214. pulumi_vault/rabbitmq/outputs.py +34 -35
  215. pulumi_vault/rabbitmq/secret_backend.py +207 -208
  216. pulumi_vault/rabbitmq/secret_backend_role.py +79 -80
  217. pulumi_vault/raft_autopilot.py +137 -138
  218. pulumi_vault/raft_snapshot_agent_config.py +477 -478
  219. pulumi_vault/rgp_policy.py +69 -70
  220. pulumi_vault/saml/__init__.py +1 -1
  221. pulumi_vault/saml/auth_backend.py +188 -189
  222. pulumi_vault/saml/auth_backend_role.py +290 -291
  223. pulumi_vault/scep_auth_backend_role.py +252 -253
  224. pulumi_vault/secrets/__init__.py +1 -1
  225. pulumi_vault/secrets/_inputs.py +19 -20
  226. pulumi_vault/secrets/outputs.py +13 -14
  227. pulumi_vault/secrets/sync_association.py +88 -89
  228. pulumi_vault/secrets/sync_aws_destination.py +180 -181
  229. pulumi_vault/secrets/sync_azure_destination.py +180 -181
  230. pulumi_vault/secrets/sync_config.py +52 -53
  231. pulumi_vault/secrets/sync_gcp_destination.py +129 -130
  232. pulumi_vault/secrets/sync_gh_destination.py +163 -164
  233. pulumi_vault/secrets/sync_github_apps.py +78 -79
  234. pulumi_vault/secrets/sync_vercel_destination.py +146 -147
  235. pulumi_vault/ssh/__init__.py +1 -1
  236. pulumi_vault/ssh/_inputs.py +13 -14
  237. pulumi_vault/ssh/get_secret_backend_sign.py +65 -66
  238. pulumi_vault/ssh/outputs.py +9 -10
  239. pulumi_vault/ssh/secret_backend_ca.py +120 -121
  240. pulumi_vault/ssh/secret_backend_role.py +446 -447
  241. pulumi_vault/terraformcloud/__init__.py +1 -1
  242. pulumi_vault/terraformcloud/secret_backend.py +138 -139
  243. pulumi_vault/terraformcloud/secret_creds.py +93 -94
  244. pulumi_vault/terraformcloud/secret_role.py +117 -118
  245. pulumi_vault/token.py +301 -302
  246. pulumi_vault/tokenauth/__init__.py +1 -1
  247. pulumi_vault/tokenauth/auth_backend_role.py +324 -325
  248. pulumi_vault/transform/__init__.py +1 -1
  249. pulumi_vault/transform/alphabet.py +69 -70
  250. pulumi_vault/transform/get_decode.py +57 -58
  251. pulumi_vault/transform/get_encode.py +57 -58
  252. pulumi_vault/transform/role.py +69 -70
  253. pulumi_vault/transform/template.py +137 -138
  254. pulumi_vault/transform/transformation.py +171 -172
  255. pulumi_vault/transit/__init__.py +1 -1
  256. pulumi_vault/transit/get_cmac.py +47 -48
  257. pulumi_vault/transit/get_decrypt.py +25 -26
  258. pulumi_vault/transit/get_encrypt.py +29 -30
  259. pulumi_vault/transit/get_sign.py +71 -72
  260. pulumi_vault/transit/get_verify.py +83 -84
  261. pulumi_vault/transit/secret_backend_key.py +336 -337
  262. pulumi_vault/transit/secret_cache_config.py +52 -53
  263. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/METADATA +1 -1
  264. pulumi_vault-7.2.0a1753398491.dist-info/RECORD +268 -0
  265. pulumi_vault-7.2.0a1752907825.dist-info/RECORD +0 -268
  266. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/WHEEL +0 -0
  267. {pulumi_vault-7.2.0a1752907825.dist-info → pulumi_vault-7.2.0a1753398491.dist-info}/top_level.txt +0 -0
@@ -2,8 +2,7 @@
2
2
  # *** WARNING: this file was generated by pulumi-language-python. ***
3
3
  # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
4
 
5
- import builtins
6
- import copy
5
+ import builtins as _builtins
7
6
  import warnings
8
7
  import sys
9
8
  import pulumi
@@ -20,39 +19,39 @@ __all__ = ['AuthBackendArgs', 'AuthBackend']
20
19
  @pulumi.input_type
21
20
  class AuthBackendArgs:
22
21
  def __init__(__self__, *,
23
- acs_urls: pulumi.Input[Sequence[pulumi.Input[builtins.str]]],
24
- entity_id: pulumi.Input[builtins.str],
25
- default_role: Optional[pulumi.Input[builtins.str]] = None,
26
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
27
- idp_cert: Optional[pulumi.Input[builtins.str]] = None,
28
- idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
29
- idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
30
- idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
31
- namespace: Optional[pulumi.Input[builtins.str]] = None,
32
- path: Optional[pulumi.Input[builtins.str]] = None,
33
- verbose_logging: Optional[pulumi.Input[builtins.bool]] = None):
22
+ acs_urls: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]],
23
+ entity_id: pulumi.Input[_builtins.str],
24
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
25
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
26
+ idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
27
+ idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
28
+ idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
29
+ idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
30
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
31
+ path: Optional[pulumi.Input[_builtins.str]] = None,
32
+ verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None):
34
33
  """
35
34
  The set of arguments for constructing a AuthBackend resource.
36
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
35
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
37
36
  that should receive a response from the identity provider.
38
- :param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
39
- :param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
40
- :param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
37
+ :param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
38
+ :param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
39
+ :param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
41
40
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
42
- :param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
41
+ :param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
43
42
  with `idp_metadata_url`.
44
- :param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
43
+ :param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
45
44
  `idp_metadata_url`.
46
- :param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
47
- :param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
45
+ :param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
46
+ :param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
48
47
  `idp_metadata_url`.
49
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
48
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
50
49
  The value should not contain leading or trailing forward slashes.
51
50
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
52
51
  *Available only for Vault Enterprise*.
53
- :param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
52
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
54
53
  if not specified.
55
- :param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
54
+ :param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
56
55
  information during the SAML exchange according to the current logging level. Not
57
56
  recommended for production.
58
57
  """
@@ -77,9 +76,9 @@ class AuthBackendArgs:
77
76
  if verbose_logging is not None:
78
77
  pulumi.set(__self__, "verbose_logging", verbose_logging)
79
78
 
80
- @property
79
+ @_builtins.property
81
80
  @pulumi.getter(name="acsUrls")
82
- def acs_urls(self) -> pulumi.Input[Sequence[pulumi.Input[builtins.str]]]:
81
+ def acs_urls(self) -> pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]:
83
82
  """
84
83
  The well-formatted URLs of your Assertion Consumer Service (ACS)
85
84
  that should receive a response from the identity provider.
@@ -87,36 +86,36 @@ class AuthBackendArgs:
87
86
  return pulumi.get(self, "acs_urls")
88
87
 
89
88
  @acs_urls.setter
90
- def acs_urls(self, value: pulumi.Input[Sequence[pulumi.Input[builtins.str]]]):
89
+ def acs_urls(self, value: pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]):
91
90
  pulumi.set(self, "acs_urls", value)
92
91
 
93
- @property
92
+ @_builtins.property
94
93
  @pulumi.getter(name="entityId")
95
- def entity_id(self) -> pulumi.Input[builtins.str]:
94
+ def entity_id(self) -> pulumi.Input[_builtins.str]:
96
95
  """
97
96
  The entity ID of the SAML authentication service provider.
98
97
  """
99
98
  return pulumi.get(self, "entity_id")
100
99
 
101
100
  @entity_id.setter
102
- def entity_id(self, value: pulumi.Input[builtins.str]):
101
+ def entity_id(self, value: pulumi.Input[_builtins.str]):
103
102
  pulumi.set(self, "entity_id", value)
104
103
 
105
- @property
104
+ @_builtins.property
106
105
  @pulumi.getter(name="defaultRole")
107
- def default_role(self) -> Optional[pulumi.Input[builtins.str]]:
106
+ def default_role(self) -> Optional[pulumi.Input[_builtins.str]]:
108
107
  """
109
108
  The role to use if no role is provided during login.
110
109
  """
111
110
  return pulumi.get(self, "default_role")
112
111
 
113
112
  @default_role.setter
114
- def default_role(self, value: Optional[pulumi.Input[builtins.str]]):
113
+ def default_role(self, value: Optional[pulumi.Input[_builtins.str]]):
115
114
  pulumi.set(self, "default_role", value)
116
115
 
117
- @property
116
+ @_builtins.property
118
117
  @pulumi.getter(name="disableRemount")
119
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
118
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
120
119
  """
121
120
  If set to `true`, opts out of mount migration on path updates.
122
121
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -124,12 +123,12 @@ class AuthBackendArgs:
124
123
  return pulumi.get(self, "disable_remount")
125
124
 
126
125
  @disable_remount.setter
127
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
126
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
128
127
  pulumi.set(self, "disable_remount", value)
129
128
 
130
- @property
129
+ @_builtins.property
131
130
  @pulumi.getter(name="idpCert")
132
- def idp_cert(self) -> Optional[pulumi.Input[builtins.str]]:
131
+ def idp_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
133
132
  """
134
133
  The PEM encoded certificate of the identity provider. Mutually exclusive
135
134
  with `idp_metadata_url`.
@@ -137,12 +136,12 @@ class AuthBackendArgs:
137
136
  return pulumi.get(self, "idp_cert")
138
137
 
139
138
  @idp_cert.setter
140
- def idp_cert(self, value: Optional[pulumi.Input[builtins.str]]):
139
+ def idp_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
141
140
  pulumi.set(self, "idp_cert", value)
142
141
 
143
- @property
142
+ @_builtins.property
144
143
  @pulumi.getter(name="idpEntityId")
145
- def idp_entity_id(self) -> Optional[pulumi.Input[builtins.str]]:
144
+ def idp_entity_id(self) -> Optional[pulumi.Input[_builtins.str]]:
146
145
  """
147
146
  The entity ID of the identity provider. Mutually exclusive with
148
147
  `idp_metadata_url`.
@@ -150,24 +149,24 @@ class AuthBackendArgs:
150
149
  return pulumi.get(self, "idp_entity_id")
151
150
 
152
151
  @idp_entity_id.setter
153
- def idp_entity_id(self, value: Optional[pulumi.Input[builtins.str]]):
152
+ def idp_entity_id(self, value: Optional[pulumi.Input[_builtins.str]]):
154
153
  pulumi.set(self, "idp_entity_id", value)
155
154
 
156
- @property
155
+ @_builtins.property
157
156
  @pulumi.getter(name="idpMetadataUrl")
158
- def idp_metadata_url(self) -> Optional[pulumi.Input[builtins.str]]:
157
+ def idp_metadata_url(self) -> Optional[pulumi.Input[_builtins.str]]:
159
158
  """
160
159
  The metadata URL of the identity provider.
161
160
  """
162
161
  return pulumi.get(self, "idp_metadata_url")
163
162
 
164
163
  @idp_metadata_url.setter
165
- def idp_metadata_url(self, value: Optional[pulumi.Input[builtins.str]]):
164
+ def idp_metadata_url(self, value: Optional[pulumi.Input[_builtins.str]]):
166
165
  pulumi.set(self, "idp_metadata_url", value)
167
166
 
168
- @property
167
+ @_builtins.property
169
168
  @pulumi.getter(name="idpSsoUrl")
170
- def idp_sso_url(self) -> Optional[pulumi.Input[builtins.str]]:
169
+ def idp_sso_url(self) -> Optional[pulumi.Input[_builtins.str]]:
171
170
  """
172
171
  The SSO URL of the identity provider. Mutually exclusive with
173
172
  `idp_metadata_url`.
@@ -175,12 +174,12 @@ class AuthBackendArgs:
175
174
  return pulumi.get(self, "idp_sso_url")
176
175
 
177
176
  @idp_sso_url.setter
178
- def idp_sso_url(self, value: Optional[pulumi.Input[builtins.str]]):
177
+ def idp_sso_url(self, value: Optional[pulumi.Input[_builtins.str]]):
179
178
  pulumi.set(self, "idp_sso_url", value)
180
179
 
181
- @property
180
+ @_builtins.property
182
181
  @pulumi.getter
183
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
182
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
184
183
  """
185
184
  The namespace to provision the resource in.
186
185
  The value should not contain leading or trailing forward slashes.
@@ -190,12 +189,12 @@ class AuthBackendArgs:
190
189
  return pulumi.get(self, "namespace")
191
190
 
192
191
  @namespace.setter
193
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
192
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
194
193
  pulumi.set(self, "namespace", value)
195
194
 
196
- @property
195
+ @_builtins.property
197
196
  @pulumi.getter
198
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
197
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
199
198
  """
200
199
  Path where the auth backend will be mounted. Defaults to `auth/saml`
201
200
  if not specified.
@@ -203,12 +202,12 @@ class AuthBackendArgs:
203
202
  return pulumi.get(self, "path")
204
203
 
205
204
  @path.setter
206
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
205
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
207
206
  pulumi.set(self, "path", value)
208
207
 
209
- @property
208
+ @_builtins.property
210
209
  @pulumi.getter(name="verboseLogging")
211
- def verbose_logging(self) -> Optional[pulumi.Input[builtins.bool]]:
210
+ def verbose_logging(self) -> Optional[pulumi.Input[_builtins.bool]]:
212
211
  """
213
212
  If set to `true`, logs additional, potentially sensitive
214
213
  information during the SAML exchange according to the current logging level. Not
@@ -217,46 +216,46 @@ class AuthBackendArgs:
217
216
  return pulumi.get(self, "verbose_logging")
218
217
 
219
218
  @verbose_logging.setter
220
- def verbose_logging(self, value: Optional[pulumi.Input[builtins.bool]]):
219
+ def verbose_logging(self, value: Optional[pulumi.Input[_builtins.bool]]):
221
220
  pulumi.set(self, "verbose_logging", value)
222
221
 
223
222
 
224
223
  @pulumi.input_type
225
224
  class _AuthBackendState:
226
225
  def __init__(__self__, *,
227
- acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
228
- default_role: Optional[pulumi.Input[builtins.str]] = None,
229
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
230
- entity_id: Optional[pulumi.Input[builtins.str]] = None,
231
- idp_cert: Optional[pulumi.Input[builtins.str]] = None,
232
- idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
233
- idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
234
- idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
235
- namespace: Optional[pulumi.Input[builtins.str]] = None,
236
- path: Optional[pulumi.Input[builtins.str]] = None,
237
- verbose_logging: Optional[pulumi.Input[builtins.bool]] = None):
226
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
227
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
228
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
229
+ entity_id: Optional[pulumi.Input[_builtins.str]] = None,
230
+ idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
231
+ idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
232
+ idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
233
+ idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
234
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
235
+ path: Optional[pulumi.Input[_builtins.str]] = None,
236
+ verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None):
238
237
  """
239
238
  Input properties used for looking up and filtering AuthBackend resources.
240
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
239
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
241
240
  that should receive a response from the identity provider.
242
- :param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
243
- :param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
241
+ :param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
242
+ :param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
244
243
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
245
- :param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
246
- :param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
244
+ :param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
245
+ :param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
247
246
  with `idp_metadata_url`.
248
- :param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
247
+ :param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
249
248
  `idp_metadata_url`.
250
- :param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
251
- :param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
249
+ :param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
250
+ :param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
252
251
  `idp_metadata_url`.
253
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
252
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
254
253
  The value should not contain leading or trailing forward slashes.
255
254
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
256
255
  *Available only for Vault Enterprise*.
257
- :param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
256
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
258
257
  if not specified.
259
- :param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
258
+ :param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
260
259
  information during the SAML exchange according to the current logging level. Not
261
260
  recommended for production.
262
261
  """
@@ -283,9 +282,9 @@ class _AuthBackendState:
283
282
  if verbose_logging is not None:
284
283
  pulumi.set(__self__, "verbose_logging", verbose_logging)
285
284
 
286
- @property
285
+ @_builtins.property
287
286
  @pulumi.getter(name="acsUrls")
288
- def acs_urls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]:
287
+ def acs_urls(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]:
289
288
  """
290
289
  The well-formatted URLs of your Assertion Consumer Service (ACS)
291
290
  that should receive a response from the identity provider.
@@ -293,24 +292,24 @@ class _AuthBackendState:
293
292
  return pulumi.get(self, "acs_urls")
294
293
 
295
294
  @acs_urls.setter
296
- def acs_urls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]]):
295
+ def acs_urls(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]]):
297
296
  pulumi.set(self, "acs_urls", value)
298
297
 
299
- @property
298
+ @_builtins.property
300
299
  @pulumi.getter(name="defaultRole")
301
- def default_role(self) -> Optional[pulumi.Input[builtins.str]]:
300
+ def default_role(self) -> Optional[pulumi.Input[_builtins.str]]:
302
301
  """
303
302
  The role to use if no role is provided during login.
304
303
  """
305
304
  return pulumi.get(self, "default_role")
306
305
 
307
306
  @default_role.setter
308
- def default_role(self, value: Optional[pulumi.Input[builtins.str]]):
307
+ def default_role(self, value: Optional[pulumi.Input[_builtins.str]]):
309
308
  pulumi.set(self, "default_role", value)
310
309
 
311
- @property
310
+ @_builtins.property
312
311
  @pulumi.getter(name="disableRemount")
313
- def disable_remount(self) -> Optional[pulumi.Input[builtins.bool]]:
312
+ def disable_remount(self) -> Optional[pulumi.Input[_builtins.bool]]:
314
313
  """
315
314
  If set to `true`, opts out of mount migration on path updates.
316
315
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
@@ -318,24 +317,24 @@ class _AuthBackendState:
318
317
  return pulumi.get(self, "disable_remount")
319
318
 
320
319
  @disable_remount.setter
321
- def disable_remount(self, value: Optional[pulumi.Input[builtins.bool]]):
320
+ def disable_remount(self, value: Optional[pulumi.Input[_builtins.bool]]):
322
321
  pulumi.set(self, "disable_remount", value)
323
322
 
324
- @property
323
+ @_builtins.property
325
324
  @pulumi.getter(name="entityId")
326
- def entity_id(self) -> Optional[pulumi.Input[builtins.str]]:
325
+ def entity_id(self) -> Optional[pulumi.Input[_builtins.str]]:
327
326
  """
328
327
  The entity ID of the SAML authentication service provider.
329
328
  """
330
329
  return pulumi.get(self, "entity_id")
331
330
 
332
331
  @entity_id.setter
333
- def entity_id(self, value: Optional[pulumi.Input[builtins.str]]):
332
+ def entity_id(self, value: Optional[pulumi.Input[_builtins.str]]):
334
333
  pulumi.set(self, "entity_id", value)
335
334
 
336
- @property
335
+ @_builtins.property
337
336
  @pulumi.getter(name="idpCert")
338
- def idp_cert(self) -> Optional[pulumi.Input[builtins.str]]:
337
+ def idp_cert(self) -> Optional[pulumi.Input[_builtins.str]]:
339
338
  """
340
339
  The PEM encoded certificate of the identity provider. Mutually exclusive
341
340
  with `idp_metadata_url`.
@@ -343,12 +342,12 @@ class _AuthBackendState:
343
342
  return pulumi.get(self, "idp_cert")
344
343
 
345
344
  @idp_cert.setter
346
- def idp_cert(self, value: Optional[pulumi.Input[builtins.str]]):
345
+ def idp_cert(self, value: Optional[pulumi.Input[_builtins.str]]):
347
346
  pulumi.set(self, "idp_cert", value)
348
347
 
349
- @property
348
+ @_builtins.property
350
349
  @pulumi.getter(name="idpEntityId")
351
- def idp_entity_id(self) -> Optional[pulumi.Input[builtins.str]]:
350
+ def idp_entity_id(self) -> Optional[pulumi.Input[_builtins.str]]:
352
351
  """
353
352
  The entity ID of the identity provider. Mutually exclusive with
354
353
  `idp_metadata_url`.
@@ -356,24 +355,24 @@ class _AuthBackendState:
356
355
  return pulumi.get(self, "idp_entity_id")
357
356
 
358
357
  @idp_entity_id.setter
359
- def idp_entity_id(self, value: Optional[pulumi.Input[builtins.str]]):
358
+ def idp_entity_id(self, value: Optional[pulumi.Input[_builtins.str]]):
360
359
  pulumi.set(self, "idp_entity_id", value)
361
360
 
362
- @property
361
+ @_builtins.property
363
362
  @pulumi.getter(name="idpMetadataUrl")
364
- def idp_metadata_url(self) -> Optional[pulumi.Input[builtins.str]]:
363
+ def idp_metadata_url(self) -> Optional[pulumi.Input[_builtins.str]]:
365
364
  """
366
365
  The metadata URL of the identity provider.
367
366
  """
368
367
  return pulumi.get(self, "idp_metadata_url")
369
368
 
370
369
  @idp_metadata_url.setter
371
- def idp_metadata_url(self, value: Optional[pulumi.Input[builtins.str]]):
370
+ def idp_metadata_url(self, value: Optional[pulumi.Input[_builtins.str]]):
372
371
  pulumi.set(self, "idp_metadata_url", value)
373
372
 
374
- @property
373
+ @_builtins.property
375
374
  @pulumi.getter(name="idpSsoUrl")
376
- def idp_sso_url(self) -> Optional[pulumi.Input[builtins.str]]:
375
+ def idp_sso_url(self) -> Optional[pulumi.Input[_builtins.str]]:
377
376
  """
378
377
  The SSO URL of the identity provider. Mutually exclusive with
379
378
  `idp_metadata_url`.
@@ -381,12 +380,12 @@ class _AuthBackendState:
381
380
  return pulumi.get(self, "idp_sso_url")
382
381
 
383
382
  @idp_sso_url.setter
384
- def idp_sso_url(self, value: Optional[pulumi.Input[builtins.str]]):
383
+ def idp_sso_url(self, value: Optional[pulumi.Input[_builtins.str]]):
385
384
  pulumi.set(self, "idp_sso_url", value)
386
385
 
387
- @property
386
+ @_builtins.property
388
387
  @pulumi.getter
389
- def namespace(self) -> Optional[pulumi.Input[builtins.str]]:
388
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
390
389
  """
391
390
  The namespace to provision the resource in.
392
391
  The value should not contain leading or trailing forward slashes.
@@ -396,12 +395,12 @@ class _AuthBackendState:
396
395
  return pulumi.get(self, "namespace")
397
396
 
398
397
  @namespace.setter
399
- def namespace(self, value: Optional[pulumi.Input[builtins.str]]):
398
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
400
399
  pulumi.set(self, "namespace", value)
401
400
 
402
- @property
401
+ @_builtins.property
403
402
  @pulumi.getter
404
- def path(self) -> Optional[pulumi.Input[builtins.str]]:
403
+ def path(self) -> Optional[pulumi.Input[_builtins.str]]:
405
404
  """
406
405
  Path where the auth backend will be mounted. Defaults to `auth/saml`
407
406
  if not specified.
@@ -409,12 +408,12 @@ class _AuthBackendState:
409
408
  return pulumi.get(self, "path")
410
409
 
411
410
  @path.setter
412
- def path(self, value: Optional[pulumi.Input[builtins.str]]):
411
+ def path(self, value: Optional[pulumi.Input[_builtins.str]]):
413
412
  pulumi.set(self, "path", value)
414
413
 
415
- @property
414
+ @_builtins.property
416
415
  @pulumi.getter(name="verboseLogging")
417
- def verbose_logging(self) -> Optional[pulumi.Input[builtins.bool]]:
416
+ def verbose_logging(self) -> Optional[pulumi.Input[_builtins.bool]]:
418
417
  """
419
418
  If set to `true`, logs additional, potentially sensitive
420
419
  information during the SAML exchange according to the current logging level. Not
@@ -423,7 +422,7 @@ class _AuthBackendState:
423
422
  return pulumi.get(self, "verbose_logging")
424
423
 
425
424
  @verbose_logging.setter
426
- def verbose_logging(self, value: Optional[pulumi.Input[builtins.bool]]):
425
+ def verbose_logging(self, value: Optional[pulumi.Input[_builtins.bool]]):
427
426
  pulumi.set(self, "verbose_logging", value)
428
427
 
429
428
 
@@ -433,17 +432,17 @@ class AuthBackend(pulumi.CustomResource):
433
432
  def __init__(__self__,
434
433
  resource_name: str,
435
434
  opts: Optional[pulumi.ResourceOptions] = None,
436
- acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
437
- default_role: Optional[pulumi.Input[builtins.str]] = None,
438
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
439
- entity_id: Optional[pulumi.Input[builtins.str]] = None,
440
- idp_cert: Optional[pulumi.Input[builtins.str]] = None,
441
- idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
442
- idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
443
- idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
444
- namespace: Optional[pulumi.Input[builtins.str]] = None,
445
- path: Optional[pulumi.Input[builtins.str]] = None,
446
- verbose_logging: Optional[pulumi.Input[builtins.bool]] = None,
435
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
436
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
437
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
438
+ entity_id: Optional[pulumi.Input[_builtins.str]] = None,
439
+ idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
440
+ idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
441
+ idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
442
+ idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
443
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
444
+ path: Optional[pulumi.Input[_builtins.str]] = None,
445
+ verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None,
447
446
  __props__=None):
448
447
  """
449
448
  Manages a SAML Auth mount in a Vault server. See the [Vault
@@ -474,26 +473,26 @@ class AuthBackend(pulumi.CustomResource):
474
473
 
475
474
  :param str resource_name: The name of the resource.
476
475
  :param pulumi.ResourceOptions opts: Options for the resource.
477
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
476
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
478
477
  that should receive a response from the identity provider.
479
- :param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
480
- :param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
478
+ :param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
479
+ :param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
481
480
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
482
- :param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
483
- :param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
481
+ :param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
482
+ :param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
484
483
  with `idp_metadata_url`.
485
- :param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
484
+ :param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
486
485
  `idp_metadata_url`.
487
- :param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
488
- :param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
486
+ :param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
487
+ :param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
489
488
  `idp_metadata_url`.
490
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
489
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
491
490
  The value should not contain leading or trailing forward slashes.
492
491
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
493
492
  *Available only for Vault Enterprise*.
494
- :param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
493
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
495
494
  if not specified.
496
- :param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
495
+ :param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
497
496
  information during the SAML exchange according to the current logging level. Not
498
497
  recommended for production.
499
498
  """
@@ -545,17 +544,17 @@ class AuthBackend(pulumi.CustomResource):
545
544
  def _internal_init(__self__,
546
545
  resource_name: str,
547
546
  opts: Optional[pulumi.ResourceOptions] = None,
548
- acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
549
- default_role: Optional[pulumi.Input[builtins.str]] = None,
550
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
551
- entity_id: Optional[pulumi.Input[builtins.str]] = None,
552
- idp_cert: Optional[pulumi.Input[builtins.str]] = None,
553
- idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
554
- idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
555
- idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
556
- namespace: Optional[pulumi.Input[builtins.str]] = None,
557
- path: Optional[pulumi.Input[builtins.str]] = None,
558
- verbose_logging: Optional[pulumi.Input[builtins.bool]] = None,
547
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
548
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
549
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
550
+ entity_id: Optional[pulumi.Input[_builtins.str]] = None,
551
+ idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
552
+ idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
553
+ idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
554
+ idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
555
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
556
+ path: Optional[pulumi.Input[_builtins.str]] = None,
557
+ verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None,
559
558
  __props__=None):
560
559
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
561
560
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -590,17 +589,17 @@ class AuthBackend(pulumi.CustomResource):
590
589
  def get(resource_name: str,
591
590
  id: pulumi.Input[str],
592
591
  opts: Optional[pulumi.ResourceOptions] = None,
593
- acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[builtins.str]]]] = None,
594
- default_role: Optional[pulumi.Input[builtins.str]] = None,
595
- disable_remount: Optional[pulumi.Input[builtins.bool]] = None,
596
- entity_id: Optional[pulumi.Input[builtins.str]] = None,
597
- idp_cert: Optional[pulumi.Input[builtins.str]] = None,
598
- idp_entity_id: Optional[pulumi.Input[builtins.str]] = None,
599
- idp_metadata_url: Optional[pulumi.Input[builtins.str]] = None,
600
- idp_sso_url: Optional[pulumi.Input[builtins.str]] = None,
601
- namespace: Optional[pulumi.Input[builtins.str]] = None,
602
- path: Optional[pulumi.Input[builtins.str]] = None,
603
- verbose_logging: Optional[pulumi.Input[builtins.bool]] = None) -> 'AuthBackend':
592
+ acs_urls: Optional[pulumi.Input[Sequence[pulumi.Input[_builtins.str]]]] = None,
593
+ default_role: Optional[pulumi.Input[_builtins.str]] = None,
594
+ disable_remount: Optional[pulumi.Input[_builtins.bool]] = None,
595
+ entity_id: Optional[pulumi.Input[_builtins.str]] = None,
596
+ idp_cert: Optional[pulumi.Input[_builtins.str]] = None,
597
+ idp_entity_id: Optional[pulumi.Input[_builtins.str]] = None,
598
+ idp_metadata_url: Optional[pulumi.Input[_builtins.str]] = None,
599
+ idp_sso_url: Optional[pulumi.Input[_builtins.str]] = None,
600
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
601
+ path: Optional[pulumi.Input[_builtins.str]] = None,
602
+ verbose_logging: Optional[pulumi.Input[_builtins.bool]] = None) -> 'AuthBackend':
604
603
  """
605
604
  Get an existing AuthBackend resource's state with the given name, id, and optional extra
606
605
  properties used to qualify the lookup.
@@ -608,26 +607,26 @@ class AuthBackend(pulumi.CustomResource):
608
607
  :param str resource_name: The unique name of the resulting resource.
609
608
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
610
609
  :param pulumi.ResourceOptions opts: Options for the resource.
611
- :param pulumi.Input[Sequence[pulumi.Input[builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
610
+ :param pulumi.Input[Sequence[pulumi.Input[_builtins.str]]] acs_urls: The well-formatted URLs of your Assertion Consumer Service (ACS)
612
611
  that should receive a response from the identity provider.
613
- :param pulumi.Input[builtins.str] default_role: The role to use if no role is provided during login.
614
- :param pulumi.Input[builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
612
+ :param pulumi.Input[_builtins.str] default_role: The role to use if no role is provided during login.
613
+ :param pulumi.Input[_builtins.bool] disable_remount: If set to `true`, opts out of mount migration on path updates.
615
614
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
616
- :param pulumi.Input[builtins.str] entity_id: The entity ID of the SAML authentication service provider.
617
- :param pulumi.Input[builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
615
+ :param pulumi.Input[_builtins.str] entity_id: The entity ID of the SAML authentication service provider.
616
+ :param pulumi.Input[_builtins.str] idp_cert: The PEM encoded certificate of the identity provider. Mutually exclusive
618
617
  with `idp_metadata_url`.
619
- :param pulumi.Input[builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
618
+ :param pulumi.Input[_builtins.str] idp_entity_id: The entity ID of the identity provider. Mutually exclusive with
620
619
  `idp_metadata_url`.
621
- :param pulumi.Input[builtins.str] idp_metadata_url: The metadata URL of the identity provider.
622
- :param pulumi.Input[builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
620
+ :param pulumi.Input[_builtins.str] idp_metadata_url: The metadata URL of the identity provider.
621
+ :param pulumi.Input[_builtins.str] idp_sso_url: The SSO URL of the identity provider. Mutually exclusive with
623
622
  `idp_metadata_url`.
624
- :param pulumi.Input[builtins.str] namespace: The namespace to provision the resource in.
623
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
625
624
  The value should not contain leading or trailing forward slashes.
626
625
  The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
627
626
  *Available only for Vault Enterprise*.
628
- :param pulumi.Input[builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
627
+ :param pulumi.Input[_builtins.str] path: Path where the auth backend will be mounted. Defaults to `auth/saml`
629
628
  if not specified.
630
- :param pulumi.Input[builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
629
+ :param pulumi.Input[_builtins.bool] verbose_logging: If set to `true`, logs additional, potentially sensitive
631
630
  information during the SAML exchange according to the current logging level. Not
632
631
  recommended for production.
633
632
  """
@@ -648,78 +647,78 @@ class AuthBackend(pulumi.CustomResource):
648
647
  __props__.__dict__["verbose_logging"] = verbose_logging
649
648
  return AuthBackend(resource_name, opts=opts, __props__=__props__)
650
649
 
651
- @property
650
+ @_builtins.property
652
651
  @pulumi.getter(name="acsUrls")
653
- def acs_urls(self) -> pulumi.Output[Sequence[builtins.str]]:
652
+ def acs_urls(self) -> pulumi.Output[Sequence[_builtins.str]]:
654
653
  """
655
654
  The well-formatted URLs of your Assertion Consumer Service (ACS)
656
655
  that should receive a response from the identity provider.
657
656
  """
658
657
  return pulumi.get(self, "acs_urls")
659
658
 
660
- @property
659
+ @_builtins.property
661
660
  @pulumi.getter(name="defaultRole")
662
- def default_role(self) -> pulumi.Output[Optional[builtins.str]]:
661
+ def default_role(self) -> pulumi.Output[Optional[_builtins.str]]:
663
662
  """
664
663
  The role to use if no role is provided during login.
665
664
  """
666
665
  return pulumi.get(self, "default_role")
667
666
 
668
- @property
667
+ @_builtins.property
669
668
  @pulumi.getter(name="disableRemount")
670
- def disable_remount(self) -> pulumi.Output[Optional[builtins.bool]]:
669
+ def disable_remount(self) -> pulumi.Output[Optional[_builtins.bool]]:
671
670
  """
672
671
  If set to `true`, opts out of mount migration on path updates.
673
672
  See here for more info on [Mount Migration](https://www.vaultproject.io/docs/concepts/mount-migration)
674
673
  """
675
674
  return pulumi.get(self, "disable_remount")
676
675
 
677
- @property
676
+ @_builtins.property
678
677
  @pulumi.getter(name="entityId")
679
- def entity_id(self) -> pulumi.Output[builtins.str]:
678
+ def entity_id(self) -> pulumi.Output[_builtins.str]:
680
679
  """
681
680
  The entity ID of the SAML authentication service provider.
682
681
  """
683
682
  return pulumi.get(self, "entity_id")
684
683
 
685
- @property
684
+ @_builtins.property
686
685
  @pulumi.getter(name="idpCert")
687
- def idp_cert(self) -> pulumi.Output[Optional[builtins.str]]:
686
+ def idp_cert(self) -> pulumi.Output[Optional[_builtins.str]]:
688
687
  """
689
688
  The PEM encoded certificate of the identity provider. Mutually exclusive
690
689
  with `idp_metadata_url`.
691
690
  """
692
691
  return pulumi.get(self, "idp_cert")
693
692
 
694
- @property
693
+ @_builtins.property
695
694
  @pulumi.getter(name="idpEntityId")
696
- def idp_entity_id(self) -> pulumi.Output[Optional[builtins.str]]:
695
+ def idp_entity_id(self) -> pulumi.Output[Optional[_builtins.str]]:
697
696
  """
698
697
  The entity ID of the identity provider. Mutually exclusive with
699
698
  `idp_metadata_url`.
700
699
  """
701
700
  return pulumi.get(self, "idp_entity_id")
702
701
 
703
- @property
702
+ @_builtins.property
704
703
  @pulumi.getter(name="idpMetadataUrl")
705
- def idp_metadata_url(self) -> pulumi.Output[Optional[builtins.str]]:
704
+ def idp_metadata_url(self) -> pulumi.Output[Optional[_builtins.str]]:
706
705
  """
707
706
  The metadata URL of the identity provider.
708
707
  """
709
708
  return pulumi.get(self, "idp_metadata_url")
710
709
 
711
- @property
710
+ @_builtins.property
712
711
  @pulumi.getter(name="idpSsoUrl")
713
- def idp_sso_url(self) -> pulumi.Output[Optional[builtins.str]]:
712
+ def idp_sso_url(self) -> pulumi.Output[Optional[_builtins.str]]:
714
713
  """
715
714
  The SSO URL of the identity provider. Mutually exclusive with
716
715
  `idp_metadata_url`.
717
716
  """
718
717
  return pulumi.get(self, "idp_sso_url")
719
718
 
720
- @property
719
+ @_builtins.property
721
720
  @pulumi.getter
722
- def namespace(self) -> pulumi.Output[Optional[builtins.str]]:
721
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
723
722
  """
724
723
  The namespace to provision the resource in.
725
724
  The value should not contain leading or trailing forward slashes.
@@ -728,18 +727,18 @@ class AuthBackend(pulumi.CustomResource):
728
727
  """
729
728
  return pulumi.get(self, "namespace")
730
729
 
731
- @property
730
+ @_builtins.property
732
731
  @pulumi.getter
733
- def path(self) -> pulumi.Output[Optional[builtins.str]]:
732
+ def path(self) -> pulumi.Output[Optional[_builtins.str]]:
734
733
  """
735
734
  Path where the auth backend will be mounted. Defaults to `auth/saml`
736
735
  if not specified.
737
736
  """
738
737
  return pulumi.get(self, "path")
739
738
 
740
- @property
739
+ @_builtins.property
741
740
  @pulumi.getter(name="verboseLogging")
742
- def verbose_logging(self) -> pulumi.Output[builtins.bool]:
741
+ def verbose_logging(self) -> pulumi.Output[_builtins.bool]:
743
742
  """
744
743
  If set to `true`, logs additional, potentially sensitive
745
744
  information during the SAML exchange according to the current logging level. Not